Analysis
-
max time kernel
361s -
max time network
372s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-04-2022 19:27
Static task
static1
Behavioral task
behavioral1
Sample
ChromaCam-3.2.2.0.exe
Resource
win10v2004-20220414-en
General
-
Target
ChromaCam-3.2.2.0.exe
-
Size
254.7MB
-
MD5
1c28a7ed19329ce735831e62fe834689
-
SHA1
e3a7bfffddb451ed10db09d9a2cba84e2cc788ba
-
SHA256
769807d48dcdeeecf42a024db940a90ac879bc10e9e5864d29fb339e3358d9e6
-
SHA512
9eded222432abaa7faf334fdf69c4217cae3cb25733bc26f5925257cc1a61e2f3d7318f8dc17c43dda3129dd082736836cb1f3e6a443c2631891f1b2aea60dbb
Malware Config
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4228 CpuGenDetection.exe 2176 MicrosoftEdgeWebview2Setup.exe 428 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 4524 MicrosoftEdgeUpdate.exe 4296 MicrosoftEdgeUpdateComRegisterShell64.exe 4260 MicrosoftEdgeUpdateComRegisterShell64.exe 4984 MicrosoftEdgeUpdateComRegisterShell64.exe 824 MicrosoftEdgeUpdate.exe 644 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 3016 MicrosoftEdge_X64_100.0.1185.39.exe 1188 setup.exe 4172 MicrosoftEdgeUpdate.exe 1960 DllFinder.exe 4348 DllFinder_x64.exe 3588 dxwebsetup.exe 3224 dxwsetup.exe 2208 infinst.exe 3036 infinst.exe 2608 infinst.exe 1508 infinst.exe 3316 infinst.exe 60 infinst.exe 2792 infinst.exe 3568 infinst.exe 1728 infinst.exe 832 infinst.exe 1556 infinst.exe 3464 infinst.exe 3444 infinst.exe 4340 infinst.exe 2376 infinst.exe 4684 infinst.exe 1236 infinst.exe 4636 infinst.exe 3956 infinst.exe 3288 infinst.exe 4244 infinst.exe 4416 infinst.exe 4228 infinst.exe 4216 infinst.exe 4856 infinst.exe 3356 infinst.exe 3420 infinst.exe 1972 infinst.exe 5100 infinst.exe 1152 infinst.exe 4768 infinst.exe 4752 infinst.exe 4556 infinst.exe 2080 infinst.exe 4612 infinst.exe 4524 infinst.exe 1588 infinst.exe 3936 infinst.exe 4620 infinst.exe 3092 infinst.exe 3220 infinst.exe 2648 infinst.exe 3696 infinst.exe 3364 infinst.exe 4240 infinst.exe 4256 infinst.exe -
Sets file execution options in registry 2 TTPs
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation ChromaCam-3.2.2.0.exe -
Loads dropped DLL 64 IoCs
pid Process 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 428 MicrosoftEdgeUpdate.exe 4556 MicrosoftEdgeUpdate.exe 4524 MicrosoftEdgeUpdate.exe 4296 MicrosoftEdgeUpdateComRegisterShell64.exe 4524 MicrosoftEdgeUpdate.exe 4260 MicrosoftEdgeUpdateComRegisterShell64.exe 4524 MicrosoftEdgeUpdate.exe 4984 MicrosoftEdgeUpdateComRegisterShell64.exe 4524 MicrosoftEdgeUpdate.exe 824 MicrosoftEdgeUpdate.exe 644 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 564 MicrosoftEdgeUpdate.exe 644 MicrosoftEdgeUpdate.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 4172 MicrosoftEdgeUpdate.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ChromaCamSystemTray = "C:\\Program Files (x86)\\Personify\\ChromaCam\\ChromaCam SystemTray.exe" ChromaCam-3.2.2.0.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeAutoLaunch_5EFC0ECB77A7585FE9DCDD0B2E946A2B = "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --no-startup-window /prefetch:5" msedge.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ChromaCam-3.2.2.0.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce DrvInst.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini dxwsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini dxwsetup.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\M: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\F: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\SET7716.tmp infinst.exe File opened for modification C:\Windows\system32\D3DCompiler_38.dll infinst.exe File created C:\Windows\SysWOW64\SET875C.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine2_1.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET5C1B.tmp infinst.exe File created C:\Windows\SysWOW64\SET6B4F.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET7009.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET939D.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET5361.tmp infinst.exe File created C:\Windows\SysWOW64\SET6B5F.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx10_35.dll dxwsetup.exe File created C:\Windows\SysWOW64\SET74C2.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET80FA.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2005_d3dx9_25_x86.cab dxwsetup.exe File opened for modification C:\Windows\system32\XAudio2_4.dll infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2006_d3dx10_00_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_d3dx9_41_x64.cab dxwsetup.exe File opened for modification C:\Windows\system32\SET4CC9.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET6B4F.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET6F07.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\xactengine2_7.dll dxwsetup.exe File created C:\Windows\system32\SET7523.tmp infinst.exe File opened for modification C:\Windows\system32\D3DCompiler_40.dll infinst.exe File opened for modification C:\Windows\SysWOW64\X3DAudio1_5.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET8D3C.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET97E9.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET5E5D.tmp infinst.exe File opened for modification C:\Windows\system32\x3daudio1_1.dll infinst.exe File opened for modification C:\Windows\system32\x3daudio1_1.dll infinst.exe File opened for modification C:\Windows\SysWOW64\xinput1_3.dll dxwsetup.exe File created C:\Windows\system32\SET6E0D.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET4C5C.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET7570.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dcsx_43.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2006_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx9_32.dll dxwsetup.exe File created C:\Windows\SysWOW64\SET61AE.tmp dxwsetup.exe File opened for modification C:\Windows\system32\xactengine3_4.dll infinst.exe File opened for modification C:\Windows\SysWOW64\D3DX9_41.dll dxwsetup.exe File created C:\Windows\system32\SET85EA.tmp infinst.exe File created C:\Windows\SysWOW64\SET9886.tmp dxwsetup.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b6b5b5b2-ae11-9049-a240-3565aee92afa}\SETDFA5.tmp DrvInst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dcsx_42_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET6A24.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET7134.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\XAPOFX1_0.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET83CC.tmp dxwsetup.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{b6b5b5b2-ae11-9049-a240-3565aee92afa}\PsyCamera.sys DrvInst.exe File opened for modification C:\Windows\system32\XAPOFX1_4.dll infinst.exe File created C:\Windows\SysWOW64\SET9B0B.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_d3dx9_40_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_d3dx10_41_x86.cab dxwsetup.exe File created C:\Windows\system32\SET5E5D.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET60A2.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET764A.tmp infinst.exe File created C:\Windows\SysWOW64\SET80C9.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_d3dx9_37_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx10_42_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx10_43_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\SET5E2F.tmp dxwsetup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Personify\ChromaCam\fil1.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll.sig setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\MLModels\autofill_labeling.ort setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Trust Protection Lists\manifest.json setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg1_blur_16x9.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\pt-PT.pak setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg24.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\eventlog_provider.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Locales\nl.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Locales\sk.pak setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg73.png ChromaCam-3.2.2.0.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220414213614.pma setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\notification_helper.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Trust Protection Lists\Sigma\Advertising setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\VisualElements\SmallLogoCanary.png setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Trust Protection Lists\Sigma\Cryptomining setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Trust Protection Lists\Sigma\Social setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\eu.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\cookie_exporter.exe setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\ml.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\ug.pak setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\opencv_core430.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\msedgeupdateres_bn.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\BHO\ie_to_edge_bho.dll setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\System.Buffers.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\psmachine_64.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\is.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\msedge.dll.sig setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\System.Numerics.Vectors.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\tt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\VisualElements\LogoBeta.png setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg56.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg87_16x9.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\da-dk\Personify ChromaCam.resources.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg1_black_16x9.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg61.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\msedgeupdateres_ca-Es-VALENCIA.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\libGLESv2.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Trust Protection Lists\Sigma\LICENSE setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Trust Protection Lists\Sigma\Entities setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\MEIPreload\manifest.json setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\64\CameraHandler.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg32.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\msedgeupdateres_gu.dll MicrosoftEdgeWebview2Setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\identity_proxy\identity_helper.Sparse.Stable.msix setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\kok.pak setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg26.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\mr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\msvcp140.dll setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg44.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\bg82_16x9.png ChromaCam-3.2.2.0.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\cy.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\ca-Es-VALENCIA.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\oneauth.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Installer\setup.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Trust Protection Lists\Mu\Advertising setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\100.0.1185.39\Trust Protection Lists\Mu\Fingerprinting setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\move-up.png ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\Locales\sv.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\VisualElements\LogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\100.0.1185.39\msedge.dll.sig setup.exe File created C:\Program Files (x86)\Personify\ChromaCam\Flurl.dll ChromaCam-3.2.2.0.exe File created C:\Program Files (x86)\Personify\ChromaCam\de-de\UeFeedback.resources.dll ChromaCam-3.2.2.0.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\msdownld.tmp\AS597EE1.tmp\Feb2006_d3dx9_29_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59EC41.tmp\Jun2008_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A1881.tmp\Jun2010_d3dx9_43_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A2B3E.tmp\MDX_1.0.2910.0_x86.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS5983D2.tmp\Dec2006_d3dx9_32_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59BC19.tmp\Feb2006_xact_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59E309.tmp\Mar2008_d3dx10_37_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59FAC8.tmp\Nov2008_xaudio_x64.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2906.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS599538.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59970C.tmp\Jun2008_d3dx10_38_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59BC19.tmp\Feb2006_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59CF24.tmp\Apr2007_xact_x86.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2909.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File created C:\Windows\INF\KSCAPTUR.PNF DrvInst.exe File created C:\Windows\msdownld.tmp\AS597EE1.tmp\Feb2006_d3dx9_29_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59879B.tmp\Apr2007_d3dx10_33_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59A2A5.tmp dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2905.0\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59A0F0.tmp\Mar2009_d3dx10_41_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59C281.tmp\Aug2006_xact_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59D492.tmp\Jun2007_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon_x64.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2908.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS59AB11.tmp\Jun2010_d3dx10_43_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59D26F.tmp\Jun2007_d3dx10_34_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59E106.tmp\Mar2008_d3dx9_37_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59E8B7.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A2727.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A01EC.tmp\Mar2009_d3dx10_41_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A1AC3.tmp\Jun2010_d3dx11_43_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A20AF.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5956A8.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS597D99.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS598EEE.tmp\Nov2007_d3dx9_36_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5999CB.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59EEE1.tmp\Jun2008_xaudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59FDF4.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A0E30.tmp dxwsetup.exe File opened for modification C:\Windows\assembly\tmp\30ROE94Y\__AssemblyInfo__.ini dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59EAD9.tmp\Jun2008_d3dx10_38_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59F29A.tmp\Aug2008_d3dx10_39_x64.cab dxwsetup.exe File created C:\Windows\assembly\tmp\CHK3J92E\Microsoft.DirectX.dll dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59730A.tmp\Dec2006_d3dx10_00_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS598A99.tmp\Jun2007_d3dx10_34_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59B7A4.tmp\Dec2005_d3dx9_28_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59B7A4.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59CA9F.tmp\Feb2007_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\msdownld.tmp\AS59B9A8.tmp\Feb2006_d3dx9_29_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59C8EA.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59CC16.tmp dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS599EDC.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59BB6D.tmp\Feb2006_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59ED89.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A1E2E.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59705A.tmp dxwsetup.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags devcon_x64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION ChromaCam-3.2.2.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Personify ChromaCam.exe = "11000" ChromaCam-3.2.2.0.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Personify, Inc. PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Personify, Inc.\ChromaCam PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Personify, Inc.\ChromaCam PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\EdgeUpdate MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE PsyFrameGrabberService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MicrosoftEdgeUpdate.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_3.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine3_2.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\NumMethods\ = "10" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\ = "XAudio2" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{266EEE40-6C63-11cf-8A03-00AA006ECB65}\ = "WDM TV Tuner" DrvInst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\MicrosoftEdgeUpdate.exe\AppID = "{CECDDD22-2E72-4832-9606-A9B0E5E344B2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D9AA3288-4EA7-4E67-AE60-D18EADCB923D}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{71F96460-78F3-11d0-A18C-00A0C9118956}\InprocServer32 DrvInst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_6.dll" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB}\NumMethods\ = "12" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E421557C-0628-43FB-BF2B-7C9F8A4D067C}\LocalServer32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1B9063E4-3882-485E-8797-F28A0240782F}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{08D832B9-D2FD-481F-98CF-904D00DF63CC} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E55B90F1-DA33-400B-B09E-3AFF7D46BD83}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ = "IBrowserHttpRequest2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdate.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FEF5409-327B-46FF-830B-1F9FCC96DA4E} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C20433B3-0D4B-49F6-9B6C-6EE0FAE07837}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\NumMethods\ = "23" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5F6A18BB-6231-424B-8242-19E5BB94F8ED}\VERSIONINDEPENDENTPROGID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AB4EE1FC-0A81-4F56-B0E2-248FB78051AF}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{450CF5FF-95C4-4679-BECA-22680389ECB9} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{A533BCB1-6D33-41FC-8C3B-63223FCCE9D2}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{195A2EB3-21EE-43CA-9F23-93C2C9934E2E}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalizedString = "@C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.145.49\\msedgeupdate.dll,-3000" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\ = "XAudio2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9F3F5F5D-721A-4B19-9B5D-69F664C1A591}\ = "Google Update Policy Status Class" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{FCE48F77-C677-4012-8A1A-54D2E2BC07BD}\ = "IGoogleUpdateCore" MicrosoftEdgeUpdateComRegisterShell64.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Personify ChromaCam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Personify ChromaCam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Personify ChromaCam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Personify ChromaCam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Personify ChromaCam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Personify ChromaCam.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 5c000000010000000400000000080000190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa604000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 Personify ChromaCam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Personify ChromaCam.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 428 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 428 MicrosoftEdgeUpdate.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 4172 MicrosoftEdgeUpdate.exe 4172 MicrosoftEdgeUpdate.exe 1184 ChromaCam-3.2.2.0.exe 1960 DllFinder.exe 1960 DllFinder.exe 4348 DllFinder_x64.exe 4348 DllFinder_x64.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1184 ChromaCam-3.2.2.0.exe 1560 PowerShell.exe 1560 PowerShell.exe 4860 SilentExecute.exe 4860 SilentExecute.exe 3396 SilentExecute.exe 3396 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe 528 SilentExecute.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe 372 msedge.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 428 MicrosoftEdgeUpdate.exe Token: 33 3016 MicrosoftEdge_X64_100.0.1185.39.exe Token: SeIncBasePriorityPrivilege 3016 MicrosoftEdge_X64_100.0.1185.39.exe Token: SeDebugPrivilege 428 MicrosoftEdgeUpdate.exe Token: SeDebugPrivilege 4172 MicrosoftEdgeUpdate.exe Token: SeBackupPrivilege 4804 vssvc.exe Token: SeRestorePrivilege 4804 vssvc.exe Token: SeAuditPrivilege 4804 vssvc.exe Token: SeDebugPrivilege 1560 PowerShell.exe Token: SeDebugPrivilege 4860 SilentExecute.exe Token: SeDebugPrivilege 3396 SilentExecute.exe Token: SeDebugPrivilege 528 SilentExecute.exe Token: SeAuditPrivilege 2648 svchost.exe Token: SeSecurityPrivilege 2648 svchost.exe Token: SeLoadDriverPrivilege 1988 devcon_x64.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 1240 DrvInst.exe Token: SeLoadDriverPrivilege 2204 devcon_x64.exe Token: SeLoadDriverPrivilege 2204 devcon_x64.exe Token: SeLoadDriverPrivilege 208 devcon_x64.exe Token: SeDebugPrivilege 1044 Personify ChromaCam.exe Token: SeDebugPrivilege 1496 ChromaCam SystemTray.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 1496 ChromaCam SystemTray.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 372 msedge.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1496 ChromaCam SystemTray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4228 1184 ChromaCam-3.2.2.0.exe 76 PID 1184 wrote to memory of 4228 1184 ChromaCam-3.2.2.0.exe 76 PID 1184 wrote to memory of 4228 1184 ChromaCam-3.2.2.0.exe 76 PID 1184 wrote to memory of 2176 1184 ChromaCam-3.2.2.0.exe 78 PID 1184 wrote to memory of 2176 1184 ChromaCam-3.2.2.0.exe 78 PID 1184 wrote to memory of 2176 1184 ChromaCam-3.2.2.0.exe 78 PID 2176 wrote to memory of 428 2176 MicrosoftEdgeWebview2Setup.exe 79 PID 2176 wrote to memory of 428 2176 MicrosoftEdgeWebview2Setup.exe 79 PID 2176 wrote to memory of 428 2176 MicrosoftEdgeWebview2Setup.exe 79 PID 428 wrote to memory of 4556 428 MicrosoftEdgeUpdate.exe 80 PID 428 wrote to memory of 4556 428 MicrosoftEdgeUpdate.exe 80 PID 428 wrote to memory of 4556 428 MicrosoftEdgeUpdate.exe 80 PID 428 wrote to memory of 4524 428 MicrosoftEdgeUpdate.exe 81 PID 428 wrote to memory of 4524 428 MicrosoftEdgeUpdate.exe 81 PID 428 wrote to memory of 4524 428 MicrosoftEdgeUpdate.exe 81 PID 4524 wrote to memory of 4296 4524 MicrosoftEdgeUpdate.exe 82 PID 4524 wrote to memory of 4296 4524 MicrosoftEdgeUpdate.exe 82 PID 4524 wrote to memory of 4260 4524 MicrosoftEdgeUpdate.exe 83 PID 4524 wrote to memory of 4260 4524 MicrosoftEdgeUpdate.exe 83 PID 4524 wrote to memory of 4984 4524 MicrosoftEdgeUpdate.exe 84 PID 4524 wrote to memory of 4984 4524 MicrosoftEdgeUpdate.exe 84 PID 428 wrote to memory of 824 428 MicrosoftEdgeUpdate.exe 85 PID 428 wrote to memory of 824 428 MicrosoftEdgeUpdate.exe 85 PID 428 wrote to memory of 824 428 MicrosoftEdgeUpdate.exe 85 PID 428 wrote to memory of 644 428 MicrosoftEdgeUpdate.exe 86 PID 428 wrote to memory of 644 428 MicrosoftEdgeUpdate.exe 86 PID 428 wrote to memory of 644 428 MicrosoftEdgeUpdate.exe 86 PID 564 wrote to memory of 3016 564 MicrosoftEdgeUpdate.exe 90 PID 564 wrote to memory of 3016 564 MicrosoftEdgeUpdate.exe 90 PID 3016 wrote to memory of 1188 3016 MicrosoftEdge_X64_100.0.1185.39.exe 91 PID 3016 wrote to memory of 1188 3016 MicrosoftEdge_X64_100.0.1185.39.exe 91 PID 564 wrote to memory of 4172 564 MicrosoftEdgeUpdate.exe 92 PID 564 wrote to memory of 4172 564 MicrosoftEdgeUpdate.exe 92 PID 564 wrote to memory of 4172 564 MicrosoftEdgeUpdate.exe 92 PID 1184 wrote to memory of 1960 1184 ChromaCam-3.2.2.0.exe 93 PID 1184 wrote to memory of 1960 1184 ChromaCam-3.2.2.0.exe 93 PID 1184 wrote to memory of 1960 1184 ChromaCam-3.2.2.0.exe 93 PID 1184 wrote to memory of 4348 1184 ChromaCam-3.2.2.0.exe 95 PID 1184 wrote to memory of 4348 1184 ChromaCam-3.2.2.0.exe 95 PID 1184 wrote to memory of 3660 1184 ChromaCam-3.2.2.0.exe 97 PID 1184 wrote to memory of 3660 1184 ChromaCam-3.2.2.0.exe 97 PID 1184 wrote to memory of 3660 1184 ChromaCam-3.2.2.0.exe 97 PID 3660 wrote to memory of 1896 3660 cmd.exe 99 PID 3660 wrote to memory of 1896 3660 cmd.exe 99 PID 3660 wrote to memory of 1896 3660 cmd.exe 99 PID 1184 wrote to memory of 3588 1184 ChromaCam-3.2.2.0.exe 100 PID 1184 wrote to memory of 3588 1184 ChromaCam-3.2.2.0.exe 100 PID 1184 wrote to memory of 3588 1184 ChromaCam-3.2.2.0.exe 100 PID 3588 wrote to memory of 3224 3588 dxwebsetup.exe 101 PID 3588 wrote to memory of 3224 3588 dxwebsetup.exe 101 PID 3588 wrote to memory of 3224 3588 dxwebsetup.exe 101 PID 3224 wrote to memory of 2208 3224 dxwsetup.exe 105 PID 3224 wrote to memory of 2208 3224 dxwsetup.exe 105 PID 3224 wrote to memory of 3036 3224 dxwsetup.exe 106 PID 3224 wrote to memory of 3036 3224 dxwsetup.exe 106 PID 3224 wrote to memory of 2608 3224 dxwsetup.exe 107 PID 3224 wrote to memory of 2608 3224 dxwsetup.exe 107 PID 3224 wrote to memory of 1508 3224 dxwsetup.exe 108 PID 3224 wrote to memory of 1508 3224 dxwsetup.exe 108 PID 3224 wrote to memory of 3316 3224 dxwsetup.exe 109 PID 3224 wrote to memory of 3316 3224 dxwsetup.exe 109 PID 3224 wrote to memory of 60 3224 dxwsetup.exe 110 PID 3224 wrote to memory of 60 3224 dxwsetup.exe 110 PID 3224 wrote to memory of 2792 3224 dxwsetup.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChromaCam-3.2.2.0.exe"C:\Users\Admin\AppData\Local\Temp\ChromaCam-3.2.2.0.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\CpuGenDetection.exe"C:\Users\Admin\AppData\Local\Temp\CpuGenDetection.exe"2⤵
- Executes dropped EXE
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe" /silent /install2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU74AE.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4556
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver4⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4296
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4260
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.145.49\MicrosoftEdgeUpdateComRegisterShell64.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4984
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTJGRjhEODctNEM0OC00MzNCLTlCNEUtMTg0Qzc3MEFDNEIwfSIgdXNlcmlkPSJ7QTA1OTU5NDAtREMwQy00MzY5LUIyNDItRkRENDE2QUYzQzE3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins3NEI5QTBDOS05MEQ4LTQ3OTctODE5RS1GNjQ2MDkyMTREODl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTQ3LjM3IiBuZXh0dmVyc2lvbj0iMS4zLjE0NS40OSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgaW5zdGFsbF90aW1lX21zPSIxMDE1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:824
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=true" /installsource otherinstallcmd /sessionid "{A2FF8D87-4C48-433B-9B4E-184C770AC4B0}" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DllFinder.exe"C:\Users\Admin\AppData\Local\Temp\DllFinder.exe" "C:\Program Files (x86)\Personify\ChromaCam\PersonifyCameoUE.ax"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\DllFinder_x64.exe"C:\Users\Admin\AppData\Local\Temp\DllFinder_x64.exe" "C:\Program Files (x86)\Personify\ChromaCam\64\PersonifyCameoUE.ax"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "sc STOP FrameServer""2⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\sc.exesc STOP FrameServer"3⤵PID:1896
-
-
-
C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exe" /q2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe /windowsupdate3⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_24_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_25_x64.inf4⤵
- Executes dropped EXE
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_26_x64.inf4⤵
- Executes dropped EXE
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_27_x64.inf4⤵
- Executes dropped EXE
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_28_x64.inf4⤵
- Executes dropped EXE
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_29_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT_x64.inf4⤵
- Executes dropped EXE
PID:2792
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_0.dll4⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_30_x64.inf4⤵
- Executes dropped EXE
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_1_x64.inf4⤵
- Executes dropped EXE
PID:1728
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_1.dll4⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe xinput1_1_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_2_x64.inf4⤵
- Executes dropped EXE
PID:1556
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_2.dll4⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe xinput1_2_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_3_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3444
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_3.dll4⤵
- Modifies registry class
PID:4936
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_31_x64.inf4⤵
- Executes dropped EXE
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_4_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2376
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_4.dll4⤵
- Modifies registry class
PID:2492
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_32_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_00_x64.inf4⤵
- Executes dropped EXE
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_5_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4636
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_5.dll4⤵
- Modifies registry class
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_6_x64.inf4⤵
- Executes dropped EXE
PID:3956
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_6.dll4⤵PID:3388
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_33_x64.inf4⤵
- Executes dropped EXE
PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_33_x64.inf4⤵
- Executes dropped EXE
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_7_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4416
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_7.dll4⤵
- Modifies registry class
PID:4420
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_34_x64.inf4⤵
- Executes dropped EXE
PID:4216
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_34_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_8_x64.inf4⤵
- Executes dropped EXE
PID:3356
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_8.dll4⤵PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_35_x64.inf4⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_35_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_9_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5100
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_9.dll4⤵PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx9_36_x64.inf4⤵
- Executes dropped EXE
PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_36_x64.inf4⤵
- Executes dropped EXE
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_2_x64.inf4⤵
- Executes dropped EXE
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT2_10_x64.inf4⤵
- Executes dropped EXE
PID:4556
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_10.dll4⤵PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_37_x64.inf4⤵
- Executes dropped EXE
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_37_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_3_x64.inf4⤵
- Executes dropped EXE
PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_0_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1588
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_0.dll4⤵PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_0_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3936
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_0.dll4⤵PID:5056
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_38_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_38_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_4_x64.inf4⤵
- Executes dropped EXE
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_1_x64.inf4⤵
- Executes dropped EXE
PID:2648
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_1.dll4⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_1_x64.inf4⤵
- Executes dropped EXE
PID:3696
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_1.dll4⤵
- Modifies registry class
PID:3708
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_39_x64.inf4⤵
- Executes dropped EXE
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_39_x64.inf4⤵
- Executes dropped EXE
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_2_x64.inf4⤵
- Executes dropped EXE
PID:4256
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_2.dll4⤵PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_2_x64.inf4⤵
- Drops file in System32 directory
PID:1816
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_2.dll4⤵PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_5_x64.inf4⤵PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_3_x64.inf4⤵PID:1640
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_3.dll4⤵
- Modifies registry class
PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_3_x64.inf4⤵PID:432
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_3.dll4⤵
- Modifies registry class
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_40_x64.inf4⤵
- Drops file in Windows directory
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_40_x64.inf4⤵
- Drops file in System32 directory
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_6_x64.inf4⤵
- Drops file in System32 directory
PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_4_x64.inf4⤵
- Drops file in System32 directory
PID:776
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_4.dll4⤵PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_4_x64.inf4⤵
- Drops file in System32 directory
PID:2476
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_4.dll4⤵
- Modifies registry class
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_41_x64.inf4⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_41_x64.inf4⤵PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_42_x64.inf4⤵PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_42_x64.inf4⤵PID:3940
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx11_42_x64.inf4⤵PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dcsx_42_x64.inf4⤵PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DCompiler_42_x64.inf4⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_5_x64.inf4⤵PID:1360
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_5.dll4⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_5_x64.inf4⤵PID:3492
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_5.dll4⤵PID:1132
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe X3DAudio1_7_x64.inf4⤵PID:4540
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_6_x64.inf4⤵PID:3660
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_6.dll4⤵
- Modifies registry class
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_6_x64.inf4⤵
- Drops file in System32 directory
PID:2032
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_6.dll4⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DX9_43_x64.inf4⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx10_43_x64.inf4⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dx11_43_x64.inf4⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe d3dcsx_43_x64.inf4⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe D3DCompiler_43_x64.inf4⤵PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XACT3_7_x64.inf4⤵PID:1512
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_7.dll4⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2D9A.tmp\infinst.exe XAudio2_7_x64.inf4⤵
- Drops file in Windows directory
PID:3204
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_7.dll4⤵
- Modifies registry class
PID:3188
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\PowerShell.exePowerShell.exe -ExecutionPolicy UnRestricted -inputformat none -File "C:\Users\Admin\AppData\Local\Temp\linpack\cpu_perf_analyse.ps1" "C:\Users\Admin\AppData\Local\Temp\linpack" "C:\Program Files (x86)\Personify\ChromaCam"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\linpack\x64\linpack_intel64.exe"C:\Users\Admin\AppData\Local\Temp\linpack\x64\linpack_intel64.exe" C:\Users\Admin\AppData\Local\Temp\linpack\linpack_param3⤵PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe"C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe" "C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe" "/install" "" "0"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe/install3⤵PID:3508
-
-
-
C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe"C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe" "C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe" "/start" "" "0"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe/start3⤵PID:2568
-
-
-
C:\Windows\SysWOW64\sc.exesc failure PsyFrameGrabberService reset= 0 actions= restart/0/restart/0/restart/02⤵PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe"C:\Users\Admin\AppData\Local\Temp\SilentExecute.exe" "C:\Program Files (x86)\Personify\ChromaCam\certutil.exe" "-addstore "TrustedPublisher" "C:\Program Files (x86)\Personify\ChromaCam\64\personify.cer""2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Program Files (x86)\Personify\ChromaCam\certutil.exe-addstore TrustedPublisher C:\Program3⤵PID:4020
-
-
-
C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe"C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe" install "C:\Program Files (x86)\Personify\ChromaCam\64\psycamera.inf" PSYCAMERA2⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe"C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe" restart PSYCAMERA2⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe"C:\Program Files (x86)\Personify\ChromaCam\64\devcon_x64.exe" rescan2⤵
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
C:\Program Files (x86)\Personify\ChromaCam\Personify ChromaCam.exe"C:\Program Files (x86)\Personify\ChromaCam\Personify ChromaCam.exe" /StartFromInstaller2⤵
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Program Files (x86)\Personify\ChromaCam\ChromaCam SystemTray.exe"ChromaCam SystemTray.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/o/oauth2/v2/auth?response_type=code&scope=openid%20email%20profile&redirect_uri=http%3A%2F%2F127.0.0.1%3A49964%2F&client_id=196722717059-kv17j9jjf73h5kqoshmdoe3hl0nbe5ae.apps.googleusercontent.com&state=J4tiJCNitIP7ui9iMRYCA-ncL5tSaO4rAnh4gdP41Gk&code_challenge=zkAPCHfRkSq_FfgrwR2izPO8EBL2Wf6NZh5Eg9N2Vu0&code_challenge_method=S2563⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdc50946f8,0x7ffdc5094708,0x7ffdc50947184⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:24⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:34⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 /prefetch:84⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:14⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:14⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5476 /prefetch:84⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5620 /prefetch:84⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:84⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff7b19f5460,0x7ff7b19f5470,0x7ff7b19f54805⤵PID:3980
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,16246708794632717597,10218839245147035873,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:84⤵PID:3100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/o/oauth2/v2/auth?response_type=code&scope=openid%20email%20profile&redirect_uri=http%3A%2F%2F127.0.0.1%3A55943%2F&client_id=196722717059-kv17j9jjf73h5kqoshmdoe3hl0nbe5ae.apps.googleusercontent.com&state=7HHqg3mce-XjV2-AgfSPio2LKyFdZb34G9UvOYvEgCE&code_challenge=xbiRURfjRpS5B8wvKrrM6vDdjdtxt4SkaCh64SpDA0c&code_challenge_method=S2563⤵
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc50946f8,0x7ffdc5094708,0x7ffdc50947184⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:24⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:34⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3100 /prefetch:84⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:14⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:14⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4260 /prefetch:84⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5208 /prefetch:84⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:84⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:84⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=5264 /prefetch:84⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.PageScreenshotProcessor --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5588 /prefetch:84⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:14⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2901466656507041779,14447761938463401086,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:14⤵PID:4296
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{724467AC-7A64-48E6-9AD6-0FCE5C04CF26}\MicrosoftEdge_X64_100.0.1185.39.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{724467AC-7A64-48E6-9AD6-0FCE5C04CF26}\MicrosoftEdge_X64_100.0.1185.39.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{724467AC-7A64-48E6-9AD6-0FCE5C04CF26}\EDGEMITMP_DBD7E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{724467AC-7A64-48E6-9AD6-0FCE5C04CF26}\EDGEMITMP_DBD7E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{724467AC-7A64-48E6-9AD6-0FCE5C04CF26}\EDGEMITMP_DBD7E.tmp\MSEDGE.PACKED.7Z" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:1188
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNDUuNDkiIHNoZWxsX3ZlcnNpb249IjEuMy4xNDUuNDkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QTJGRjhEODctNEM0OC00MzNCLTlCNEUtMTg0Qzc3MEFDNEIwfSIgdXNlcmlkPSJ7QTA1OTU5NDAtREMwQy00MzY5LUIyNDItRkRENDE2QUYzQzE3fSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntBOEEwMzBFQy05N0UzLTRFNzQtQkQyNS1DOEI2NjEzNTNCQkR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IkRBRFkiIHByb2R1Y3RfbmFtZT0iU3RhbmRhcmQgUEMgKFEzNSArIElDSDksIDIwMDkpIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMDAuMC4xMTg1LjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSItMSIgaW5zdGFsbGRhdGU9Ii0xIj48dXBkYXRlY2hlY2svPjxldmVudCBldmVudHR5cGU9IjkiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSI1IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc291cmNlX3VybF9pbmRleD0iMCIgZG93bmxvYWRlcj0iYml0cyIgdXJsPSJodHRwOi8vbXNlZGdlLmYudGx1LmRsLmRlbGl2ZXJ5Lm1wLm1pY3Jvc29mdC5jb20vZmlsZXN0cmVhbWluZ3NlcnZpY2UvZmlsZXMvZmM4M2EwMGItMDUxYi00Nzk2LWI4YjMtMGZkOTlhZWFjNzgxP1AxPTE2NTA1Njk1OTMmYW1wO1AyPTQwNCZhbXA7UDM9MiZhbXA7UDQ9QXV5ZlFaM0tFMjBzN1RLa2kwZVV6eGZLUk1qeTBaTGhHV2thcUhQMCUyYjVYcnJXcGJtVVFET0ZCSmU4MEg5Q1VtSmp2aDlYcklTbEpUbnpKJTJmeVMxRnJnJTNkJTNkIiBzZXJ2ZXJfaXBfaGludD0iIiBjZG5fY2lkPSItMSIgY2RuX2NjYz0iIiBkb3dubG9hZGVkPSIxMTk3NzU2NjQiIHRvdGFsPSIxMTk3NzU2NjQiIGRvd25sb2FkX3RpbWVfbXM9IjkyNDQiLz48ZXZlbnQgZXZlbnR0eXBlPSIxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzb3VyY2VfdXJsX2luZGV4PSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iNiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjIiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjE5NjYwOCIgc291cmNlX3VybF9pbmRleD0iMCIgZG9uZV9iZWZvcmVfb29iZV9jb21wbGV0ZT0iMCIgdXBkYXRlX2NoZWNrX3RpbWVfbXM9IjQ4NCIgZG93bmxvYWRfdGltZV9tcz0iMTU5NjMiIGRvd25sb2FkZWQ9IjExOTc3NTY2NCIgdG90YWw9IjExOTc3NTY2NCIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iMjQ2MTAiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe"C:\Program Files (x86)\Personify\ChromaCam\64\PsyFrameGrabberService.exe"1⤵
- Modifies data under HKEY_USERS
PID:5116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0e975e94-551b-b648-9576-042e9852e5ae}\psycamera.inf" "9" "47893badf" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "c:\program files (x86)\personify\chromacam\64"2⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4652
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\IMAGE\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:c14ce884f956a7e6:PsyCamera:8.35.56.591:psycamera," "47893badf" "0000000000000148"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:1360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5369bbc37cff290adb8963dc5e518b9b8
SHA1de0ef569f7ef55032e4b18d3a03542cc2bbac191
SHA2563d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3
SHA5124f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1
-
Filesize
160KB
MD59caf47e9999af93d8f49c0f5b62ac693
SHA1dd83435e30a88d2df849e4d4c8e3e671d545677a
SHA2568ce4842eb307265d3a1a43bb558925030ec5c399bd8a67ac0e3b9a9b55e1a64d
SHA5126aea29ec91f4e494917aa22331ae6cb62e4ebcf84b03abe562bad43993b5750388b35084cd179ef52c00799c88dad8cc658e31e3649cf866c228ccd5cb0118ea
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
209KB
MD5d7d541bd3dd228ad24dadfc4089b0704
SHA13fe7399267cf9bce649922d8ea0be9a5ffa77f67
SHA256cedade653a1e8d68809199c87a65a7a69fb360f67177262e651253cf0316b842
SHA512aca02d3bc55b7301257c56232b899145ad3266c210997d9eae664a0c6b6796e646a93db012e0a1b0d446cd64c55f916ab6f9a822b7b6b5faabfb75e3b5e3f011
-
Filesize
203KB
MD5d51ad58ff2e702fcf54e5580c3d5195b
SHA1cf65da922713ee8507fd7976ebf4786b83d194c4
SHA256e14aa9b45f08b41fa555568396b38c3cef3827ce46c95ac1c34b34fb65cb20a9
SHA512c9d40c6c22a9115162b34b24fe24f8da5c263b634067ace2822e6cc3206c01a546ed1df3dde09e31cdd86d0b175dddf696e9a5fea63987175c187428056f9e3d
-
Filesize
237KB
MD5b6e0a6427151dfaeca0fc7d84b6e9523
SHA1a03f31f6a8e0fc7f386993a8e8082c383b41a438
SHA256f70cddb720fb4e482704693af2fb2cd862c8ca324a13cb009d8ed30c95184f23
SHA5126a4c673c12a7b8970a6920b4d832fb42680f2b277a832f28f2c41d57821cf7e8a46f562ec6783b81b7eff71365af0f713230a454793396518578c5536d124c29
-
Filesize
4KB
MD56dd5bf0743f2366a0bdd37e302783bcd
SHA1e5ff6e044c40c02b1fc78304804fe1f993fed2e6
SHA25691d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5
SHA512f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
2.5MB
MD50c9199555050145619d3adb0b9c86d90
SHA1e290a258869bb45a52c3cec13cfe042c6cd411f7
SHA256eaca58832f1c5d40db402d8165997893be10c42f86b372ab253c66cdacef1cf7
SHA512ca71932635875224d1cf439294065db925d1c46609b529b589e1ee874f24f2a838a366fc083e42444f8e1ff0eba6ae0c8db6e43ced9eb6c15897d2308d8b2bd1
-
Filesize
27KB
MD5bbcba04b4368221736141f6da3dcc259
SHA154e0d0761995fadcb9d588a079fa1e4b472a968d
SHA256988be2b023768090eae11fddff079e31512edb975920f97c1a3e9bc8c42c0064
SHA512fa00c567de74a56223af838a89e6efc036de786c3e5513ad32d358693d3931873179007aa54b99f7be54ef5df8584f4fa7bc75dc13f2fdc92b4bedf36a7ef4dd
-
Filesize
23KB
MD5c2684f7568e44d9adb284f39e658af48
SHA1f15d1381d2b6cbe8b28d7778236f2e1f7cd5b93e
SHA2565cc5a2b40b4aa078dec600da52c2fd06b1c14ffb780fe7e928f815001aea1467
SHA51279056a8995daca7de8664a67fb557c8f2cf5c460501d149b0dfcde3e9b81f3fcd903c832c4406ac63fe82436cfa8d83e34eb1681cdd1da04d70314791bfb6d50
-
Filesize
25KB
MD5529a2715fb172ed53f691d7e9f162965
SHA1287ac0ef438bbfa46b6968cb9b49405ecbc17b65
SHA256db8e1c2616674f557cf12d12a72e69b270af942e507c6ec57b38b5945120a364
SHA512d3a62e277b0872c1371f5459f2ca35293ce6db27997462c7c7b70337cf9a08cd528d9063e4daa7124a32c47f8f68c10fae8eef8a6311872757b3b84f4c04b0b2
-
Filesize
27KB
MD5149dde1066fc706cad0e940a43712b8a
SHA105ece216582c89c53ddac41e0a45c3aa021d9a3f
SHA256536ac447c4716c40a44eb4d41b38da584d449e402ae2c009968bd276221d7bee
SHA512950f1023ac42855ece0fbd9816e6b64fb2df6e532278c59ee96594692de97cd6af069a57006ad9aad3bb2cbeb83ca95c13ae018e7692356ed622c851f648e089
-
Filesize
28KB
MD52d81bba9b5ac6c450186db93b761896e
SHA169669f5cb136ffc4bc783947027d5a620595eb45
SHA256768ba9c4c0e7e044f659b44e2e95f60b14ccd9a4898e2b5a7e60cc16a8595c36
SHA512774433c8c8bf2eff50218810180b4cf97fa67a9ac2cdf8215b16b0772039f14df541d9d9388db8176b98feec26ed7086be9eb2dc1eb6bcba350bd670e4767bba
-
Filesize
28KB
MD5d8f16d00982003aa07fd3016115576a7
SHA106a939ddbde4dc07285998433e707de1766c1ea9
SHA256013dd144e2e2bcf0d251e2a7868ae14f270258fea9d824cbe68ab45358796c6b
SHA5124db7aba83be3b847a103a6fe2a33e3daa94f487bdc081b5bddb2cbd8bef9e65ca60758e56be43281669df8d64a2218feb70271f41fa8c98d1be2315f6290f5e6
-
Filesize
28KB
MD5f2de31f06d14f1c3558841aa3d93151a
SHA1b9e855ac33d253f3dbfb0eecb014b5aaaeb7a60c
SHA25646b55cc5c0f5fce1a7ef57fe34494ce747a306b5e1e553c1938823c0c3051f7f
SHA512a9b941fec9faf702b6c156a03c58137f8a6517ece1d8ef710a11ce45a278f6435651c0c24c803b47acbc0a80f043e6f7edbabc34be5177d656b1003508e488c3
-
Filesize
28KB
MD5ce30eba6f600030af2efcb27ed5ad47e
SHA12a40a1dc547295f647426bd4cf374559dd4354b7
SHA2561483b44c5c7f9d6ad0918d0c0a8aae1b85f50825f919d2b26ef135adfc8a1be7
SHA512e4c1c6c6e8fac0be5180d54514f17a73eee78d0ddfbe600ad0e02817f7fc768759f75f12dadb1589e8840d967a26e40d97b09b223665feaaab81391cbeb2bff8
-
Filesize
27KB
MD5ef48ddaab5f139aafd2b35f203231301
SHA1d7d219608c9f439cdfb418da02df5ad5a4293a7d
SHA2561fdb779f5a2c94f7df2de51fc5135fe124cb019670b4b703c30b9b36ee42c3be
SHA5125d0e02d23bb31b490ee6812462817967405f7d0c6e7582bab648377dfc4f439410ed7e18f1c5dc3192e676be92554ebde4ee415c334f8051586131909b71f69e
-
Filesize
28KB
MD53ca0f0a8008fe7cffa6cc93d92046f1d
SHA1e37924cd9fda5c366ede61e12c491636e05f3377
SHA2561388ee7b0605fa5cba0fb433ac6f3d24aee1f7ddb9692e36ba60a9206fbe63f0
SHA512d89fce1537c428811326efaba2afcf9f2597944465335527c0ad097bbd71e652d4f96d1dbab3e5b1cdc493595d613730fe29a41822f05338a9b04a66bdc2a37f
-
Filesize
28KB
MD53dad7ac66afa4f629aa35aacbdb49a91
SHA1d8ce59f298d5b2b10653e68839fa3c556fe18cdd
SHA2567194606a0cc8cb328d47b05ceb5a518478224f1c95296ec3cbb711d8150dadb1
SHA512a0a6303f58058a6a3d9938c515f2c164bef5d00bd3fde4f2bceb19c82de8388fa14e8176e5ac1969f26422502c300a1a3d9993c182817da107ecf979301b7e0e
-
Filesize
27KB
MD5d31a2d3689673bb841f9d2184436b316
SHA12c9db8bd9918b077e4dcb6291f2c3f36100336db
SHA256518035972c761a8eb2aeba515bb00179b2b5bd2e295e4676d32c5e00c086b660
SHA51293e59283bbf0c9739602ea79e96456b09d785816c6385a547ac52a89a7396aa7ebf30b9d579764084105d054e9bcf7e111124e1a42a5eb24508f2afee5adacf6
-
Filesize
27KB
MD5a47c42123b2804b0af0c54467a4260ee
SHA1225cd3d53185737de9294820ba7e500215f1b250
SHA256337047b096d243f132bcc480b1fc3266729de6e1d5fd7ce0d55006c9f25aa904
SHA5121458e39db032d03256bd91bcb20d1495656e75eb05aa24d5fc976834e49a1ef3c748296d141baeda1e3c44d117d5f729c9eaac5285244d919eb41626cc23fb76
-
Filesize
27KB
MD59db6506250f98abf32cf3263636552b3
SHA1b1f063cc03054fa2d7a32c5a103bbc38e69e7fa6
SHA256b45a10453fc7fac054e70f9dfa83030b7828034a3e5102d3e71f0e6279e1aeeb
SHA512bea11ffb729b55d9e191ca4b32dadf68a37f8135f59bb214c122ebaffa935000c535b092c6ba2bf6b968fe53e7bc99a30a7c97eedd13edc0898ae76f1d185e3a
-
Filesize
29KB
MD5d3dec2f4af4eb79dabb174bf5532741a
SHA12f29f52498022fc82dc31da05f1029cc24134fa0
SHA25607eb6ee73be32957a3e0e53dec0c6230f1df7862827e0b7b4d5250f43880211c
SHA512bff2ea0507670aad62a619188f923cb58b76ab685284d97a753b7b8997da1c62908af0a57149ce57575800fa3764239fc9fef42b22f2aa67acadcf4b8c9fd946
-
Filesize
29KB
MD5567558de3be01745173565e5a304b8fd
SHA1cd5f663fbc5ad54f61a158ee5a4d2969bddec5aa
SHA2568f50d7401b44b5089465c34db4baf475f300be9683657ec6cbdbc87b9a5cdfe4
SHA5127348486abf0a5c7db19406f14f21eba5c75a68b1c0fe0c7414aa3e23ad875895bcc9055c17a08226286353aee4c67d2d8d483e893f274dd9a69cc4803232a05c
-
Filesize
26KB
MD546d4c79c666755374b2c23e43f1dfa4d
SHA1aa92ac32702bbc46dd4e5b4581eaa9c0d1d6c674
SHA256f137dbcb877c55e3173dc288a717847d4bc6fefde47f2850984cedd34b770837
SHA512d9a3da990bb09c96f5873723b39256fcff18919918361fdd7f34714b063f1e45d5d19d3daa3ec90ce1c4b2766742ecb5c4eebbc664fc68dc2524c1746aa2eaa4
-
Filesize
26KB
MD5cb78d1e912542bc2299cece8348c9f52
SHA170f35b8fc2ee00e8f47b67e8b3b8cc018cd4e29d
SHA2569b432eb71b7b94dbe7e9890ad112f1570a74221eb766d5b40c105daa03697b8c
SHA512fb58db15d3a258a85a3e93a8cc752ccc3d42655f9ab7d9730afa1ac2a301555f37f5a15daf10933d32b2c8e566acafa2a267ffc7103814e7fe924733c54ce9d6
-
Filesize
27KB
MD5ff961e92feefa84c388aeca7cdee9031
SHA10850fe7d29e29072fafce0ddfb0356fa568650f7
SHA2565f1f0d19b65dd369cbab64809a7c45715176a7333ea021d3e5d9fafe92bc2bb4
SHA512e81be328f4e9ad4e47c134ee448b4874f0d5e81a927150bcf4637e1eca2d20ca068b36fc1e97a294e73102ab5e4512d19fd2576e159859b4c4848a912c752947
-
Filesize
27KB
MD5a12ad07d08b8e5f1fbeb91fb23653d09
SHA12ad01ba02c6c4753a12cad3148192b3b1102bfa8
SHA256b133e5dcd50a0f8ad87ea6274d873d5fd6c1c8020867e0e3423aea5f737a77b5
SHA5120419d5391cf5b282ff98eade9a1a45a2203c1902f6abbaaffb4c417dc9a747d8827cd214d9c5e2a35ccae55cdf49466ee5978fc38fea79bf2a7945b749101042
-
Filesize
26KB
MD5143da718ea39b1a2a42962e6a2bd3970
SHA1cd67424ebf47d658a14c5a66ea3ae83b1417de3a
SHA256fdb4f9619dbc4da195bae06005d63d28d322a736922b2732bf147b3f8f4090c9
SHA512df55fc3f311bc990e353159a63eb143514d21cf4563a51a962d2a277338697d10f76549abd0f7ac788f3b1776a5afc76d5a29150f50f49ea665e92427f32111c
-
Filesize
27KB
MD53a2c967dfd4abd218b4372eb947b1be8
SHA115ec1ee1855a97acb2ceb1861822ba975b5ac1ad
SHA256186c3759bb19281652fd8aec7d6d880be76957bf3643511912e268f08f0b7ba7
SHA512f6292aaa9cf2a03e751494bb1b71e6db4e10ac4bea975f274d53dbcd2091e546916c3f7af6d2b5a0de80da432e69f360d99020ac8a72f7d1c9a7f267fe8d4645
-
Filesize
26KB
MD5b7c02449605cf2f23827e1563093900a
SHA1a774a4363f91cdaa3fc00c3f3f7f159366f65348
SHA256c59a30a2a711c5a2b0590e89f710a7e9e56e7676ac4e172b76a459a53e938557
SHA51288118e2f4b59e3f95f7c92d3a318c97e207ece6ec4ef0ce0c3186b5815dd1b5e8042b8f9c0b22509b9d3e95b4bf9686a16d250b7a81cc8bd447fc8e5b56b2661
-
Filesize
27KB
MD5f0ea857b6defcc66a48b080ed6deee02
SHA168d38516383169a7de9916f636767620a65eacbb
SHA2564c2466de5cd11570e9cecc8146b644f8031cf8a438b6474cd2991ef187823fa7
SHA512542b658d851319f1fd529516ff32c2b48bdf0ae4d6facc6de43a9ca6c91f4af696d76318ea8e9ae9e691e60853abd250374f125c71a61d50d4b4fdaf67446647
-
Filesize
28KB
MD5d798c5860e5822a57bef5a574343c1fe
SHA1774940f0d229e5a08e56a109baf464d4e98affa5
SHA2561e1445d34d1dc39c6f225416d4d794b272207ea712ef938796280b23bf3c326b
SHA5126aef37604473dbf0909fd509da7a290b45fb8a90addb0bdc8a479c92720d0f7affa042d2d793601a224534a58a62dc98f499cb5bfabc10152883243443e9f2f6
-
Filesize
29KB
MD5d9728e7bc603e9d78dfced409bbb397a
SHA15748b6d97bd291ccef5849c2493837cb50469c4b
SHA256002411816d867e54f11dd3ecd4b3be50980d2d2da624ce8b09746938e96999b6
SHA512e3494e992f11768157cda1fe431debfb7ea7bf2b1d7bb164b7bd7cf7fe809f55acfb61bf7bfbdd7ea8e0f78a7a55dc891dab4023d98884b924191e76e8bfa88a
-
Filesize
29KB
MD59c7e3ad929d07a70a337d209c4de2f9e
SHA15834bd8fe9bfde2446872435227d29922a8c1fbc
SHA256a26b9202d4ae3d01b2f621850cd27fa92d4364a49115e1f53af42db60f839d1b
SHA512dc5a7248aa282638d06c177de100efbf73cbb54a8dd2870eea6b7a339ce78de6ee694ee4eb6ba6312e812d13fb99acb9c4ffa71f9424e17e15dbe8872605bdea
-
Filesize
27KB
MD5f63747c12363c4cec898502cc203668d
SHA11c753c3d88fcb4df860ee7d00cb065ba7bf7717d
SHA256b66ce918ba14955e5b3e0811a9f119ce4127d7ab2904290f603eedbdeaa02516
SHA512b307e115ca7df16c14b099e7cb6cbd60c1d6279a0808c6c3549e685c7e4392197e7046d0f30ea30dc9d0d547a4d98be1a876b5f1341b061de9da5e936f062eb5
-
Filesize
29KB
MD5d9fb2c2eec6753829ecd696368a7188d
SHA1478da0c9ea9f195ca9e97775ea64932c535921b2
SHA2561d2c6c21dc3d0e035b6a52488643915443a59be6b59f8e9980fe141497f2b88e
SHA5129a3de0f81ad4bab68817f6625c21e01bee4d1a15fbc5aa291e71f939809f3a5ec4354f72ae0bcb9ae2cb0ace3f7bbcc62afed4de94781122502d8f14958c17d3
-
Filesize
27KB
MD5fd74ef8e7df2dd9633fc38c9049b387b
SHA1821db2f7eed3281bff0f667860ec15a895c25a7b
SHA256800ffe4b034a831cbcfa2f1bdfbf041bcde7d6634ac0b35d27134698bb933093
SHA512548ad532c1d9ae007e35d68e5a689c8121d7006feb5bfa63c591dcbba39c66cbc056936556716b69a05b06665bf069894dd76594d53a60e273522bd1572da52a
-
Filesize
27KB
MD5dfec9cb117ca9af2eef58d007fbc5e88
SHA134acdb96b4b866f4302d83b3bbe7306dffb7ed49
SHA256a5ed7005ba7e2a80086b541beb6ecba804b535d64c52569f4c1584398c9dd4d9
SHA512a3874401162f824b2cb9e5140c24fcda1e6262b9711f8ec6b18f70483de8681f411bfe3e39ee2010ef2819874efd253fb9e99f3511127ff5ca3d8f2c5ebeb283
-
Filesize
27KB
MD530954c1e44fac7823ea1398731708d1a
SHA10c28f075d1a217fb85ea3979cfdc3cb98e819e9d
SHA2563bb9535e16c08dc3f26900e9e7265e57db4f1c1d770b633d4453ee8d914dfc43
SHA51298cf06e5c6224ea32bd91e7c93d8ad95cdbb187269caa5baed1b25626122ae1ee6c5a42aabd23a93bf5b01a678ed247d7f161d6f66b4d84dee5bdbc6089f9ebb
-
Filesize
51KB
MD53ecc570dc4915744492119c7898f8313
SHA1d63fcc939f4135c7e18043691f44f28811a1aacb
SHA2569381e2256a570d09df531241ec1e7fa8844153900a7e5f924c899f5bdd16b272
SHA512f15ab619a95b421c0b6dbde68404d43461d40cd3515409865fd43012083e53f1ff7451cccd76c034f669b0320a33369fd588191094d031b9ef7cc6adc5921bb6
-
Filesize
51KB
MD53ecc570dc4915744492119c7898f8313
SHA1d63fcc939f4135c7e18043691f44f28811a1aacb
SHA2569381e2256a570d09df531241ec1e7fa8844153900a7e5f924c899f5bdd16b272
SHA512f15ab619a95b421c0b6dbde68404d43461d40cd3515409865fd43012083e53f1ff7451cccd76c034f669b0320a33369fd588191094d031b9ef7cc6adc5921bb6
-
Filesize
1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
1.7MB
MD56abf61dd5a6318d76a11ce43b4bee001
SHA1546fac452bb8892bed42b79b17dc0c86ca5ae7dc
SHA256389601cbd7e9256ce22348e3ceb2c33e39ddc7a8c75db897d269dc23b17ad11d
SHA512e454b2bb8ee2bf1355613afdf8389076fae5ffb8305ca2748cb05b597b54f039647e9aced03946dd6c0057305de80ca69db09cb2e539c6645fb2da6abf12ea7b
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
14KB
MD54814167aa1c7ec892e84907094646faa
SHA1a57a5ecbdfa9a8777a3c587f1acb02b783afc5ee
SHA25632dd7269abf5a0e5db888e307d9df313e87cef4f1b597965a9d8e00934658822
SHA512fb1f35e393997ecd2301f371892b59574ee6b666095c3a435336160481f6ef7ed5635c90ce5d2cf88e5ef4a5affb46cb841b7d17e7981bd6e998531193f5d067
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93
-
Filesize
42KB
MD5e47100b70748fc790ffe6299cdf7ef2d
SHA1ad2a9cd5f7c39121926b7c131816e7ba85aeead2
SHA256271d539fe130276189e0a32b8a0bc9f08f2d92f7e17f85d88726735f14ea6144
SHA51288452a9aeff453e7979df9240ab396cbc0c5d00efecda97df1e46f2ba1e9b5bfd990921e85d503beb4b35a1de7681390ba124eeeaf896f250717892ced133e93