Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 15:19
Static task
static1
Behavioral task
behavioral1
Sample
JITStarter.exe
Resource
win10v2004-20220414-en
General
-
Target
JITStarter.exe
-
Size
3.4MB
-
MD5
cae1c4080e16058ef2a3d4c008384711
-
SHA1
992e2c1cd65782919106e399169089a958feb1f0
-
SHA256
1cd870787398db4bae34397b76e572c31d48b93dd6dc733ee2e6f3e9177bc162
-
SHA512
3e039d1ae44d2257c4c6f5fa0e246dcbaf9f34bdb98b41c498c34e83fee3122f51b3ce9431288b6bb88f2bf31433121702b597a37b5e5782c56f31fb0aa4ceb8
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
JITStarter.exeElectron.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JITStarter.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Electron.exe -
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
Processes:
vcredist86.exevcredist86.exeVC_redist.x86.exevcredist64.exevcredist64.exeVC_redist.x64.exeNDP461-KB3102438-Web.exedxwebsetup.exedxwsetup.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exepid process 2340 vcredist86.exe 4136 vcredist86.exe 2200 VC_redist.x86.exe 4656 vcredist64.exe 4332 vcredist64.exe 1100 VC_redist.x64.exe 768 NDP461-KB3102438-Web.exe 3252 dxwebsetup.exe 4900 dxwsetup.exe 4136 infinst.exe 1976 infinst.exe 1868 infinst.exe 3964 infinst.exe 4080 infinst.exe 4836 infinst.exe 4164 infinst.exe 4420 infinst.exe 1732 infinst.exe 4964 infinst.exe 1100 infinst.exe 4480 infinst.exe 1204 infinst.exe 2660 infinst.exe 2376 infinst.exe 2372 infinst.exe 1820 infinst.exe 4984 infinst.exe 4444 infinst.exe 4188 infinst.exe 3192 infinst.exe 3620 infinst.exe 4980 infinst.exe 3652 infinst.exe 3008 infinst.exe 5076 infinst.exe 4996 infinst.exe 980 infinst.exe 1484 infinst.exe 4652 infinst.exe 4580 infinst.exe 868 infinst.exe 2684 infinst.exe 1172 infinst.exe 3728 infinst.exe 3300 infinst.exe 2224 infinst.exe 2852 infinst.exe 3244 infinst.exe 2484 infinst.exe 1976 infinst.exe 2140 infinst.exe 3768 infinst.exe 5008 infinst.exe 2360 infinst.exe 4080 infinst.exe 1716 infinst.exe 1856 infinst.exe 3136 infinst.exe 1732 infinst.exe 1088 infinst.exe 652 infinst.exe 724 infinst.exe 4068 infinst.exe 3272 infinst.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_10.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_2.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_0.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_9.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_8.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32 regsvr32.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Electron.exeJITStarter.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Electron.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Electron.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JITStarter.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JITStarter.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vcredist86.exevcredist64.exeJITStarter.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation vcredist86.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation vcredist64.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation JITStarter.exe -
Loads dropped DLL 64 IoCs
Processes:
vcredist86.exevcredist64.exedxwsetup.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exepid process 4136 vcredist86.exe 4332 vcredist64.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 1856 regsvr32.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 4900 dxwsetup.exe 3572 regsvr32.exe 4900 dxwsetup.exe 3464 regsvr32.exe 3464 regsvr32.exe 4900 dxwsetup.exe 2300 regsvr32.exe 4900 dxwsetup.exe 1572 regsvr32.exe 4900 dxwsetup.exe 4572 regsvr32.exe 4572 regsvr32.exe 4900 dxwsetup.exe 3816 regsvr32.exe 3816 regsvr32.exe 4900 dxwsetup.exe 1956 regsvr32.exe 4900 dxwsetup.exe -
Processes:
resource yara_rule behavioral1/memory/1908-130-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-131-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-132-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-133-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-135-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-136-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-137-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-149-0x0000000000620000-0x0000000000FC4000-memory.dmp themida behavioral1/memory/1908-276-0x0000000000620000-0x0000000000FC4000-memory.dmp themida -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
VC_redist.x86.exeVC_redist.x64.exedxwebsetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce VC_redist.x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{4d8dcf8c-a72a-43e1-9833-c12724db736e} = "\"C:\\ProgramData\\Package Cache\\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\\VC_redist.x86.exe\" /burn.runonce" VC_redist.x86.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13} = "\"C:\\ProgramData\\Package Cache\\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\\VC_redist.x64.exe\" /burn.runonce" VC_redist.x64.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
JITStarter.exeElectron.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JITStarter.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Electron.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
dxwsetup.exedescription ioc process File created C:\Windows\assembly\Desktop.ini dxwsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini dxwsetup.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dxwsetup.exedescription ioc process File opened (read-only) \??\M: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\F: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\E: dxwsetup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 64 IoCs
Processes:
infinst.exeinfinst.exedxwsetup.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exedescription ioc process File opened for modification C:\Windows\system32\x3daudio1_1.dll infinst.exe File created C:\Windows\system32\SET6C90.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET724E.tmp dxwsetup.exe File opened for modification C:\Windows\system32\D3DCompiler_36.dll infinst.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup32.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_d3dx9_39_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_d3dx10_34_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET61BE.tmp dxwsetup.exe File opened for modification C:\Windows\system32\d3dx10_42.dll infinst.exe File opened for modification C:\Windows\SysWOW64\SET8540.tmp dxwsetup.exe File opened for modification C:\Windows\system32\D3DCompiler_41.dll infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2007_d3dx10_36_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2905.0_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine2_2.dll dxwsetup.exe File created C:\Windows\system32\SET69B3.tmp infinst.exe File created C:\Windows\SysWOW64\SET8B34.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx10_42.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2005_d3dx9_26_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2005_d3dx9_25_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx11_42_x64.cab dxwsetup.exe File created C:\Windows\system32\SET7838.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\XAudio2_2.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET9D16.tmp infinst.exe File created C:\Windows\SysWOW64\SET864B.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET8DC8.tmp dxwsetup.exe File created C:\Windows\system32\SET91EB.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\D3DCompiler_41.dll dxwsetup.exe File opened for modification C:\Windows\system32\D3DX9_41.dll infinst.exe File opened for modification C:\Windows\SysWOW64\XAudio2_6.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET75C8.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\X3DAudio1_3.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET88DD.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine3_3.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET63F5.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET683D.tmp dxwsetup.exe File opened for modification C:\Windows\system32\xactengine3_3.dll infinst.exe File opened for modification C:\Windows\system32\SET8865.tmp infinst.exe File opened for modification C:\Windows\system32\D3DX9_42.dll infinst.exe File created C:\Windows\system32\SET9AC4.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_xaudio_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2010_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2010_xaudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine2_8.dll dxwsetup.exe File opened for modification C:\Windows\system32\d3dx10_34.dll infinst.exe File opened for modification C:\Windows\system32\SET9D36.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx9_43_x86.cab dxwsetup.exe File opened for modification C:\Windows\system32\SET588B.tmp infinst.exe File created C:\Windows\SysWOW64\SET61BE.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET6E95.tmp infinst.exe File created C:\Windows\system32\SET7952.tmp infinst.exe File created C:\Windows\SysWOW64\SET91B5.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET9601.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET9A9B.tmp dxwsetup.exe File created C:\Windows\system32\SET5C83.tmp infinst.exe File created C:\Windows\system32\SET6AFA.tmp infinst.exe File created C:\Windows\SysWOW64\SET7388.tmp dxwsetup.exe File created C:\Windows\system32\SET7693.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\xactengine3_7.dll dxwsetup.exe File created C:\Windows\system32\SET5B4A.tmp infinst.exe File created C:\Windows\SysWOW64\SET83E6.tmp dxwsetup.exe File opened for modification C:\Windows\system32\xactengine3_4.dll infinst.exe File opened for modification C:\Windows\SysWOW64\SET6E41.tmp dxwsetup.exe File opened for modification C:\Windows\system32\d3dx10_37.dll infinst.exe File opened for modification C:\Windows\system32\d3dx11_43.dll infinst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
JITStarter.exeElectron.exepid process 1908 JITStarter.exe 3216 Electron.exe -
Drops file in Windows directory 64 IoCs
Processes:
dxwsetup.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exeinfinst.exedescription ioc process File opened for modification C:\Windows\msdownld.tmp\AS57D066.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS582089.tmp dxwsetup.exe File created C:\Windows\assembly\tmp\EXYEUXLK\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57ED06.tmp\Nov2008_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57EDC1.tmp\Nov2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS57B59A.tmp\Dec2006_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5802E0.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS58131C.tmp dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS5767F7.tmp\Jun2008_d3dx9_38_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57CE24.tmp\Nov2007_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57DFB8.tmp\Jun2008_x3daudio_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57F4D6.tmp\Mar2009_d3dx9_41_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57EBFC.tmp\Nov2008_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2903.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS572764.tmp\dxupdate.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS573A5F.tmp\Apr2006_xinput_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5752BA.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS576F1B.tmp\Nov2008_d3dx9_40_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS573BE6.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57C440.tmp\Aug2007_d3dx10_35_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57D8E2.tmp\Mar2008_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57F4D6.tmp\Mar2009_d3dx9_41_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS575F6C.tmp\Nov2007_d3dx9_36_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57E45B.tmp\Aug2008_d3dx9_39_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS580EC6.tmp\Aug2009_xaudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS57CB16.tmp\Nov2007_d3dx10_36_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57E45B.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57F850.tmp\Mar2009_d3dx10_41_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS581195.tmp\Feb2010_x3daudio_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5804A5.tmp\Aug2009_d3dcsx_42_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS581F12.tmp\Jun2010_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS582C70.tmp dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.DirectDraw.dll dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS575460.tmp\Apr2007_d3dx9_33_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57D8E2.tmp\Mar2008_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57DDC4.tmp\Jun2008_d3dx10_38_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57FB3E.tmp\Mar2009_x3daudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS57B721.tmp\Feb2007_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57EF86.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5804A5.tmp\Aug2009_d3dcsx_42_x64.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS576680.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57C0F5.tmp\Jun2007_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57D6DE.tmp dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2908.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS57C0F5.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS57E1AC.tmp\Jun2008_xact_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS58151F.tmp\Feb2010_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS582471.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS575654.tmp\Apr2007_d3dx10_33_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS576F1B.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS579977.tmp\Feb2006_d3dx9_29_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS579977.tmp dxwsetup.exe File opened for modification C:\Windows\assembly\tmp\5ZY4HSUI\__AssemblyInfo__.ini dxwsetup.exe File created C:\Windows\assembly\tmp\T0SHZK8Q\Microsoft.DirectX.DirectInput.dll dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5772B5.tmp\Mar2009_d3dx9_41_x86.cab dxwsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Modifies registry class 64 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedxwsetup.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\ = "AudioReverb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\ = "XACT Engine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\ = "AudioVolumeMeter" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_1.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_7.dll" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32 dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\ = "AudioVolumeMeter" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\ = "XACT Engine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_7.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_6.dll" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
JITStarter.exeSetup.exeElectron.exepid process 1908 JITStarter.exe 1908 JITStarter.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 1808 Setup.exe 3216 Electron.exe 3216 Electron.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
vssvc.exesrtasks.exedescription pid process Token: SeBackupPrivilege 744 vssvc.exe Token: SeRestorePrivilege 744 vssvc.exe Token: SeAuditPrivilege 744 vssvc.exe Token: SeBackupPrivilege 1172 srtasks.exe Token: SeRestorePrivilege 1172 srtasks.exe Token: SeSecurityPrivilege 1172 srtasks.exe Token: SeTakeOwnershipPrivilege 1172 srtasks.exe Token: SeBackupPrivilege 1172 srtasks.exe Token: SeRestorePrivilege 1172 srtasks.exe Token: SeSecurityPrivilege 1172 srtasks.exe Token: SeTakeOwnershipPrivilege 1172 srtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dxwsetup.exepid process 4900 dxwsetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
JITStarter.execmd.exevcredist86.exevcredist86.execmd.exevcredist64.exevcredist64.execmd.execmd.exedxwebsetup.exedxwsetup.exedescription pid process target process PID 1908 wrote to memory of 4996 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 4996 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 4996 1908 JITStarter.exe cmd.exe PID 4996 wrote to memory of 2340 4996 cmd.exe vcredist86.exe PID 4996 wrote to memory of 2340 4996 cmd.exe vcredist86.exe PID 4996 wrote to memory of 2340 4996 cmd.exe vcredist86.exe PID 2340 wrote to memory of 4136 2340 vcredist86.exe vcredist86.exe PID 2340 wrote to memory of 4136 2340 vcredist86.exe vcredist86.exe PID 2340 wrote to memory of 4136 2340 vcredist86.exe vcredist86.exe PID 4136 wrote to memory of 2200 4136 vcredist86.exe VC_redist.x86.exe PID 4136 wrote to memory of 2200 4136 vcredist86.exe VC_redist.x86.exe PID 4136 wrote to memory of 2200 4136 vcredist86.exe VC_redist.x86.exe PID 1908 wrote to memory of 3660 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 3660 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 3660 1908 JITStarter.exe cmd.exe PID 3660 wrote to memory of 4656 3660 cmd.exe vcredist64.exe PID 3660 wrote to memory of 4656 3660 cmd.exe vcredist64.exe PID 3660 wrote to memory of 4656 3660 cmd.exe vcredist64.exe PID 4656 wrote to memory of 4332 4656 vcredist64.exe vcredist64.exe PID 4656 wrote to memory of 4332 4656 vcredist64.exe vcredist64.exe PID 4656 wrote to memory of 4332 4656 vcredist64.exe vcredist64.exe PID 4332 wrote to memory of 1100 4332 vcredist64.exe VC_redist.x64.exe PID 4332 wrote to memory of 1100 4332 vcredist64.exe VC_redist.x64.exe PID 4332 wrote to memory of 1100 4332 vcredist64.exe VC_redist.x64.exe PID 1908 wrote to memory of 4404 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 4404 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 4404 1908 JITStarter.exe cmd.exe PID 4404 wrote to memory of 768 4404 cmd.exe NDP461-KB3102438-Web.exe PID 4404 wrote to memory of 768 4404 cmd.exe NDP461-KB3102438-Web.exe PID 4404 wrote to memory of 768 4404 cmd.exe NDP461-KB3102438-Web.exe PID 1908 wrote to memory of 8 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 8 1908 JITStarter.exe cmd.exe PID 1908 wrote to memory of 8 1908 JITStarter.exe cmd.exe PID 8 wrote to memory of 3252 8 cmd.exe dxwebsetup.exe PID 8 wrote to memory of 3252 8 cmd.exe dxwebsetup.exe PID 8 wrote to memory of 3252 8 cmd.exe dxwebsetup.exe PID 3252 wrote to memory of 4900 3252 dxwebsetup.exe dxwsetup.exe PID 3252 wrote to memory of 4900 3252 dxwebsetup.exe dxwsetup.exe PID 3252 wrote to memory of 4900 3252 dxwebsetup.exe dxwsetup.exe PID 4900 wrote to memory of 4136 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4136 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1976 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1976 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1868 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1868 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 3964 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 3964 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4080 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4080 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4836 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4836 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4164 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4164 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1856 4900 dxwsetup.exe regsvr32.exe PID 4900 wrote to memory of 1856 4900 dxwsetup.exe regsvr32.exe PID 4900 wrote to memory of 4420 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4420 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1732 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1732 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 3572 4900 dxwsetup.exe regsvr32.exe PID 4900 wrote to memory of 3572 4900 dxwsetup.exe regsvr32.exe PID 4900 wrote to memory of 4964 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 4964 4900 dxwsetup.exe infinst.exe PID 4900 wrote to memory of 1100 4900 dxwsetup.exe infinst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JITStarter.exe"C:\Users\Admin\AppData\Local\Temp\JITStarter.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C vcredist86.exe /install /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vcredist86.exevcredist86.exe /install /quiet /norestart3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{F5DA595B-043C-4A46-B779-2D6E068036BF}\.cr\vcredist86.exe"C:\Windows\Temp\{F5DA595B-043C-4A46-B779-2D6E068036BF}\.cr\vcredist86.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist86.exe" -burn.filehandle.attached=556 -burn.filehandle.self=552 /install /quiet /norestart4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{DF582F07-0F01-46C6-A3AD-1E03770E9C62}\.be\VC_redist.x86.exe"C:\Windows\Temp\{DF582F07-0F01-46C6-A3AD-1E03770E9C62}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{2216EAE3-F491-4DC5-844F-14CA4A707A4C} {A3EF3E55-8C33-441F-9C02-86771773962B} 41365⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe/C vcredist64.exe /install /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vcredist64.exevcredist64.exe /install /quiet /norestart3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{F1FA6820-F430-439F-9B03-62CA3245F5DC}\.cr\vcredist64.exe"C:\Windows\Temp\{F1FA6820-F430-439F-9B03-62CA3245F5DC}\.cr\vcredist64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vcredist64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet /norestart4⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\Temp\{062384C8-E983-4104-B08A-47C1B5D2C144}\.be\VC_redist.x64.exe"C:\Windows\Temp\{062384C8-E983-4104-B08A-47C1B5D2C144}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{D9A058B6-1EED-437A-BFCB-5C4DA4FD86FC} {490F229B-476C-46AA-9677-CC2AEED7416A} 43325⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\cmd.exe/C NDP461-KB3102438-Web.exe /q /norestart2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\NDP461-KB3102438-Web.exeNDP461-KB3102438-Web.exe /q /norestart3⤵
- Executes dropped EXE
-
C:\5c2950f54909a09ba476bf627e\Setup.exeC:\5c2950f54909a09ba476bf627e\\Setup.exe /q /norestart /x86 /x64 /web4⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe/C dxwebsetup.exe /Q2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exedxwebsetup.exe /Q3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe /windowsupdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_24_x64.inf5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_25_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_26_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_27_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_28_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_29_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_0.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_30_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_1_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_1.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe xinput1_1_x64.inf, Install_Driver5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_2_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_2.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe xinput1_2_x64.inf, Install_Driver5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_3_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_3.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_31_x64.inf5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_4_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_4.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_32_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_00_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_5_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_5.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_6_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_6.dll5⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_33_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_33_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_7_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_7.dll5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_34_x64.inf5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_34_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_8_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_8.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_35_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_35_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_9_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_9.dll5⤵
- Registers COM server for autorun
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx9_36_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_36_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_2_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT2_10_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_10.dll5⤵
- Registers COM server for autorun
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_37_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_37_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_3_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_0_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_0.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_0_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_0.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_38_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_38_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_4_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_1_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_1.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_1_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_1.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_39_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_39_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_2_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_2.dll5⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_2_x64.inf5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_2.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_5_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_3_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_3.dll5⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_3_x64.inf5⤵
- Executes dropped EXE
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_3.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_40_x64.inf5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_40_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_6_x64.inf5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_4_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_4.dll5⤵
- Registers COM server for autorun
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_4_x64.inf5⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_4.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_41_x64.inf5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_41_x64.inf5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_42_x64.inf5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_42_x64.inf5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx11_42_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dcsx_42_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DCompiler_42_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_5_x64.inf5⤵
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_5.dll5⤵
- Registers COM server for autorun
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_5_x64.inf5⤵
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_5.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe X3DAudio1_7_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_6_x64.inf5⤵
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_6.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_6_x64.inf5⤵
- Drops file in System32 directory
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_6.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DX9_43_x64.inf5⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx10_43_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dx11_43_x64.inf5⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe d3dcsx_43_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe D3DCompiler_43_x64.inf5⤵
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XACT3_7_x64.inf5⤵
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_7.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exe XAudio2_7_x64.inf5⤵
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_7.dll5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\Electron.exe"C:\Users\Admin\AppData\Local\Temp\Electron.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_24.dllFilesize
3.4MB
MD5b165df72e13e6af74d47013504319921
SHA1c45b192cf8904b7579bbc26c799aa7ffa5cbb1d4
SHA2561ec422bd6421c741eef57847260967f215913649901e21dd9c46eb1b3bb10906
SHA512859b6cd538735e5cc1c44f63d66b25588ad1ad32202cae606ff95b8c4a80f6a66db9ef7c5d43820010de9334b8bbbfb079939ce89ba0b760f5d651d7fa8268ed
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_24_x64.infFilesize
679B
MD52c4e850789bf9606aa4783cd9c26099a
SHA1036ee1c9ce3b8c495b3d155fe83e54c00a2611d4
SHA256f02bd6bb0ca1ed41698def1465c05f5b47ca459f886647f2d84f85c5c09dad9c
SHA512f09cb85eb7024c89024d12dd40021d1df046bb825a985bee1cb164a5c026693325bc5d64491702731ed5cb71b5af7eef34f8a922bee6d9d5881ff113dce23d21
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_25.dllFilesize
3.6MB
MD54c56e7c5b2a61353e534c7d15d05856d
SHA1e6e0a59a1e8217ae06cda29942537bc4be25d5a1
SHA25610b09474bfe4e2bb395472628646bc5f353fbfbec976575c45eeff49984ebaa6
SHA5126f630ea0764b4551d80a96f6c2b9391ed5741f14431eec951699c0e42b9434a45841d71bea5576b285cc20d38fd082b4cfc8062e4aa61f80aed9e57869cdd5d2
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_25_x64.infFilesize
667B
MD5fbed164855ae10f4c2d4eb238f414e6a
SHA17c3ec7759a23e77242bdc70c8033c013f2c794d6
SHA2569af2752d59fc38dd26d30769132a0887ff4123269c0dc4406f5107295e69c7c1
SHA51268e7d441aa0b842329f63ed34bb392d1582b635eee1bd1c8a797e9a59303fc85b0d842de0fd29d88fa3c8ac0bb6d858671101633161487d6353e73c862fb228d
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_26.dllFilesize
3.6MB
MD544f5c5e27d6825e4e62420bc29b8b533
SHA1046455294e199af99c7c2d9174d25b230e6fd0e6
SHA25630b06dbbd202494bae3b87487e7273adcffd17a9d2c29977030fde0570aa841b
SHA5120c9adca329c386cb2caf0f36d672ba326929f02c29748b13188bb7ade3fbec9131ce86a6bf1b3064a2fbb8de6b8adc34208f667df31c5db182918e79744a830b
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_26_x64.infFilesize
667B
MD5831fb8a4394d256a5d7c15c16757912c
SHA1961d7274de32808c4dce971d943ddd79a12e8d49
SHA2566c152334efa5b011a44f160a23a5c58b66f3bcebbf6c4bc0722a526d36699a4b
SHA51240f3d40cb40bd887ffa15a5fc60468e48f06bb1704d19061f9b51a9e2c15ab363644aac4618276910f6fc8d90f1083931916a9943306dcf736fc72feba2385c8
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_27.dllFilesize
3.6MB
MD5914c3237e4d145a18dcd1d0d4c8659e1
SHA132503c8f8d80551c896bc2dbf2c8ae3c490f0ec4
SHA256f9dd288c9895973f8db1856d172779041c6dee173ad1ef53b1727fc85cb6b75f
SHA512c760b5b0b5507da8f2336b2b0625f344f28fac33da16a7d8771a122b0ba54ebf5d2a2f702f4ebb83ded746f38d63abd378a9aa3b3e50579fab7c047fe38e2c02
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\d3dx9_27_x64.infFilesize
667B
MD5925202b48a83647982cb0d55ab10668d
SHA1b04a29859288545a3f8f9daf6aa39bb7a8b4b59c
SHA2566f56c5be97e703584dd832f35ebdc78c6aeb07cc9df155d47ed9903142086488
SHA51272b6b4b951d04ecee1c4ea613734113b864a542dcc554e86e8d7b7fa2b0d05a1e7623051ca0809c3e934cf28cadca54acb76ad515f71a263ffd17c3872677b69
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\dxupdate.dllFilesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\dxupdate.dllFilesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
56KB
MD5afd73a6c2e1172e4075c8b37816eb391
SHA1eceaeaca967c9ac3239f65b4d4f75d994dabd7ee
SHA256ea544793b661304f31f18e9d107a4b4b46bd198d806f6366870746fe52e01df9
SHA5125c313c81808c664f056ccd64784e607439ed45874fe322afdf690aba6d8dc54c2b54e42f69ce003bd0aefd0ebe5518f102f846aaa96254d3218d62b4f5dc463b
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
59KB
MD544f9c211701098d36dde44c5cf3afd63
SHA1c020bb7dfb5932c5cbe19ca5d9feffde05781134
SHA256d636d29f6019bcc232e62553728871097097aae05a6426bb86af15720de2e0e6
SHA512b8aa96c4b8861b76f0c5c606f5458cc1e06e6e2ecd684f9ebde9e68a4d5057e84413816d78f88525fef63f4863a4b498c6d8cbc74faf8c555029dde7e34dec5a
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
61KB
MD5def5caad8a452d6515bd40df6dd6b51f
SHA1c26a793ef0a117b9b960caaabf31fef6036576de
SHA25634df5a253007edd15d14f28a333bac638fe961f0f3941b192d7a6a760c2635fe
SHA5122f3984f126de1c89cb815e00587d41c9bc32358530d9d2931ef917f6d3a45422a80caf6bcbb1615a61e51d7cb81532795cafefdfc39f9dab7c2f7d70cc22a1bf
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\infinst.exeFilesize
65KB
MD560db6abbe4d4f22d87cd15c9bdae79e7
SHA14dc25047507cb28a0855c8c2f5bf11fb0dbf1366
SHA25610e420d85c6d2905d9ca076681c3b1d648bc1b5b3893c8eb5ff420d2b964f0cb
SHA512846fc61367cc3fff2c0516c1872f1380e120684853fa9e4a6d077f94c83c99dfdc9f3d2cf7de587fe3988a3224b7ea7e0f27c7a76e11c5a6daaf03ed15864476
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
C:\Users\Admin\AppData\Local\Temp\DX2EAD.tmp\microsoft.directx.direct3dx.dllFilesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup.dllFilesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup32.dllFilesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxupdate.dllFilesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxupdate.dllFilesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.cifFilesize
56KB
MD57b1fbe9f5f43b2261234b78fe115cf8e
SHA1dd0f256ae38b4c4771e1d1ec001627017b7bb741
SHA256762ff640013db2bd4109d7df43a867303093815751129bd1e33f16bf02e52cce
SHA512d21935a9867c0f2f7084917c79fbb1da885a1bfd4793cf669ff4da8c777b3a201857250bfb7c2b616625a8d3573c68395d210446d2c284b41cf09cc7cbb07885
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeFilesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeFilesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.infFilesize
477B
MD5ad8982eaa02c7ad4d7cdcbc248caa941
SHA14ccd8e038d73a5361d754c7598ed238fc040d16b
SHA256d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00
SHA5125c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28
-
C:\Users\Admin\AppData\Local\Temp\NDP461-KB3102438-Web.exeFilesize
1.4MB
MD54d1bb86d0eee168e1da91a36350c1c21
SHA1ee88b05232f43b517d4a368f7ee5065cde7f67fa
SHA256e10c2a36c5013ee83815fcc38963ae3e5c4afd7ffe770e817322fe366bdef6e1
SHA51297c4dd638e2e0324d60bdd1d7be85603edbf969898469a524fb271eba5e22b78ca67db1f568f5c45393381f1e76408c366ad4a68a7bb00e23d1fb820e67de99e
-
C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exeFilesize
285KB
MD5bcbb7c0cd9696068988953990ec5bd11
SHA13c8243734cf43dd7bb2332ba05b58ccacfa4377c
SHA25634f64699d4830145cae69bd40115b1f326e70fc6a98456cb3df996d947dddca4
SHA512551a2e3aa5fc7c0e79c3bd7c5333df5f1920ea83fe35b99adbbe865ea926fa772d72709bde2ea8f2685f4914cd96ff7b5b6f894f9b99f1120c2abe89c390a786
-
C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exeFilesize
285KB
MD5bcbb7c0cd9696068988953990ec5bd11
SHA13c8243734cf43dd7bb2332ba05b58ccacfa4377c
SHA25634f64699d4830145cae69bd40115b1f326e70fc6a98456cb3df996d947dddca4
SHA512551a2e3aa5fc7c0e79c3bd7c5333df5f1920ea83fe35b99adbbe865ea926fa772d72709bde2ea8f2685f4914cd96ff7b5b6f894f9b99f1120c2abe89c390a786
-
C:\Users\Admin\AppData\Local\Temp\vcredist64.exeFilesize
24.1MB
MD5b04c99520edb36613461b3c87c5c8e19
SHA1839e382ebeef87003fce57969a79bd58bb264192
SHA256a9f5d2eaf67bf0db0178b6552a71c523c707df0e2cc66c06bfbc08bdc53387e7
SHA512e320f25dac00fe18b825c1c154c8a5b8f571529aa411a9cdcc510b8b931b98bec17b550ed425aa93fbba6c96b9d3630c606264c03f117aa1d1df09c7b0f20045
-
C:\Users\Admin\AppData\Local\Temp\vcredist64.exeFilesize
24.1MB
MD5b04c99520edb36613461b3c87c5c8e19
SHA1839e382ebeef87003fce57969a79bd58bb264192
SHA256a9f5d2eaf67bf0db0178b6552a71c523c707df0e2cc66c06bfbc08bdc53387e7
SHA512e320f25dac00fe18b825c1c154c8a5b8f571529aa411a9cdcc510b8b931b98bec17b550ed425aa93fbba6c96b9d3630c606264c03f117aa1d1df09c7b0f20045
-
C:\Users\Admin\AppData\Local\Temp\vcredist86.exeFilesize
13.1MB
MD51141e831c061eb2537376ec9994cf496
SHA1230825953c24344cfb3b1d465f6f50364624b4a6
SHA256ac75a82d873e6b6f98b1d293042380764d7d263c43438e50d564fa58c9f891c2
SHA512f7f4c7dd0690bfec092ecd7882e6c7b5bd65e9aba426c777bdf505c3c4eaeb7c479e33f1a29a64cf923903220117e035cdfd3a3873bff8d71e8edbcb7dcd58c8
-
C:\Users\Admin\AppData\Local\Temp\vcredist86.exeFilesize
13.1MB
MD51141e831c061eb2537376ec9994cf496
SHA1230825953c24344cfb3b1d465f6f50364624b4a6
SHA256ac75a82d873e6b6f98b1d293042380764d7d263c43438e50d564fa58c9f891c2
SHA512f7f4c7dd0690bfec092ecd7882e6c7b5bd65e9aba426c777bdf505c3c4eaeb7c479e33f1a29a64cf923903220117e035cdfd3a3873bff8d71e8edbcb7dcd58c8
-
C:\Windows\DirectX.logFilesize
315B
MD54020cd973c3088fdd68d6730e11b4caa
SHA1c18d2255f3f30690b367de39548559a4a976e784
SHA2566ef4338352290acb4f4945032958e39776bcd7a64fb7dd9a403eb33485cc82c8
SHA5123d905e617e04ac7ff3f6137153cd3fe1096032979a2316169ef9aa7dd7fffa979969d545a1fad5999b07b7f760b480aff9ecd5e2d546bbb7ca5aae007446eae9
-
C:\Windows\DirectX.logFilesize
511B
MD5282c3e317f3041db5216b511d27e6df2
SHA1a3426a953124ad9c8f370712f3c6e82f662f0312
SHA2566362dbfe61ccb5dd6e613564ad9817289e85bcad046c1e174940182d0ce60509
SHA512729b21ff8b8c8c7d540ab257bb2c46dead590476dc5c0b4e7528a74e1542577d7a771fd62c10ee4a2803dd8175c3fcd14944f3515ddc4d882199ccba8ac1b14b
-
C:\Windows\DirectX.logFilesize
707B
MD56a5ea8264f4a89897b5de000a3ea348e
SHA10e0ef63e143b5c850e1f485b288531885607361e
SHA256c70f4617d2e235510a7cd6cb4850533cac26fcc644312c03cf10918481939c6d
SHA512fc0854062625958578fc281290f4f33c348421b89555b68228bed314512867f5b85d45ac7027ccc7f7a06d3c82b5d1a2592e3f411578d5db9b288dbd34e77cb4
-
C:\Windows\SysWOW64\directx\websetup\dsetup.dllFilesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
C:\Windows\SysWOW64\directx\websetup\dsetup32.dllFilesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
C:\Windows\Temp\{062384C8-E983-4104-B08A-47C1B5D2C144}\.ba\wixstdba.dllFilesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
C:\Windows\Temp\{062384C8-E983-4104-B08A-47C1B5D2C144}\.be\VC_redist.x64.exeFilesize
634KB
MD53cfb3ae4a227ece66ce051e42cc2df00
SHA10a2bb202c5ce2aa8f5cda30676aece9a489fd725
SHA25654fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf
SHA51260d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1
-
C:\Windows\Temp\{062384C8-E983-4104-B08A-47C1B5D2C144}\.be\VC_redist.x64.exeFilesize
634KB
MD53cfb3ae4a227ece66ce051e42cc2df00
SHA10a2bb202c5ce2aa8f5cda30676aece9a489fd725
SHA25654fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf
SHA51260d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1
-
C:\Windows\Temp\{DF582F07-0F01-46C6-A3AD-1E03770E9C62}\.ba\wixstdba.dllFilesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
C:\Windows\Temp\{DF582F07-0F01-46C6-A3AD-1E03770E9C62}\.be\VC_redist.x86.exeFilesize
633KB
MD5a9993e4a107abf84e456b796c65a9899
SHA15852b1acacd33118bce4c46348ee6c5aa7ad12eb
SHA256dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc
SHA512d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9
-
C:\Windows\Temp\{DF582F07-0F01-46C6-A3AD-1E03770E9C62}\.be\VC_redist.x86.exeFilesize
633KB
MD5a9993e4a107abf84e456b796c65a9899
SHA15852b1acacd33118bce4c46348ee6c5aa7ad12eb
SHA256dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc
SHA512d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9
-
C:\Windows\Temp\{F1FA6820-F430-439F-9B03-62CA3245F5DC}\.cr\vcredist64.exeFilesize
634KB
MD53cfb3ae4a227ece66ce051e42cc2df00
SHA10a2bb202c5ce2aa8f5cda30676aece9a489fd725
SHA25654fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf
SHA51260d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1
-
C:\Windows\Temp\{F1FA6820-F430-439F-9B03-62CA3245F5DC}\.cr\vcredist64.exeFilesize
634KB
MD53cfb3ae4a227ece66ce051e42cc2df00
SHA10a2bb202c5ce2aa8f5cda30676aece9a489fd725
SHA25654fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf
SHA51260d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1
-
C:\Windows\Temp\{F5DA595B-043C-4A46-B779-2D6E068036BF}\.cr\vcredist86.exeFilesize
633KB
MD5a9993e4a107abf84e456b796c65a9899
SHA15852b1acacd33118bce4c46348ee6c5aa7ad12eb
SHA256dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc
SHA512d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9
-
C:\Windows\Temp\{F5DA595B-043C-4A46-B779-2D6E068036BF}\.cr\vcredist86.exeFilesize
633KB
MD5a9993e4a107abf84e456b796c65a9899
SHA15852b1acacd33118bce4c46348ee6c5aa7ad12eb
SHA256dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc
SHA512d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9
-
memory/8-165-0x0000000000000000-mapping.dmp
-
memory/220-263-0x0000000000000000-mapping.dmp
-
memory/632-268-0x0000000000000000-mapping.dmp
-
memory/768-163-0x0000000000000000-mapping.dmp
-
memory/868-266-0x0000000000000000-mapping.dmp
-
memory/980-261-0x0000000000000000-mapping.dmp
-
memory/1100-229-0x0000000000000000-mapping.dmp
-
memory/1100-159-0x0000000000000000-mapping.dmp
-
memory/1172-269-0x0000000000000000-mapping.dmp
-
memory/1204-234-0x0000000000000000-mapping.dmp
-
memory/1484-262-0x0000000000000000-mapping.dmp
-
memory/1572-238-0x0000000000000000-mapping.dmp
-
memory/1732-226-0x0000000000000000-mapping.dmp
-
memory/1820-240-0x0000000000000000-mapping.dmp
-
memory/1856-224-0x0000000000000000-mapping.dmp
-
memory/1868-210-0x0000000000000000-mapping.dmp
-
memory/1908-276-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-150-0x0000000076F60000-0x0000000077103000-memory.dmpFilesize
1.6MB
-
memory/1908-136-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-135-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-130-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-277-0x0000000076F60000-0x0000000077103000-memory.dmpFilesize
1.6MB
-
memory/1908-134-0x0000000076F60000-0x0000000077103000-memory.dmpFilesize
1.6MB
-
memory/1908-137-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-133-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-132-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-149-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1908-131-0x0000000000620000-0x0000000000FC4000-memory.dmpFilesize
9.6MB
-
memory/1956-252-0x0000000000000000-mapping.dmp
-
memory/1968-275-0x0000000000000000-mapping.dmp
-
memory/1976-205-0x0000000000000000-mapping.dmp
-
memory/2200-146-0x0000000000000000-mapping.dmp
-
memory/2224-272-0x0000000000000000-mapping.dmp
-
memory/2300-235-0x0000000000000000-mapping.dmp
-
memory/2332-273-0x0000000000000000-mapping.dmp
-
memory/2340-139-0x0000000000000000-mapping.dmp
-
memory/2372-239-0x0000000000000000-mapping.dmp
-
memory/2376-237-0x0000000000000000-mapping.dmp
-
memory/2624-257-0x0000000000000000-mapping.dmp
-
memory/2624-258-0x0000000000910000-0x0000000000979000-memory.dmpFilesize
420KB
-
memory/2624-259-0x0000000000911000-0x000000000096C000-memory.dmpFilesize
364KB
-
memory/2660-236-0x0000000000000000-mapping.dmp
-
memory/2684-267-0x0000000000000000-mapping.dmp
-
memory/2852-274-0x0000000000000000-mapping.dmp
-
memory/3008-255-0x0000000000000000-mapping.dmp
-
memory/3192-250-0x0000000000000000-mapping.dmp
-
memory/3216-278-0x0000000000190000-0x00000000017BE000-memory.dmpFilesize
22.2MB
-
memory/3252-166-0x0000000000000000-mapping.dmp
-
memory/3300-271-0x0000000000000000-mapping.dmp
-
memory/3464-231-0x00000000020D0000-0x000000000212A000-memory.dmpFilesize
360KB
-
memory/3464-230-0x0000000000000000-mapping.dmp
-
memory/3464-232-0x00000000020D1000-0x000000000211F000-memory.dmpFilesize
312KB
-
memory/3572-227-0x0000000000000000-mapping.dmp
-
memory/3620-251-0x0000000000000000-mapping.dmp
-
memory/3652-254-0x0000000000000000-mapping.dmp
-
memory/3660-151-0x0000000000000000-mapping.dmp
-
memory/3728-270-0x0000000000000000-mapping.dmp
-
memory/3816-247-0x0000000002140000-0x00000000021A4000-memory.dmpFilesize
400KB
-
memory/3816-248-0x0000000002141000-0x0000000002198000-memory.dmpFilesize
348KB
-
memory/3816-246-0x0000000000000000-mapping.dmp
-
memory/3964-215-0x0000000000000000-mapping.dmp
-
memory/4080-220-0x0000000000000000-mapping.dmp
-
memory/4136-200-0x0000000000000000-mapping.dmp
-
memory/4136-142-0x0000000000000000-mapping.dmp
-
memory/4164-223-0x0000000000000000-mapping.dmp
-
memory/4188-249-0x0000000000000000-mapping.dmp
-
memory/4332-155-0x0000000000000000-mapping.dmp
-
memory/4404-162-0x0000000000000000-mapping.dmp
-
memory/4420-225-0x0000000000000000-mapping.dmp
-
memory/4444-245-0x0000000000000000-mapping.dmp
-
memory/4480-233-0x0000000000000000-mapping.dmp
-
memory/4572-244-0x00000000020B1000-0x0000000002108000-memory.dmpFilesize
348KB
-
memory/4572-242-0x0000000000000000-mapping.dmp
-
memory/4572-243-0x00000000020B0000-0x0000000002114000-memory.dmpFilesize
400KB
-
memory/4580-265-0x0000000000000000-mapping.dmp
-
memory/4652-264-0x0000000000000000-mapping.dmp
-
memory/4656-152-0x0000000000000000-mapping.dmp
-
memory/4836-222-0x0000000000000000-mapping.dmp
-
memory/4900-169-0x0000000000000000-mapping.dmp
-
memory/4964-228-0x0000000000000000-mapping.dmp
-
memory/4980-253-0x0000000000000000-mapping.dmp
-
memory/4984-241-0x0000000000000000-mapping.dmp
-
memory/4996-138-0x0000000000000000-mapping.dmp
-
memory/4996-260-0x0000000000000000-mapping.dmp
-
memory/5076-256-0x0000000000000000-mapping.dmp