Analysis
-
max time kernel
389s -
max time network
392s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-09-2022 16:45
Static task
static1
Behavioral task
behavioral1
Sample
Multiple_Roblox.exe
Resource
win10-20220812-en
General
-
Target
Multiple_Roblox.exe
-
Size
1.1MB
-
MD5
e9394b5a2bb4c120ddc7d3b5c93d9d37
-
SHA1
057cddd651d813b8aa2cac6e75362d689971c1c0
-
SHA256
859923d0cc1ba9258c4409fd194d6f166c23b988a9d4a490d3f14d9dcb74f353
-
SHA512
6b235767a5c464b34c5cdf4aaead6388571f9cfe16c464372b2f9635d5e19bae2a7ccc8a77cf04d81518afbe2e4120b942ce881d2e207b03a3b13f724f03eec0
-
SSDEEP
6144:ICVrw4RVJsp0oFP+dkM+i1g0UkCVrw4RVJsp0oFP+dkM+i1g0UdCVrw4RAJsp0oV:IgWCEEgWCE9gnCE
Malware Config
Extracted
C:\Program Files\WinRAR\Rar.txt
Extracted
C:\Program Files\WinRAR\WhatsNew.txt
https
http
http://weirdsgn.com
http://icondesignlab.com
https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar
Extracted
redline
62.204.41.141:24758
-
auth_value
ea069d64c780fc5379eeb0792909ac77
Signatures
-
Modifies system executable filetype association 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/101616-221-0x0000000000150000-0x0000000000170000-memory.dmp family_redline behavioral1/memory/101616-226-0x000000000016B54E-mapping.dmp family_redline behavioral1/memory/5924-999-0x000000000018B54E-mapping.dmp family_redline behavioral1/memory/5924-1038-0x0000000000170000-0x0000000000190000-memory.dmp family_redline -
YTStealer payload 3 IoCs
resource yara_rule behavioral1/memory/5712-873-0x0000000001120000-0x0000000001F32000-memory.dmp family_ytstealer behavioral1/memory/5712-901-0x0000000001120000-0x0000000001F32000-memory.dmp family_ytstealer behavioral1/memory/5712-925-0x0000000001120000-0x0000000001F32000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
pid Process 2084 winrar-x64-611.exe 1608 uninstall.exe 4604 WinRAR.exe 568 WinRAR.exe 2924 winrar-x64-611.exe 2652 Synapse X.exe 1888 dxwebsetup.exe 5124 dxwsetup.exe 5712 start.exe 7400 Synapse X.exe 8500 WinRAR.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe -
resource yara_rule behavioral1/files/0x000700000001af61-854.dat upx behavioral1/files/0x000700000001af61-855.dat upx behavioral1/memory/5712-873-0x0000000001120000-0x0000000001F32000-memory.dmp upx behavioral1/memory/5712-901-0x0000000001120000-0x0000000001F32000-memory.dmp upx behavioral1/memory/5712-925-0x0000000001120000-0x0000000001F32000-memory.dmp upx -
Loads dropped DLL 12 IoCs
pid Process 2676 Process not Found 2676 Process not Found 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe 5124 dxwsetup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini dxwsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini dxwsetup.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\F: dxwsetup.exe File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\M: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_d3dx9_34_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2008_x3daudio_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2007_d3dx10_33_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2006_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2008_d3dx10_38_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx9_42_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2902.0_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SETF795.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\dsetup32.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2007_xinput_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_D3DCompiler_42_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Oct2006_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_d3dx9_39_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_xaudio_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx9_43_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SETF7E4.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\DirectX\WebSetup dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2006_d3dx10_00_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2006_MDX1_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2006_xinput_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2007_xinput_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_d3dx10_34_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_x3daudio_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_xaudio_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2010_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2905.0_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2006_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2006_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2005_d3dx9_27_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx9_42_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2005_d3dx9_28_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2007_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_xaudio_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2005_d3dx9_28_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_d3dx10_35_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2006_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2008_d3dx10_38_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2006_xinput_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_d3dx9_40_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx10_42_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dcsx_42_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2005_d3dx9_24_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Oct2006_d3dx9_31_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_d3dx10_37_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_d3dx9_40_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2010_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\directx\websetup\SETF795.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2005_d3dx9_25_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2903.0_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2909.0_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Apr2007_d3dx9_33_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_d3dx9_35_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2008_d3dx9_38_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_xaudio_x86.cab dxwsetup.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2652 set thread context of 101616 2652 Synapse X.exe 93 PID 7400 set thread context of 5924 7400 Synapse X.exe 111 -
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files\WinRAR\Zip.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Descript.ion winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\ReadMe.txt winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Resources.pri winrar-x64-611.exe File created C:\Program Files\WinRAR\Default64.SFX winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExt.dll winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-611.exe File created C:\Program Files\WinRAR\Rar.txt winrar-x64-611.exe File created C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-611.exe File created C:\Program Files\WinRAR\Uninstall.lst winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-611.exe File created C:\Program Files\WinRAR\Default.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\Uninstall.exe winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\UnRAR.exe winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-611.exe File created C:\Program Files\WinRAR\Resources.pri winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Order.htm winrar-x64-611.exe File created C:\Program Files\WinRAR\zipnew.dat uninstall.exe File opened for modification C:\Program Files\WinRAR\WhatsNew.txt winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Default64.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\WinRAR.chm winrar-x64-611.exe File created C:\Program Files\WinRAR\WinRAR.exe winrar-x64-611.exe File created C:\Program Files\WinRAR\7zxa.dll winrar-x64-611.exe File created C:\Program Files\WinRAR\WinCon.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\rarnew.dat uninstall.exe File created C:\Program Files\WinRAR\Descript.ion winrar-x64-611.exe File created C:\Program Files\WinRAR\ReadMe.txt winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExt32.dll winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExt32.dll winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\License.txt winrar-x64-611.exe File created C:\Program Files\WinRAR\Order.htm winrar-x64-611.exe File created C:\Program Files\WinRAR\Zip64.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-64.png winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\License.txt winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarFiles.lst winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Uninstall.exe winrar-x64-611.exe File created C:\Program Files\WinRAR\UnRAR.exe winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-32.png winrar-x64-611.exe File created C:\Program Files\WinRAR\__tmp_rar_sfx_access_check_240673812 winrar-x64-611.exe File created C:\Program Files\WinRAR\Rar.exe winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\7zxa.dll winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Zip64.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\RarFiles.lst winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Uninstall.lst winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Rar.exe winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExtPackage.msix winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Default.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\WinCon64.SFX winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\WinRAR.chm winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\Rar.txt winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExtInstaller.exe winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\WinRAR.exe winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExt.dll winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR winrar-x64-611.exe File opened for modification C:\Program Files\WinRAR\WinCon.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\Zip.SFX winrar-x64-611.exe File created C:\Program Files\WinRAR\RarExtLogo.altform-unplated_targetsize-48.png winrar-x64-611.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\msdownld.tmp\AS5B0523.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A4E95.tmp\Oct2006_d3dx9_31_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5ADB06.tmp\Aug2007_d3dx10_35_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B03FA.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A573F.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AABF7.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5AED94.tmp\Mar2008_x3daudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A36E6.tmp\Aug2006_xinput_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A401E.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A362B.tmp\Apr2006_xinput_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AF072.tmp\Jun2008_d3dx9_38_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A9EB8.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AA56F.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B41BF.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2A20.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2CA0.tmp\Feb2010_x3daudio_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5AF9C9.tmp\Aug2008_d3dx9_39_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A6CEA.tmp\Jun2008_d3dx9_38_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5AC701.tmp\Feb2007_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AD6A1.tmp\Aug2007_d3dx9_35_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AEE4F.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B03CB.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B1521.tmp\Mar2009_d3dx10_41_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2A20.tmp\Aug2009_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A481C.tmp\Dec2005_d3dx9_28_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AAF52.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5ACF2F.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B32BB.tmp\Jun2010_d3dx11_43_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A38CB.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B0746.tmp\Nov2008_d3dx9_40_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B0FC2.tmp\Mar2009_d3dx9_41_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A36E6.tmp\Aug2006_xinput_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B445F.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A4C91.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2CA0.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5B3E44.tmp\MDX_1.0.2903.0_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AB88A.tmp\Jun2006_xact_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5B0189.tmp\Aug2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2751.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B32BB.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A53B5.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A8CB7.tmp\Aug2009_d3dx11_42_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A9C28.tmp\Jun2010_D3DCompiler_43_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A9EB8.tmp\Feb2005_d3dx9_24_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AE518.tmp\Nov2007_x3daudio_x86.cab dxwsetup.exe File created C:\Windows\assembly\GACLock.dat dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A4C91.tmp\Apr2006_d3dx9_30_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A50D7.tmp\Dec2006_d3dx9_32_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A676C.tmp\Mar2008_d3dx9_37_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5B31F0.tmp\Jun2010_d3dx10_43_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A383E.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B1EC6.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2B78.tmp\Aug2009_xaudio_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5B1A51.tmp\Mar2009_xaudio_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5B2A20.tmp\Aug2009_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A6096.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A94F4.tmp\Aug2009_D3DCompiler_42_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5ABA30.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A3C26.tmp\Apr2005_d3dx9_25_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5AF7E4.tmp\Jun2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B2D4C.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5AF852.tmp\Jun2008_xaudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5B3E44.tmp\MDX_1.0.2903.0_x86.cab dxwsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 101796 2652 WerFault.exe 90 6472 7400 WerFault.exe 109 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch WinRAR.exe Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" WinRAR.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r00\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r02 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tgz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR archive" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Program Files\\WinRAR\\WinRAR.exe,0" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r05\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r26 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r22 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r27 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip\ShellNew uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz\ = "WinRAR" uninstall.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r15 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Program Files\\WinRAR\\WinRAR.exe\" \"%1\"" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance WinRAR.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r02\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lz uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lz\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r23\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.z\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.uu\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r26\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32\ThreadingModel = "Apartment" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r09\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r19 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r28 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r03 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\InProcServer32 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r05 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r14\ = "WinRAR" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r22\ = "WinRAR" uninstall.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance WinRAR.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B41DB860-64E4-11D2-9906-E49FADC173CA}\InProcServer32\ = "C:\\Program Files\\WinRAR\\rarext.dll" uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r21 uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zip uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.r01 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz2\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tzst uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 uninstall.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.r16\ = "WinRAR" uninstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.txz uninstall.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Synapse x.rar:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\winrar-x64-611.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\dxwebsetup.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\Setup.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 101616 AppLaunch.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 6044 powershell.exe 6044 powershell.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4604 WinRAR.exe 76204 taskmgr.exe 8500 WinRAR.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 3412 firefox.exe Token: SeDebugPrivilege 3412 firefox.exe Token: 33 836 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 836 AUDIODG.EXE Token: SeDebugPrivilege 3412 firefox.exe Token: SeDebugPrivilege 3412 firefox.exe Token: SeDebugPrivilege 3412 firefox.exe Token: SeDebugPrivilege 76204 taskmgr.exe Token: SeSystemProfilePrivilege 76204 taskmgr.exe Token: SeCreateGlobalPrivilege 76204 taskmgr.exe Token: SeDebugPrivilege 101616 AppLaunch.exe Token: SeDebugPrivilege 6044 powershell.exe Token: SeDebugPrivilege 3412 firefox.exe Token: SeBackupPrivilege 6540 vssvc.exe Token: SeRestorePrivilege 6540 vssvc.exe Token: SeAuditPrivilege 6540 vssvc.exe Token: SeBackupPrivilege 7052 srtasks.exe Token: SeRestorePrivilege 7052 srtasks.exe Token: SeSecurityPrivilege 7052 srtasks.exe Token: SeTakeOwnershipPrivilege 7052 srtasks.exe Token: SeBackupPrivilege 7052 srtasks.exe Token: SeRestorePrivilege 7052 srtasks.exe Token: SeSecurityPrivilege 7052 srtasks.exe Token: SeTakeOwnershipPrivilege 7052 srtasks.exe Token: SeDebugPrivilege 5924 AppLaunch.exe Token: SeDebugPrivilege 3412 firefox.exe Token: SeDebugPrivilege 3412 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 2532 Multiple_Roblox.exe 3412 firefox.exe 4604 WinRAR.exe 568 WinRAR.exe 568 WinRAR.exe 568 WinRAR.exe 568 WinRAR.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 2532 Multiple_Roblox.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe 76204 taskmgr.exe -
Suspicious use of SetWindowsHookEx 53 IoCs
pid Process 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 5100 OpenWith.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 2084 winrar-x64-611.exe 2084 winrar-x64-611.exe 2084 winrar-x64-611.exe 1608 uninstall.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 4604 WinRAR.exe 4604 WinRAR.exe 2924 winrar-x64-611.exe 2924 winrar-x64-611.exe 2924 winrar-x64-611.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe 3412 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 4132 wrote to memory of 3412 4132 firefox.exe 68 PID 3412 wrote to memory of 4036 3412 firefox.exe 70 PID 3412 wrote to memory of 4036 3412 firefox.exe 70 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 3376 3412 firefox.exe 72 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73 PID 3412 wrote to memory of 4844 3412 firefox.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Multiple_Roblox.exe"C:\Users\Admin\AppData\Local\Temp\Multiple_Roblox.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2532
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3412.0.2078845210\259187676" -parentBuildID 20200403170909 -prefsHandle 1524 -prefMapHandle 1232 -prefsLen 1 -prefMapSize 219938 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3412 "\\.\pipe\gecko-crash-server-pipe.3412" 1608 gpu3⤵PID:4036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3412.3.1838286769\1866468002" -childID 1 -isForBrowser -prefsHandle 2176 -prefMapHandle 2172 -prefsLen 122 -prefMapSize 219938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3412 "\\.\pipe\gecko-crash-server-pipe.3412" 2188 tab3⤵PID:3376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3412.13.36769190\959918185" -childID 2 -isForBrowser -prefsHandle 3136 -prefMapHandle 3132 -prefsLen 6904 -prefMapSize 219938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3412 "\\.\pipe\gecko-crash-server-pipe.3412" 3148 tab3⤵PID:4844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3412.20.16727690\714775215" -parentBuildID 20200403170909 -prefsHandle 4724 -prefMapHandle 3400 -prefsLen 8456 -prefMapSize 219938 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3412 "\\.\pipe\gecko-crash-server-pipe.3412" 4852 rdd3⤵PID:68
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5100
-
C:\Users\Admin\Downloads\winrar-x64-611.exe"C:\Users\Admin\Downloads\winrar-x64-611.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Program Files\WinRAR\uninstall.exe"C:\Program Files\WinRAR\uninstall.exe" /setup2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\Downloads\Synapse x.rar"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1304
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -imon1 -- "C:\Users\Admin\Downloads\Synapse x.rar" "?\"1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:568
-
C:\Users\Admin\Downloads\winrar-x64-611.exe"C:\Users\Admin\Downloads\winrar-x64-611.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924
-
C:\Users\Admin\Downloads\Synapse x\Synapse x\Synapse X.exe"C:\Users\Admin\Downloads\Synapse x\Synapse x\Synapse X.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:101616 -
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
PID:5712 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6044
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 975602⤵
- Program crash
PID:101796
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:76204
-
C:\Users\Admin\Downloads\dxwebsetup.exe"C:\Users\Admin\Downloads\dxwebsetup.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
PID:5124
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:6900
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:7052
-
C:\Users\Admin\Downloads\Synapse x\Synapse x\Synapse X.exe"C:\Users\Admin\Downloads\Synapse x\Synapse x\Synapse X.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:7400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:5924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7400 -s 975242⤵
- Program crash
PID:6472
-
-
C:\Program Files\WinRAR\WinRAR.exe"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\Admin\AppData\Local\Temp\Setup.zip"1⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:8500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD58933d6e810668af29d7ba8f1c3b2b9ff
SHA1760cbb236c4ca6e0003582aaefd72ff8b1c872aa
SHA256cd3ba458c88bdf8924ebb404c8505d627e6ac7aadc6e351562c1894019604fc7
SHA512344d737228483add83d5f2b31ae9582ca78013dc4be967f2cdafca24145970e3cb46d75373996150a3c9119ebc81ce9ac50e16696c17a4dea65c9571ef8e745e
-
Filesize
412KB
MD592667e28583a9489e3cf4f1a7fd6636e
SHA1faa09990ba4daae970038ed44e3841151d6e7f28
SHA2569147293554ad43920bcf763ffd6e1183c36b9f8156dc220548426a187a5f2959
SHA51263555a15f153df59b2ca2ab56cd20d71420eb5c9977bcf774723d8484157172b027f71fb2f7a4692aecc6e471f50beec2e0f7a43e57449714caede1e9684c0b8
-
Filesize
95KB
MD5d4c768c52ee077eb09bac094f4af8310
SHA1c56ae6b4464799fcdc87c5ff5a49ac1ad43482b1
SHA2568089dfbebdf2142c7f60f5c12098859417b3c997f0b24b696ccaa78a50f3726c
SHA5125b794b19b5ff10f7356a46f02204d0df3183037bc89d32e3f2c2978ea8f90ac6367fcb225b476cb7c8a3035d82ca1e328791271d3a58b40b9759d4b65e83f847
-
Filesize
314KB
MD581b236ef16aaa6a3936fd449b12b82a2
SHA1698acb3c862c7f3ecf94971e4276e531914e67bc
SHA256d37819e64ecb61709fcf3435eb9bed790f75163057e36fb94a3465ca353ccc5e
SHA512968fe20d6fe6879939297b8683da1520a1e0d2b9a5107451fca70b91802492e243976f56090c85eb9f38fca8f74134b8b6aa133ba2e2806d763c9f8516ace769
-
Filesize
2.3MB
MD50b114fc0f4b6d49f57b3b01dd9ea6a8c
SHA123e1480c3ff3a54e712d759e9325d362bf52fabd
SHA256f0f312fe14599d7379aa247c1d0cc6100db45bfe7f277113134a8157950bcacd
SHA512e31c3a3da5e72a9d72e245d6e5dcc7c92e4cfcbb6bdbb61061e0586e29f77e8b42a81a0bba99ce45e148a2423907878fb858c40cc1008ef9d90fb8e4e2fcd573
-
Filesize
2.3MB
MD50b114fc0f4b6d49f57b3b01dd9ea6a8c
SHA123e1480c3ff3a54e712d759e9325d362bf52fabd
SHA256f0f312fe14599d7379aa247c1d0cc6100db45bfe7f277113134a8157950bcacd
SHA512e31c3a3da5e72a9d72e245d6e5dcc7c92e4cfcbb6bdbb61061e0586e29f77e8b42a81a0bba99ce45e148a2423907878fb858c40cc1008ef9d90fb8e4e2fcd573
-
Filesize
2.3MB
MD50b114fc0f4b6d49f57b3b01dd9ea6a8c
SHA123e1480c3ff3a54e712d759e9325d362bf52fabd
SHA256f0f312fe14599d7379aa247c1d0cc6100db45bfe7f277113134a8157950bcacd
SHA512e31c3a3da5e72a9d72e245d6e5dcc7c92e4cfcbb6bdbb61061e0586e29f77e8b42a81a0bba99ce45e148a2423907878fb858c40cc1008ef9d90fb8e4e2fcd573
-
Filesize
2.3MB
MD50b114fc0f4b6d49f57b3b01dd9ea6a8c
SHA123e1480c3ff3a54e712d759e9325d362bf52fabd
SHA256f0f312fe14599d7379aa247c1d0cc6100db45bfe7f277113134a8157950bcacd
SHA512e31c3a3da5e72a9d72e245d6e5dcc7c92e4cfcbb6bdbb61061e0586e29f77e8b42a81a0bba99ce45e148a2423907878fb858c40cc1008ef9d90fb8e4e2fcd573
-
Filesize
412KB
MD592667e28583a9489e3cf4f1a7fd6636e
SHA1faa09990ba4daae970038ed44e3841151d6e7f28
SHA2569147293554ad43920bcf763ffd6e1183c36b9f8156dc220548426a187a5f2959
SHA51263555a15f153df59b2ca2ab56cd20d71420eb5c9977bcf774723d8484157172b027f71fb2f7a4692aecc6e471f50beec2e0f7a43e57449714caede1e9684c0b8
-
Filesize
2KB
MD5226a4476a224b0441ffd610ddbceb8f9
SHA1918bc2e3e05c9b4d6dc0fe6d2c185bbbffe7cbe7
SHA256464f6b3f3dc24198153d50ae9f68e5d96e4f7c426418c845602f5823e7c96ce0
SHA5123d8210774142852f164edbc603ed5bbdbc4e6ed211a3927e32239a5e1626c7f1330c674212fffbb1d60225d2c93fa94f849dd7867a44ff36c13b1776fed2bccb
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
65KB
MD5b36d3f105d18e55534ad605cbf061a92
SHA1788ef2de1dea6c8fe1d23a2e1007542f7321ed79
SHA256c6c5e877e92d387e977c135765075b7610df2500e21c16e106a225216e6442ae
SHA51235ae00da025fd578205337a018b35176095a876cd3c3cf67a3e8a8e69cd750a4ccc34ce240f11fae3418e5e93caf5082c987f0c63f9d953ed7cb8d9271e03b62
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
12KB
MD5e6a74342f328afa559d5b0544e113571
SHA1a08b053dfd061391942d359c70f9dd406a968b7d
SHA25693f5589499ee4ee2812d73c0d8feacbbcfe8c47b6d98572486bc0eff3c5906ca
SHA5121e35e5bdff1d551da6c1220a1a228c657a56a70dedf5be2d9273fc540f9c9f0bb73469595309ea1ff561be7480ee92d16f7acbbd597136f4fc5f9b8b65ecdfad
-
Filesize
56KB
MD57b1fbe9f5f43b2261234b78fe115cf8e
SHA1dd0f256ae38b4c4771e1d1ec001627017b7bb741
SHA256762ff640013db2bd4109d7df43a867303093815751129bd1e33f16bf02e52cce
SHA512d21935a9867c0f2f7084917c79fbb1da885a1bfd4793cf669ff4da8c777b3a201857250bfb7c2b616625a8d3573c68395d210446d2c284b41cf09cc7cbb07885
-
Filesize
56KB
MD52c4d9e4773084f33092ced15678a2c46
SHA1bad603d543470157effd4876a684b9cfd5075524
SHA256ed710d035ccaab0914810becf2f5db2816dba3a351f3666a38a903c80c16997a
SHA512d2e34cac195cfede8bc64bdc92721c574963ff522618eda4d7172f664aeb4c8675fd3d4f3658391ee5eaa398bcd2ce5d8f80deecf51af176f5c4bb2d2695e04e
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
477B
MD5ad8982eaa02c7ad4d7cdcbc248caa941
SHA14ccd8e038d73a5361d754c7598ed238fc040d16b
SHA256d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00
SHA5125c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28
-
Filesize
10.7MB
MD5b82dba05f995a473fe37077e68fcd48c
SHA1b53aea0f0fad45cf16de25358933bf40770b255a
SHA25602359bab6bb25cc616a7b6e8221e432a59d23e06dbbd03c0194e8013646c0b82
SHA512003d7e9dae82df49edc0c9fa6685bb21ea6eebc70bc41bc116aa4c323d73acb2e6a79490340676d64c03a0040a07280a40021912a0c0f748f7603441778e00d9
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
4.0MB
MD547b29465bb5fcbbd899f1d98af193f06
SHA1ddd7c01b07939751f734c1e9b7aa17853447e02c
SHA256a54ac89930406913a3b0b3b8e3ef738135a9b7fa54b01578f870e26ee9f99efb
SHA512838a170802283f318712195402dc26dc601d2f81d3dae1f32309e532af732808c1a8b03c80f7dcf99b2ae94276678bb4211a44ebe889335da34a6083c4bd31f8
-
Filesize
512KB
MD52c16cfbf768b46cb17ae994a54e7c1d8
SHA18c4f4e5df72d2d162925e9186b922520a2080d20
SHA256e239e398c4dac275ebc1a705ac25476e48d1a614f9d38e273485a2bb30d7a52b
SHA512b1b4ceefb229b0591c22d59c24ceb18fde8d02fc5f68d2990b42230c6b8cd7518d428d4f9d7e3ce81b56e8515ee4d79faeebf3d3efeab1d92920b27722492a8e
-
Filesize
512KB
MD53bda439772e4e27c1288891c03a3affa
SHA1e13b1472c5c7577d5a1f1c50d248bf39090ad29d
SHA256ddd101f1c6e2873d68d4276240ff22050b36671599348bb04ae80e693cf62f04
SHA512ec949c3befef2eaf65a5278eab53c357c08469741e03713aae4053c18445fa6590da0d30bab401c0cb2459da0f4df0f5daa7bde519c7cc5d0fbd64847661f1e5
-
Filesize
512KB
MD54b0fa98be04349579ea8d7b1dc4a68de
SHA1fc0fa8d40b6b784740964509aaaa11807d1a8cd8
SHA256ac8ade1e6074a0ef05a3156fa090d5f60c1f2a4c9cfe1523418e7807fac1a595
SHA5120e58bd469b5c91acd9541cc611a85ba54428dbdb927ffe007ff3391e1bba31d3505bdeb502c8639406825924bcd8f6faa5739f9ad442ef3ff51ab2776d1f46d6
-
Filesize
544KB
MD5d5dafefa79fde232ce86ecbb6ca14d6d
SHA1425cfa1e491d462381b4d34ded367831c21c26b0
SHA256cc92ffc8a183e6d63a1100203078c26ad2353817cab4bb9157deac2119a6c3df
SHA5121c6cb075fb62bef12f173bc66b50e8ab976926636932a328f7c43cbb51c624b921af1f3971ce6e748ceb7833281e978b66bef015a03d0cdd5b009292e9e5772d
-
Filesize
12B
MD5077e218f52a7e7b5b9226d268e6b9937
SHA131fd9cbcc930e82db22ecd02b1fffc03d6b335ca
SHA256a753595a11ad046a97b39ae5204a0a2302d76b9324133ed43adf521d558262e1
SHA51230248ff79f07873f51599e485bfa13daecbbff5e6a81d852fa7265ae181952f24af7df062f28a761bcac65717e9a25e29d6f5aae8c41d1c49e3a8bde13516977
-
Filesize
226KB
MD5e4af2284dfeaa12bc115b542ee085060
SHA135da507bf5c4f413c0a385122345d3ee1b9fe426
SHA256abd7689f80474c53106777ca764db41c8f39a18991d7b39350738f2141865418
SHA5125968865fa358903bdd8414f66e939fdc2390fed6a8ebcdaecd8c78ed05f6040b4c425813e4d87ff5a869f16692e7dbd09bf4fb1c4a606ef1b7c322dc8d280207
-
Filesize
445KB
MD59ee68713f2a7cffe160e3fc1b446f61e
SHA11cd56f8a27c8913e1d8c4dd0c97acdeb0f2242ab
SHA25649deb035d46391e414506e10e5d394a9c371e61299fb5539e71e7bd830099f52
SHA512bc3a3e92b945d2a0e3c1737e0e3173ab8d16ad934f8c0eb76559819f83a6e70e40e1953328db89b5518faf0790cd9fcc04a059f04d011f5f5f5c22502b2db717
-
Filesize
445KB
MD59ee68713f2a7cffe160e3fc1b446f61e
SHA11cd56f8a27c8913e1d8c4dd0c97acdeb0f2242ab
SHA25649deb035d46391e414506e10e5d394a9c371e61299fb5539e71e7bd830099f52
SHA512bc3a3e92b945d2a0e3c1737e0e3173ab8d16ad934f8c0eb76559819f83a6e70e40e1953328db89b5518faf0790cd9fcc04a059f04d011f5f5f5c22502b2db717
-
Filesize
445KB
MD59ee68713f2a7cffe160e3fc1b446f61e
SHA11cd56f8a27c8913e1d8c4dd0c97acdeb0f2242ab
SHA25649deb035d46391e414506e10e5d394a9c371e61299fb5539e71e7bd830099f52
SHA512bc3a3e92b945d2a0e3c1737e0e3173ab8d16ad934f8c0eb76559819f83a6e70e40e1953328db89b5518faf0790cd9fcc04a059f04d011f5f5f5c22502b2db717
-
Filesize
288KB
MD52cbd6ad183914a0c554f0739069e77d7
SHA17bf35f2afca666078db35ca95130beb2e3782212
SHA2562cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
SHA512ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
Filesize
288KB
MD52cbd6ad183914a0c554f0739069e77d7
SHA17bf35f2afca666078db35ca95130beb2e3782212
SHA2562cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
SHA512ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
Filesize
3.3MB
MD58a6217d94e1bcbabdd1dfcdcaa83d1b3
SHA199b81b01f277540f38ea3e96c9c6dc2a57dfeb92
SHA2563023edb4fc3f7c2ebad157b182b62848423f6fa20d180b0df689cbb503a49684
SHA512a8f6f6fdfa9d754a577b7dd885a938fb9149f113baa2afb6352df622cdb73242175a06cd567e971fd3de93a126ba05b78178d5d512720d8fdb87ececce2cbf54
-
Filesize
3.3MB
MD58a6217d94e1bcbabdd1dfcdcaa83d1b3
SHA199b81b01f277540f38ea3e96c9c6dc2a57dfeb92
SHA2563023edb4fc3f7c2ebad157b182b62848423f6fa20d180b0df689cbb503a49684
SHA512a8f6f6fdfa9d754a577b7dd885a938fb9149f113baa2afb6352df622cdb73242175a06cd567e971fd3de93a126ba05b78178d5d512720d8fdb87ececce2cbf54
-
Filesize
3.3MB
MD58a6217d94e1bcbabdd1dfcdcaa83d1b3
SHA199b81b01f277540f38ea3e96c9c6dc2a57dfeb92
SHA2563023edb4fc3f7c2ebad157b182b62848423f6fa20d180b0df689cbb503a49684
SHA512a8f6f6fdfa9d754a577b7dd885a938fb9149f113baa2afb6352df622cdb73242175a06cd567e971fd3de93a126ba05b78178d5d512720d8fdb87ececce2cbf54
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
632KB
MD5650a771d005941c7a23926011d75ad8f
SHA184b346acd006f21d7ffb8d5ea5937ec0ee3daa4f
SHA256b28d116dd3066e7a3c9f0cc2f63d34a7189c9d78e869d1255c9dec59172a9d5f
SHA5124724bd81c26716f0ad59187c78fbb920fd8b251540e76c28d93e0afcce3ebe0e3e2b4605e9d444bbbc3e828ce11f2b73489404318ab11403eff94b42ef2c9bad
-
Filesize
632KB
MD5650a771d005941c7a23926011d75ad8f
SHA184b346acd006f21d7ffb8d5ea5937ec0ee3daa4f
SHA256b28d116dd3066e7a3c9f0cc2f63d34a7189c9d78e869d1255c9dec59172a9d5f
SHA5124724bd81c26716f0ad59187c78fbb920fd8b251540e76c28d93e0afcce3ebe0e3e2b4605e9d444bbbc3e828ce11f2b73489404318ab11403eff94b42ef2c9bad
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405