Analysis

  • max time kernel
    273s
  • max time network
    272s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2022, 21:56

General

  • Target

    Setup.exe

  • Size

    43.5MB

  • MD5

    a14c3f0dcded72374ca1d57b724ccdb3

  • SHA1

    940f77301ba37e4aedd054f23114a146cd481f5c

  • SHA256

    b49d8694a2a5f04d2b505e77be54fd88990d26fc85a00cb3ea835debccc01353

  • SHA512

    da5fefb3b9fcaad236ab8a5702f1aa07d38d10d36c0c00521b737180543ee88fcc0c0efe37761b44b521abdee355b12b382769040667702282898888dbd8985b

  • SSDEEP

    786432:4W75K9iIfLI1JzBH9q9H8HPculH4rdlQWxR0XWF1OplrWKqKIwqqIxYBMEg/+3Z:t75uvI11BlHPcuV4rnJUGXOplFSwiaMm

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Drops file in Windows directory
    PID:1056
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1708
    • C:\Users\Admin\AppData\Local\Temp\Setup.exe
      "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2896
    • C:\Users\Admin\Desktop\loader.exe
      "C:\Users\Admin\Desktop\loader.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4004
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05214f50,0x7ffa05214f60,0x7ffa05214f70
        2⤵
          PID:5084
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1704 /prefetch:2
          2⤵
            PID:2832
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2008 /prefetch:8
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3488
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:8
            2⤵
              PID:3916
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:1
              2⤵
                PID:400
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:1
                2⤵
                  PID:2596
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:1
                  2⤵
                    PID:1640
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4520 /prefetch:8
                    2⤵
                      PID:3952
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4644 /prefetch:8
                      2⤵
                        PID:2920
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4776 /prefetch:8
                        2⤵
                          PID:3008
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:8
                          2⤵
                            PID:3132
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4632 /prefetch:8
                            2⤵
                              PID:3452
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4716 /prefetch:8
                              2⤵
                                PID:4132
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:8
                                2⤵
                                  PID:596
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                                  2⤵
                                    PID:5060
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3396 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3484
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5168 /prefetch:8
                                    2⤵
                                      PID:3572
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4664 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4948
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4868 /prefetch:8
                                      2⤵
                                        PID:1780
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4900 /prefetch:8
                                        2⤵
                                          PID:1508
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4852 /prefetch:8
                                          2⤵
                                            PID:4388
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:1
                                            2⤵
                                              PID:3848
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1
                                              2⤵
                                                PID:4732
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                                                2⤵
                                                  PID:4944
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:1
                                                  2⤵
                                                    PID:3412
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                                                    2⤵
                                                      PID:3656
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
                                                      2⤵
                                                        PID:420
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                                                        2⤵
                                                          PID:1708
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3440 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:5044
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5472 /prefetch:8
                                                          2⤵
                                                            PID:3812
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4904 /prefetch:8
                                                            2⤵
                                                              PID:3024
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3880 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:1252
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3972 /prefetch:8
                                                              2⤵
                                                                PID:2296
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4548 /prefetch:8
                                                                2⤵
                                                                  PID:3080
                                                                • C:\Users\Admin\Downloads\dxwebsetup.exe
                                                                  "C:\Users\Admin\Downloads\dxwebsetup.exe"
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  PID:2300
                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Drops desktop.ini file(s)
                                                                    • Enumerates connected drives
                                                                    • Drops file in System32 directory
                                                                    • Drops file in Windows directory
                                                                    • Modifies registry class
                                                                    PID:3640
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_24_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4776
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_25_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4684
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_26_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4840
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_27_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:3784
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_28_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4700
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_29_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      PID:3740
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1020
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_0.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:2680
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_30_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1164
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_1_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2792
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_1.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Loads dropped DLL
                                                                      PID:4820
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe xinput1_1_x64.inf, Install_Driver
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4884
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_2_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4364
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_2.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Loads dropped DLL
                                                                      PID:3412
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe xinput1_2_x64.inf, Install_Driver
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1668
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_3_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2496
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_3.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:5100
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_31_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:5024
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_4_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:5080
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_4.dll
                                                                      4⤵
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:3060
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_32_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:3528
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_00_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3068
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_5_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1068
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_5.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Loads dropped DLL
                                                                      • Modifies registry class
                                                                      PID:2380
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_6_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:380
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_6.dll
                                                                      4⤵
                                                                      • Loads dropped DLL
                                                                      PID:1444
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_33_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2936
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_33_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      PID:3132
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_7_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4072
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_7.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:3128
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3140
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_34_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:3456
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_34_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:3664
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_8_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:3104
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_8.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      PID:4208
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_35_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2248
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_35_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4008
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_9_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:600
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_9.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:2164
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx9_36_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4276
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_36_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4888
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_2_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:696
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT2_10_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2348
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_10.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      PID:2208
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_37_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1868
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_37_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3000
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_3_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4764
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_0_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4216
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_0.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:4304
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_0_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3464
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_0.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:3676
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_38_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2788
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_38_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1484
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_4_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4172
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_1_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3244
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_1.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      PID:2892
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_1_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4956
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_1.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:4776
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_39_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2828
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_39_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2328
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_2_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2412
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_2.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:3784
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_2_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:4700
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_2.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:2968
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_5_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Windows directory
                                                                      PID:2700
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_3_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1888
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_3.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      PID:4928
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_3_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:868
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_3.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:4908
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_40_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4896
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_40_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4816
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_6_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      PID:4880
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_4_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:4592
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_4.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:4820
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_4_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:1232
                                                                    • C:\Windows\system32\regsvr32.exe
                                                                      C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_4.dll
                                                                      4⤵
                                                                      • Registers COM server for autorun
                                                                      • Modifies registry class
                                                                      PID:4796
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_41_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1432
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_41_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:32
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_42_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3008
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_42_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1632
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx11_42_x64.inf
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Drops file in Windows directory
                                                                      PID:392
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dcsx_42_x64.inf
                                                                      4⤵
                                                                      • Drops file in System32 directory
                                                                      PID:3748
                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DCompiler_42_x64.inf
                                                                      4⤵
                                                                        PID:1500
                                                                      • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_5_x64.inf
                                                                        4⤵
                                                                          PID:4756
                                                                        • C:\Windows\system32\regsvr32.exe
                                                                          C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_5.dll
                                                                          4⤵
                                                                          • Registers COM server for autorun
                                                                          • Modifies registry class
                                                                          PID:3380
                                                                        • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_5_x64.inf
                                                                          4⤵
                                                                            PID:5080
                                                                          • C:\Windows\system32\regsvr32.exe
                                                                            C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_5.dll
                                                                            4⤵
                                                                            • Registers COM server for autorun
                                                                            • Modifies registry class
                                                                            PID:5104
                                                                          • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe X3DAudio1_7_x64.inf
                                                                            4⤵
                                                                            • Drops file in System32 directory
                                                                            PID:3884
                                                                          • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_6_x64.inf
                                                                            4⤵
                                                                              PID:3528
                                                                            • C:\Windows\system32\regsvr32.exe
                                                                              C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_6.dll
                                                                              4⤵
                                                                              • Modifies registry class
                                                                              PID:4608
                                                                            • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_6_x64.inf
                                                                              4⤵
                                                                              • Drops file in System32 directory
                                                                              PID:376
                                                                            • C:\Windows\system32\regsvr32.exe
                                                                              C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_6.dll
                                                                              4⤵
                                                                              • Registers COM server for autorun
                                                                              PID:3408
                                                                            • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DX9_43_x64.inf
                                                                              4⤵
                                                                                PID:712
                                                                              • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx10_43_x64.inf
                                                                                4⤵
                                                                                  PID:3352
                                                                                • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dx11_43_x64.inf
                                                                                  4⤵
                                                                                    PID:1444
                                                                                  • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe d3dcsx_43_x64.inf
                                                                                    4⤵
                                                                                    • Drops file in System32 directory
                                                                                    PID:3460
                                                                                  • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe D3DCompiler_43_x64.inf
                                                                                    4⤵
                                                                                    • Drops file in Windows directory
                                                                                    PID:4772
                                                                                  • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XACT3_7_x64.inf
                                                                                    4⤵
                                                                                    • Drops file in System32 directory
                                                                                    PID:692
                                                                                  • C:\Windows\system32\regsvr32.exe
                                                                                    C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_7.dll
                                                                                    4⤵
                                                                                      PID:4176
                                                                                    • C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\DXC04A.tmp\infinst.exe XAudio2_7_x64.inf
                                                                                      4⤵
                                                                                        PID:4076
                                                                                      • C:\Windows\system32\regsvr32.exe
                                                                                        C:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_7.dll
                                                                                        4⤵
                                                                                        • Registers COM server for autorun
                                                                                        • Modifies registry class
                                                                                        PID:4028
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:8
                                                                                    2⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:220
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4932 /prefetch:8
                                                                                    2⤵
                                                                                      PID:5060
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:8
                                                                                      2⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:4952
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5388 /prefetch:8
                                                                                      2⤵
                                                                                        PID:4956
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4004 /prefetch:8
                                                                                        2⤵
                                                                                          PID:3008
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2672 /prefetch:8
                                                                                          2⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:4868
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5388 /prefetch:2
                                                                                          2⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:2548
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
                                                                                          2⤵
                                                                                            PID:3912
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1648,13355850914150973045,14840946917539212790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1504 /prefetch:8
                                                                                            2⤵
                                                                                              PID:868
                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                            1⤵
                                                                                              PID:4020
                                                                                            • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                                              1⤵
                                                                                              • Drops file in Program Files directory
                                                                                              PID:4192
                                                                                              • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4192_689870889\ChromeRecovery.exe
                                                                                                "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4192_689870889\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={7976274a-2c3d-4772-ac89-ab91738a6a28} --system
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:392
                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                              C:\Windows\system32\vssvc.exe
                                                                                              1⤵
                                                                                              • Checks SCSI registry key(s)
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2836
                                                                                            • C:\Windows\system32\srtasks.exe
                                                                                              C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                                                                              1⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2364
                                                                                            • C:\Users\Admin\Desktop\loader.exe
                                                                                              "C:\Users\Admin\Desktop\loader.exe"
                                                                                              1⤵
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:1900

                                                                                            Network

                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4192_689870889\ChromeRecovery.exe

                                                                                                    Filesize

                                                                                                    253KB

                                                                                                    MD5

                                                                                                    49ac3c96d270702a27b4895e4ce1f42a

                                                                                                    SHA1

                                                                                                    55b90405f1e1b72143c64113e8bc65608dd3fd76

                                                                                                    SHA256

                                                                                                    82aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f

                                                                                                    SHA512

                                                                                                    b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0

                                                                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3

                                                                                                    Filesize

                                                                                                    141KB

                                                                                                    MD5

                                                                                                    ea1c1ffd3ea54d1fb117bfdbb3569c60

                                                                                                    SHA1

                                                                                                    10958b0f690ae8f5240e1528b1ccffff28a33272

                                                                                                    SHA256

                                                                                                    7c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d

                                                                                                    SHA512

                                                                                                    6c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup.dll

                                                                                                    Filesize

                                                                                                    93KB

                                                                                                    MD5

                                                                                                    984cad22fa542a08c5d22941b888d8dc

                                                                                                    SHA1

                                                                                                    3e3522e7f3af329f2235b0f0850d664d5377b3cd

                                                                                                    SHA256

                                                                                                    57bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308

                                                                                                    SHA512

                                                                                                    8ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup32.dll

                                                                                                    Filesize

                                                                                                    1.5MB

                                                                                                    MD5

                                                                                                    a5412a144f63d639b47fcc1ba68cb029

                                                                                                    SHA1

                                                                                                    81bd5f1c99b22c0266f3f59959dfb4ea023be47e

                                                                                                    SHA256

                                                                                                    8a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6

                                                                                                    SHA512

                                                                                                    2679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxupdate.dll

                                                                                                    Filesize

                                                                                                    173KB

                                                                                                    MD5

                                                                                                    7ed554b08e5b69578f9de012822c39c9

                                                                                                    SHA1

                                                                                                    036d04513e134786b4758def5aff83d19bf50c6e

                                                                                                    SHA256

                                                                                                    fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2

                                                                                                    SHA512

                                                                                                    7af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxupdate.dll

                                                                                                    Filesize

                                                                                                    173KB

                                                                                                    MD5

                                                                                                    7ed554b08e5b69578f9de012822c39c9

                                                                                                    SHA1

                                                                                                    036d04513e134786b4758def5aff83d19bf50c6e

                                                                                                    SHA256

                                                                                                    fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2

                                                                                                    SHA512

                                                                                                    7af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.cif

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                    MD5

                                                                                                    7b1fbe9f5f43b2261234b78fe115cf8e

                                                                                                    SHA1

                                                                                                    dd0f256ae38b4c4771e1d1ec001627017b7bb741

                                                                                                    SHA256

                                                                                                    762ff640013db2bd4109d7df43a867303093815751129bd1e33f16bf02e52cce

                                                                                                    SHA512

                                                                                                    d21935a9867c0f2f7084917c79fbb1da885a1bfd4793cf669ff4da8c777b3a201857250bfb7c2b616625a8d3573c68395d210446d2c284b41cf09cc7cbb07885

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe

                                                                                                    Filesize

                                                                                                    515KB

                                                                                                    MD5

                                                                                                    ac3a5f7be8cd13a863b50ab5fe00b71c

                                                                                                    SHA1

                                                                                                    eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9

                                                                                                    SHA256

                                                                                                    8f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da

                                                                                                    SHA512

                                                                                                    c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe

                                                                                                    Filesize

                                                                                                    515KB

                                                                                                    MD5

                                                                                                    ac3a5f7be8cd13a863b50ab5fe00b71c

                                                                                                    SHA1

                                                                                                    eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9

                                                                                                    SHA256

                                                                                                    8f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da

                                                                                                    SHA512

                                                                                                    c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba

                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.inf

                                                                                                    Filesize

                                                                                                    477B

                                                                                                    MD5

                                                                                                    ad8982eaa02c7ad4d7cdcbc248caa941

                                                                                                    SHA1

                                                                                                    4ccd8e038d73a5361d754c7598ed238fc040d16b

                                                                                                    SHA256

                                                                                                    d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00

                                                                                                    SHA512

                                                                                                    5c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28

                                                                                                  • C:\Users\Admin\Desktop\loader.exe

                                                                                                    Filesize

                                                                                                    42.7MB

                                                                                                    MD5

                                                                                                    ea5519203c0329cdf9620eee5085ac5c

                                                                                                    SHA1

                                                                                                    98ede1462f961c5415a751123e2acdcb6dd5327e

                                                                                                    SHA256

                                                                                                    d5b69437f81a83e57d7613286a2f7339a577f85bd82c5543096c826f6780fea0

                                                                                                    SHA512

                                                                                                    fd786bbefe4b117f730ac8b287b02ae60c80063cdc915ee3b5351f6ff3ae855d11562b1a9272d4c726ae5ea53c5833c5bde750d6d5058bbf3bba7601896bbe09

                                                                                                  • C:\Users\Admin\Desktop\loader.exe

                                                                                                    Filesize

                                                                                                    42.7MB

                                                                                                    MD5

                                                                                                    ea5519203c0329cdf9620eee5085ac5c

                                                                                                    SHA1

                                                                                                    98ede1462f961c5415a751123e2acdcb6dd5327e

                                                                                                    SHA256

                                                                                                    d5b69437f81a83e57d7613286a2f7339a577f85bd82c5543096c826f6780fea0

                                                                                                    SHA512

                                                                                                    fd786bbefe4b117f730ac8b287b02ae60c80063cdc915ee3b5351f6ff3ae855d11562b1a9272d4c726ae5ea53c5833c5bde750d6d5058bbf3bba7601896bbe09

                                                                                                  • C:\Users\Admin\Desktop\loader.exe

                                                                                                    Filesize

                                                                                                    42.7MB

                                                                                                    MD5

                                                                                                    ea5519203c0329cdf9620eee5085ac5c

                                                                                                    SHA1

                                                                                                    98ede1462f961c5415a751123e2acdcb6dd5327e

                                                                                                    SHA256

                                                                                                    d5b69437f81a83e57d7613286a2f7339a577f85bd82c5543096c826f6780fea0

                                                                                                    SHA512

                                                                                                    fd786bbefe4b117f730ac8b287b02ae60c80063cdc915ee3b5351f6ff3ae855d11562b1a9272d4c726ae5ea53c5833c5bde750d6d5058bbf3bba7601896bbe09

                                                                                                  • C:\Users\Admin\Downloads\dxwebsetup.exe

                                                                                                    Filesize

                                                                                                    288KB

                                                                                                    MD5

                                                                                                    2cbd6ad183914a0c554f0739069e77d7

                                                                                                    SHA1

                                                                                                    7bf35f2afca666078db35ca95130beb2e3782212

                                                                                                    SHA256

                                                                                                    2cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f

                                                                                                    SHA512

                                                                                                    ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10

                                                                                                  • C:\Users\Admin\Downloads\dxwebsetup.exe

                                                                                                    Filesize

                                                                                                    288KB

                                                                                                    MD5

                                                                                                    2cbd6ad183914a0c554f0739069e77d7

                                                                                                    SHA1

                                                                                                    7bf35f2afca666078db35ca95130beb2e3782212

                                                                                                    SHA256

                                                                                                    2cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f

                                                                                                    SHA512

                                                                                                    ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10

                                                                                                  • C:\Windows\SysWOW64\directx\websetup\dsetup.dll

                                                                                                    Filesize

                                                                                                    93KB

                                                                                                    MD5

                                                                                                    984cad22fa542a08c5d22941b888d8dc

                                                                                                    SHA1

                                                                                                    3e3522e7f3af329f2235b0f0850d664d5377b3cd

                                                                                                    SHA256

                                                                                                    57bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308

                                                                                                    SHA512

                                                                                                    8ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef

                                                                                                  • C:\Windows\SysWOW64\directx\websetup\dsetup32.dll

                                                                                                    Filesize

                                                                                                    1.5MB

                                                                                                    MD5

                                                                                                    a5412a144f63d639b47fcc1ba68cb029

                                                                                                    SHA1

                                                                                                    81bd5f1c99b22c0266f3f59959dfb4ea023be47e

                                                                                                    SHA256

                                                                                                    8a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6

                                                                                                    SHA512

                                                                                                    2679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405

                                                                                                  • C:\Windows\crossplatform.crt

                                                                                                    Filesize

                                                                                                    214KB

                                                                                                    MD5

                                                                                                    491c66b02d27c8027db2d66297bc27b8

                                                                                                    SHA1

                                                                                                    cde762d445e2cc5599944c1f7544885bfe9101a9

                                                                                                    SHA256

                                                                                                    be668675dc24f64453f11cf5e0c631982bad3709ad0eadc47e9ddb30d3bdb984

                                                                                                    SHA512

                                                                                                    eefb3c78472b5b8c79b63baff3a2c5d332870991d59de313096cec9d31b0bd47899d49c7b96d688b2474bce42511dd170e51d2ac597cabad1eb578b7e310336c

                                                                                                  • C:\Windows\libcrypto-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                    MD5

                                                                                                    a0c031afb19bc9a2a9f53cb3b5bf7ff8

                                                                                                    SHA1

                                                                                                    ff8e61895ef976a45ba5b5ebeacbdbf68ab6f8ce

                                                                                                    SHA256

                                                                                                    7eb3fba2dbc1ea25c95bf6247ad03d769d71bec5498dee218d4c066cc07c3824

                                                                                                    SHA512

                                                                                                    4f7e988251644bcc4c3ce0fb1148ab9fd4c21496f94076302e6e9582f42540ea6d5d78f896028e92e67af5eac00abbced899419c2aa14497f1db81e2510afd79

                                                                                                  • C:\Windows\libcrypto-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                    MD5

                                                                                                    a0c031afb19bc9a2a9f53cb3b5bf7ff8

                                                                                                    SHA1

                                                                                                    ff8e61895ef976a45ba5b5ebeacbdbf68ab6f8ce

                                                                                                    SHA256

                                                                                                    7eb3fba2dbc1ea25c95bf6247ad03d769d71bec5498dee218d4c066cc07c3824

                                                                                                    SHA512

                                                                                                    4f7e988251644bcc4c3ce0fb1148ab9fd4c21496f94076302e6e9582f42540ea6d5d78f896028e92e67af5eac00abbced899419c2aa14497f1db81e2510afd79

                                                                                                  • C:\Windows\libcrypto-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    2.7MB

                                                                                                    MD5

                                                                                                    a0c031afb19bc9a2a9f53cb3b5bf7ff8

                                                                                                    SHA1

                                                                                                    ff8e61895ef976a45ba5b5ebeacbdbf68ab6f8ce

                                                                                                    SHA256

                                                                                                    7eb3fba2dbc1ea25c95bf6247ad03d769d71bec5498dee218d4c066cc07c3824

                                                                                                    SHA512

                                                                                                    4f7e988251644bcc4c3ce0fb1148ab9fd4c21496f94076302e6e9582f42540ea6d5d78f896028e92e67af5eac00abbced899419c2aa14497f1db81e2510afd79

                                                                                                  • C:\Windows\libssl-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    670KB

                                                                                                    MD5

                                                                                                    04b5bd1135fa4f31cb9c021bb7ff4725

                                                                                                    SHA1

                                                                                                    62623b7fa42353db63482af4231ec6772bb8444d

                                                                                                    SHA256

                                                                                                    69f1d1dd8cc363a734972a67ac51538f9bfff990f1298d8d3665fa38ee41a084

                                                                                                    SHA512

                                                                                                    887ca8412f47d4591984316c147d907344cb0b8630c24765a7f7e0d26d52048a55a7fc3604594c402dbbd1dde58471f374cb810e87b06c05039d269fbfb20246

                                                                                                  • C:\Windows\libssl-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    670KB

                                                                                                    MD5

                                                                                                    04b5bd1135fa4f31cb9c021bb7ff4725

                                                                                                    SHA1

                                                                                                    62623b7fa42353db63482af4231ec6772bb8444d

                                                                                                    SHA256

                                                                                                    69f1d1dd8cc363a734972a67ac51538f9bfff990f1298d8d3665fa38ee41a084

                                                                                                    SHA512

                                                                                                    887ca8412f47d4591984316c147d907344cb0b8630c24765a7f7e0d26d52048a55a7fc3604594c402dbbd1dde58471f374cb810e87b06c05039d269fbfb20246

                                                                                                  • C:\Windows\libssl-1_1-x64.dll

                                                                                                    Filesize

                                                                                                    670KB

                                                                                                    MD5

                                                                                                    04b5bd1135fa4f31cb9c021bb7ff4725

                                                                                                    SHA1

                                                                                                    62623b7fa42353db63482af4231ec6772bb8444d

                                                                                                    SHA256

                                                                                                    69f1d1dd8cc363a734972a67ac51538f9bfff990f1298d8d3665fa38ee41a084

                                                                                                    SHA512

                                                                                                    887ca8412f47d4591984316c147d907344cb0b8630c24765a7f7e0d26d52048a55a7fc3604594c402dbbd1dde58471f374cb810e87b06c05039d269fbfb20246

                                                                                                  • memory/1900-235-0x00007FF7C0C20000-0x00007FF7C6028000-memory.dmp

                                                                                                    Filesize

                                                                                                    84.0MB

                                                                                                  • memory/1900-239-0x000001ACDB0B0000-0x000001ACDB1B0000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1900-240-0x00007FF7C0C20000-0x00007FF7C6028000-memory.dmp

                                                                                                    Filesize

                                                                                                    84.0MB

                                                                                                  • memory/2208-217-0x0000000000871000-0x00000000008CC000-memory.dmp

                                                                                                    Filesize

                                                                                                    364KB

                                                                                                  • memory/2208-216-0x0000000000870000-0x00000000008D9000-memory.dmp

                                                                                                    Filesize

                                                                                                    420KB

                                                                                                  • memory/2680-169-0x0000000001F01000-0x0000000001F50000-memory.dmp

                                                                                                    Filesize

                                                                                                    316KB

                                                                                                  • memory/2680-168-0x0000000001F00000-0x0000000001F5C000-memory.dmp

                                                                                                    Filesize

                                                                                                    368KB

                                                                                                  • memory/3060-187-0x00000000020F1000-0x0000000002142000-memory.dmp

                                                                                                    Filesize

                                                                                                    324KB

                                                                                                  • memory/3060-186-0x00000000020F0000-0x000000000214E000-memory.dmp

                                                                                                    Filesize

                                                                                                    376KB

                                                                                                  • memory/3128-198-0x0000000002010000-0x0000000002076000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/3128-199-0x0000000002011000-0x000000000206A000-memory.dmp

                                                                                                    Filesize

                                                                                                    356KB

                                                                                                  • memory/3412-177-0x0000000001EF1000-0x0000000001F3F000-memory.dmp

                                                                                                    Filesize

                                                                                                    312KB

                                                                                                  • memory/3412-176-0x0000000001EF0000-0x0000000001F4A000-memory.dmp

                                                                                                    Filesize

                                                                                                    360KB

                                                                                                  • memory/4208-206-0x0000000001FE1000-0x000000000203C000-memory.dmp

                                                                                                    Filesize

                                                                                                    364KB

                                                                                                  • memory/4208-205-0x0000000001FE0000-0x0000000002049000-memory.dmp

                                                                                                    Filesize

                                                                                                    420KB

                                                                                                  • memory/5100-182-0x0000000002111000-0x0000000002162000-memory.dmp

                                                                                                    Filesize

                                                                                                    324KB

                                                                                                  • memory/5100-181-0x0000000002110000-0x000000000216E000-memory.dmp

                                                                                                    Filesize

                                                                                                    376KB