Analysis
-
max time kernel
18s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 01:14
Static task
static1
Behavioral task
behavioral1
Sample
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe
Resource
win10v2004-20221111-en
General
-
Target
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe
-
Size
200KB
-
MD5
083d6badb0fd9529f2bcd3f713ee4a80
-
SHA1
89c179167c89181d3914a8977e4aef4ff86cbe82
-
SHA256
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893
-
SHA512
8ed6a4d6bd43fd49c6f53343e2247686061cc26ab2a56a32b7b69c99433856cbd3ec143a41df92ba12d0a65409ead54c67658c3189fe8c033ab5b3d0ac0f3c02
-
SSDEEP
3072:bfkwPceV2ol9xU1TA5ZwZ9zKbc4OVHUmhHZIwZ+K:bswPDVjyM5ZwZMbc4OV0mhHz
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 18 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\ = "Microsoft Windows Media Player 12.0" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{44BBA848-CC51-11CF-AAFA-00AA00B6015C}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{22d6f312-b0f6-11d0-94ab-0080c74c7e95} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA848-CC51-11CF-AAFA-00AA00B6015C} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44BBA848-CC51-11CF-AAFA-00AA00B6015C}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{44BBA848-CC51-11CF-AAFA-00AA00B6015C} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220}\ c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{2179C5D3-EBFF-11CF-B6FD-00AA00B4E220}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6}\Version = "12,0,7601,17514" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Loads dropped DLL 10 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exepid process 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Drops file in Program Files directory 3 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription ioc process File opened for modification C:\PROGRA~2\WI54FB~1\WMPLAYER.EXE c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe File opened for modification C:\PROGRA~2\WI54FB~1\SETUP_WM.EXE c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe File opened for modification C:\PROGRAM FILES (X86)\WINDOWS MEDIA PLAYER\WMPLAYER.EXE c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Drops file in Windows directory 1 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription ioc process File created C:\Windows\wmsetup.log c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{22d6f312-b0f6-11d0-94ab-0080c74c7e95} c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Modifies registry class 64 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.asx c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wmafile c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.m3u\SubType = "{a98c8400-4181-11d1-a520-00a0d10129c0}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MMSU\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MMS c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wma c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.nsc = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wmafile\shellex c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\shellex\ContextMenuHandlers\WMPBurnAudioCD\ = "{8DD448E6-C188-4aed-AF92-44956194EB1F}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Compressors\auds c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Extensions c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.wvx = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MMST\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wm c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MMST c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MMSU c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wvx c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.wmx = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Extensions\AVI c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wmdb\ = "WMP.WMDBFile" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MMS\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Compressors\vids c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile\DefaultIcon\ = "C:\\Program Files (x86)\\Windows Media Player\\wmplayer.exe,-120" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.dvr-ms\SubType = "{e06d8023-db46-11cf-b4d1-00805f6cbbea}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wmx c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wmx\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\shellex\ContextMenuHandlers\WMPBurnAudioCD c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\RIFFHandlers\AVI c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile\FriendlyTypeName = "@C:\\Windows\\inf\\unregmp2.exe,-9924" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wm\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\RIFFHandlers\WAVE c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wax c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wmv c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.asx = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.wax = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\{E436EB83-524F-11CE-9F53-0020AF0BA770}\{33FACFE0-A9BE-11d0-A520-00A0D10129C0\0 = "0,4,ffdfdfdf,3C53414d" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\RIFFHandlers c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wmdb c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile\NoOpen c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wmafile\shellex\ContextMenuHandlers\WMPBurnAudioCD c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Extensions\AU c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AVIFile\Extensions\WAV c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.wm = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.m3u c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.m3u\Media Type = "{e436eb83-524f-11ce-9f53-0020af0ba770}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.asx\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wvx\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.asf = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.m3u\Source Filter = "{e436ebb5-524f-11ce-9f53-0020af0ba770}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSBD\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\{e436eb83-524f-11ce-9f53-0020af0ba770}\{33FACFE0-A9BE-11d0-A520-00A0D10129C0 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.asf c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile\ = "Windows 媒体库" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WMP.WMDBFile\DefaultIcon c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.asf\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\. = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\AnimExtensions\.wmv = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mp3file\shellex c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.dvr-ms\Source Filter = "{C9F5FE02-F851-4eb5-99EE-AD602AF1E619}" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Media Type\Extensions\.wax\Animation = "dxmasf.dll,150" c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exepid process 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exepid process 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription pid process Token: SeDebugPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeTakeOwnershipPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeRestorePrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeBackupPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe Token: SeChangeNotifyPrivilege 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exedescription pid process target process PID 1720 wrote to memory of 360 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe wininit.exe PID 1720 wrote to memory of 360 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe wininit.exe PID 1720 wrote to memory of 360 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe wininit.exe PID 1720 wrote to memory of 360 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe wininit.exe PID 1720 wrote to memory of 360 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe wininit.exe PID 1720 wrote to memory of 384 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe csrss.exe PID 1720 wrote to memory of 384 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe csrss.exe PID 1720 wrote to memory of 384 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe csrss.exe PID 1720 wrote to memory of 384 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe csrss.exe PID 1720 wrote to memory of 384 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe csrss.exe PID 1720 wrote to memory of 420 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe winlogon.exe PID 1720 wrote to memory of 420 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe winlogon.exe PID 1720 wrote to memory of 420 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe winlogon.exe PID 1720 wrote to memory of 420 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe winlogon.exe PID 1720 wrote to memory of 420 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe winlogon.exe PID 1720 wrote to memory of 464 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe services.exe PID 1720 wrote to memory of 464 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe services.exe PID 1720 wrote to memory of 464 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe services.exe PID 1720 wrote to memory of 464 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe services.exe PID 1720 wrote to memory of 464 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe services.exe PID 1720 wrote to memory of 480 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsass.exe PID 1720 wrote to memory of 480 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsass.exe PID 1720 wrote to memory of 480 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsass.exe PID 1720 wrote to memory of 480 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsass.exe PID 1720 wrote to memory of 480 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsass.exe PID 1720 wrote to memory of 488 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsm.exe PID 1720 wrote to memory of 488 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsm.exe PID 1720 wrote to memory of 488 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsm.exe PID 1720 wrote to memory of 488 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsm.exe PID 1720 wrote to memory of 488 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe lsm.exe PID 1720 wrote to memory of 600 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 600 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 600 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 600 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 600 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 676 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 676 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 676 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 676 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 676 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 760 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 760 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 760 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 760 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 760 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 812 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 812 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 812 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 812 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 812 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 848 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 848 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 848 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 848 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 848 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 872 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 872 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 872 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 872 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 872 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 292 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 292 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 292 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe PID 1720 wrote to memory of 292 1720 c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵
-
C:\Windows\system32\wininit.exewininit.exe1⤵
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe"C:\Users\Admin\AppData\Local\Temp\c88994693b590c8bcedcb9707a4b4e059fc042f596fda2a91c88bdaa0c494893.exe"2⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\PROGRA~2\WI54FB~1\setup_wm.exeFilesize
1.9MB
MD5815eca02f8e9959a61d353ef15c0c004
SHA10281002f3198855d9a8589f7bbbc568b9f491012
SHA256f271e4d2d17fa43be0f10618cafa00b869afa2a6b57f7acb0f3ba6c03c8b05ce
SHA512714ac06d5e4327bd2691420e754d84227554e2694b2f4989270f5353dc73d41fd6973bd5269de53b8c654c5e8665edbaf8ed32a88351f4292838d4d3dd98ebfd
-
\PROGRA~2\WI54FB~1\setup_wm.exeFilesize
1.9MB
MD5815eca02f8e9959a61d353ef15c0c004
SHA10281002f3198855d9a8589f7bbbc568b9f491012
SHA256f271e4d2d17fa43be0f10618cafa00b869afa2a6b57f7acb0f3ba6c03c8b05ce
SHA512714ac06d5e4327bd2691420e754d84227554e2694b2f4989270f5353dc73d41fd6973bd5269de53b8c654c5e8665edbaf8ed32a88351f4292838d4d3dd98ebfd
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
172KB
MD527055763401a6d758def302de6e970e2
SHA18e656f9bc6f2af3b458a1603b3c817c5b6bc5b93
SHA2564a4aa959cbbcfe25e60bd4f5a5f86ec5c4402b216650bcdff1923945a02ce1b4
SHA512b000718f3ee95a968a98282277448c406bcfb7b2877b6aa97183abe8f1d8f44d61f003b43c5ae0dff5fd1e6ab9527480987765cd093ad20292dae0ede7b3b4e8
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
204KB
MD5c3a47a46e7f14c4d6c2c6761c5d566cb
SHA1483f3ddd37bccd375b98fb458997c96c06aa810e
SHA2566890b6c45343519572eb746950965455e28df5355e52fb7e7d5d0f2af75febbb
SHA5124e041b4053604077c7f4eebd2d0690dd66ed3ed8973295adb54131c3fadca24ebc2631a6cb60cd207542afe6bc39f812f25102f198e78b74948c99faf2e52529
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
236KB
MD59dd48e0e1af2139a0844a5af93e4dd35
SHA1faae3cd9801d07c2b61dbd4cf7e0272996f54f40
SHA2561bce0771cac93954614850d6554219419841bdb258dd9327f3f1de6c460fdbc5
SHA51222858abd9859d137971c178cb2ef12cc6bfee7f6b08ce6257f15d127b2000f11125d991091f880b6ed1b14719c9d0b615bb6c62519de511bb2735a3cdd44f0c2
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
268KB
MD5acc9863f6cabac14727a9949409ab2b6
SHA1115ae0133ef3f37059b110060a623b16075a6d26
SHA256bf86ec882a938383a3c86b3ad188ee9fe3a6fa40d0cd7d8164ca1769110e4f46
SHA512906473b0cef5f7276a90f312e10894b9882738e53de423982a6052fc9b7e4d4d3bc15d1bf69a95841283a5a7e803d2e158675ac00dc435379d68dbcdb35f60b1
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
300KB
MD5efc9432d9fcbd62bbdf83c528d31a065
SHA167ed1babaf693e64a529a84e9081ad1c79202a65
SHA256049cc8826576e31637ad69e433bdb1442d0ab36c24703708721352c9f5e42e44
SHA5120a2e776677274fd1369fe9d8891adfeeee44fcf2505a99e01228464cae9fcb87ba6b343b7963859b94b385fc8dba15cb6fed55c26e9458bac59d0b7c8b712e25
-
\PROGRA~2\WI54FB~1\wmplayer.exeFilesize
300KB
MD5efc9432d9fcbd62bbdf83c528d31a065
SHA167ed1babaf693e64a529a84e9081ad1c79202a65
SHA256049cc8826576e31637ad69e433bdb1442d0ab36c24703708721352c9f5e42e44
SHA5120a2e776677274fd1369fe9d8891adfeeee44fcf2505a99e01228464cae9fcb87ba6b343b7963859b94b385fc8dba15cb6fed55c26e9458bac59d0b7c8b712e25
-
\Program Files (x86)\Windows Media Player\wmplayer.exeFilesize
300KB
MD5efc9432d9fcbd62bbdf83c528d31a065
SHA167ed1babaf693e64a529a84e9081ad1c79202a65
SHA256049cc8826576e31637ad69e433bdb1442d0ab36c24703708721352c9f5e42e44
SHA5120a2e776677274fd1369fe9d8891adfeeee44fcf2505a99e01228464cae9fcb87ba6b343b7963859b94b385fc8dba15cb6fed55c26e9458bac59d0b7c8b712e25
-
\Program Files (x86)\Windows Media Player\wmplayer.exeFilesize
300KB
MD5efc9432d9fcbd62bbdf83c528d31a065
SHA167ed1babaf693e64a529a84e9081ad1c79202a65
SHA256049cc8826576e31637ad69e433bdb1442d0ab36c24703708721352c9f5e42e44
SHA5120a2e776677274fd1369fe9d8891adfeeee44fcf2505a99e01228464cae9fcb87ba6b343b7963859b94b385fc8dba15cb6fed55c26e9458bac59d0b7c8b712e25
-
memory/1720-62-0x00000000001F0000-0x0000000000224000-memory.dmpFilesize
208KB
-
memory/1720-65-0x0000000000D90000-0x0000000000DD4000-memory.dmpFilesize
272KB
-
memory/1720-66-0x00000000001F0000-0x000000000023C000-memory.dmpFilesize
304KB
-
memory/1720-64-0x0000000000CC0000-0x0000000000EB7000-memory.dmpFilesize
2.0MB
-
memory/1720-63-0x00000000001F0000-0x000000000022C000-memory.dmpFilesize
240KB
-
memory/1720-54-0x0000000076221000-0x0000000076223000-memory.dmpFilesize
8KB
-
memory/1720-61-0x0000000001000000-0x0000000001039000-memory.dmpFilesize
228KB
-
memory/1720-71-0x0000000001000000-0x0000000001039000-memory.dmpFilesize
228KB
-
memory/1720-72-0x0000000000C10000-0x0000000000C64000-memory.dmpFilesize
336KB