Analysis
-
max time kernel
1494s -
max time network
1841s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/01/2023, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
GTA San Andreas.zip
Resource
win10-20220812-en
General
-
Target
GTA San Andreas.zip
-
Size
1000.9MB
-
MD5
5b5de57572d05b64bf38def17fa0c205
-
SHA1
fc8d14d163b8bfa99c755a3904a6ae03e310d1a6
-
SHA256
74cb91fb31d0e2fd277169ef25cb2a87d9ac75e1104cae328714212261ccf9c6
-
SHA512
c1df7c056c7f22872449f863f1fe94dc3453a957d3b8011f81fb2567ba6e3f06e70467a2ad28daf86b633b883e2842aeef4ef0bee67ce976c435ab3f89ab92ba
-
SSDEEP
25165824:t2Y/S2Xpov8/DKz4UxuvmuCfKxfth6I5gJEWTKCed9FGx4:kkS2u0/DKLxuvOfKxfthRWmCed9FGx4
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000600000001adf8-179.dat acprotect behavioral1/files/0x000600000001adf9-181.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 2276 mtasa-1.5.9.exe 492 dxwebsetup.exe 1748 dxwsetup.exe 5060 infinst.exe 1832 infinst.exe 4920 infinst.exe 4412 infinst.exe 4392 infinst.exe 4600 infinst.exe 648 infinst.exe 2044 infinst.exe 1196 infinst.exe 1536 infinst.exe 2928 infinst.exe 3240 infinst.exe 4500 infinst.exe 4504 infinst.exe 4548 infinst.exe 1116 infinst.exe 608 infinst.exe 1344 infinst.exe 4696 infinst.exe 208 infinst.exe 1612 infinst.exe 3940 infinst.exe 636 infinst.exe 2404 infinst.exe 3568 infinst.exe 3348 infinst.exe 3540 infinst.exe 1776 infinst.exe 3696 infinst.exe 3844 infinst.exe 2168 infinst.exe 4884 infinst.exe 2996 infinst.exe 4312 infinst.exe 4316 infinst.exe 4320 infinst.exe 4296 infinst.exe 4280 infinst.exe 4960 infinst.exe 4908 infinst.exe 2776 infinst.exe 4272 infinst.exe 4632 infinst.exe 4900 infinst.exe 4336 infinst.exe 5076 infinst.exe 1832 infinst.exe 4348 infinst.exe 4092 infinst.exe 4392 infinst.exe 4976 infinst.exe 412 infinst.exe 864 infinst.exe 4740 infinst.exe 2436 infinst.exe 1716 infinst.exe 3668 infinst.exe 2104 infinst.exe 3788 infinst.exe 2320 infinst.exe 2272 infinst.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_2.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_8.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_7.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_9.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_5.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_1.dll" regsvr32.exe -
resource yara_rule behavioral1/files/0x000600000001adf8-179.dat upx behavioral1/files/0x000600000001adf9-181.dat upx behavioral1/memory/2276-190-0x00000000736A0000-0x00000000736AA000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 2276 mtasa-1.5.9.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 2444 regsvr32.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 1320 regsvr32.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 3208 regsvr32.exe 1748 dxwsetup.exe 1748 dxwsetup.exe 4552 regsvr32.exe 1748 dxwsetup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini bcastdvr.exe File created C:\Windows\assembly\Desktop.ini dxwsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini dxwsetup.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\M: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\E: dxwsetup.exe File opened (read-only) \??\F: dxwsetup.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx9_43_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2025.tmp dxwsetup.exe File created C:\Windows\system32\SET24EB.tmp infinst.exe File created C:\Windows\system32\SET4969.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2007_x3daudio_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_d3dx10_39_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx9_32.dll dxwsetup.exe File opened for modification C:\Windows\system32\d3dx10.dll infinst.exe File created C:\Windows\system32\SET437F.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2006_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2010_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\MDX_1.0.2904.0_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\SET21FD.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET2AB8.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET2DD3.tmp infinst.exe File opened for modification C:\Windows\system32\SET314D.tmp infinst.exe File created C:\Windows\SysWOW64\SET3F48.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Dec2005_d3dx9_28_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2871.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\D3DCompiler_37.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET412D.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\XAPOFX1_3.dll dxwsetup.exe File created C:\Windows\SysWOW64\SET2025.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET1703.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\D3DCompiler_35.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\D3DCompiler_36.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET373C.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET3CC8.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET47A2.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\SET2473.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine3_7.dll dxwsetup.exe File created C:\Windows\system32\SET55DE.tmp infinst.exe File opened for modification C:\Windows\system32\d3dx9_26.dll infinst.exe File opened for modification C:\Windows\system32\SET3EAB.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET3FD6.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET42A3.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\xactengine3_5.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx10_43_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\system32\xactengine2_1.dll infinst.exe File created C:\Windows\system32\SET314D.tmp infinst.exe File opened for modification C:\Windows\system32\d3dx10_38.dll infinst.exe File created C:\Windows\SysWOW64\SET38A7.tmp dxwsetup.exe File opened for modification C:\Windows\system32\XAPOFX1_3.dll infinst.exe File opened for modification C:\Windows\SysWOW64\SET53C9.tmp dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SETC6FF.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET411C.tmp infinst.exe File opened for modification C:\Windows\system32\SET44D5.tmp infinst.exe File opened for modification C:\Windows\system32\SET505F.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2009_d3dx9_42_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_d3dx9_43_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_d3dx10_35_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_d3dx10_40_x64.cab dxwsetup.exe File opened for modification C:\Windows\system32\SET15E6.tmp infinst.exe File created C:\Windows\SysWOW64\SET1E10.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET2EAF.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_d3dx9_35_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx10_33.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2D98.tmp dxwsetup.exe File opened for modification C:\Windows\system32\XAudio2_0.dll infinst.exe File opened for modification C:\Windows\system32\SET4032.tmp infinst.exe File opened for modification C:\Windows\system32\d3dx11_42.dll infinst.exe File opened for modification C:\Windows\SysWOW64\D3DX9_43.dll dxwsetup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\pvp\config.json gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\server\mods\deathmatch\resources\[gamemodes]\[stealth]\[maps]\sth-terminal.zip mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\okaru\COL\okaru.col gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\hr\menu_settings.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\hunterdot\client.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\monstertrucks\444.dff gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\si.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\cgui\images\radarset\26.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\cgui\images\radarset\57.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\minicooper\replace.lua gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\parachute\skydiving_cl.lua gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\gui\admin_stats.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\headshot.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\kg.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\core.dll mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\vi\menu_quick_connect.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cache\Code Cache\wasm\index-dir\the-real-index gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\fist.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\pinturas\efectos\lines.fx gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\nitro\client.lua gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\gui\admin_message.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\knifecur.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\en_US\menu_disconnect.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\mk\menu_quit.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\432.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\tyreadd\wheel\wheel5.dff gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\lb.png gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\93.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\90.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\generic.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\XInput9_1_0_mta.dll mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\424.png gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\area_zombies\skins\70.txd gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\cinemaexperience\c-main.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\fpsview\client_fp.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\race_formula1\files\mc2.dff gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\explosiontex\client.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\it\menu_quit.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\ja\menu_browse_servers.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\dodoAlienShip\replace.lua gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\colorpicker\sv.png gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\109.png gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\152.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\mg.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\de\client.po mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mta\logs\logfile.txt.1 Multi Theft Auto.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\tyreadd\wheel\wheel8.dff gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\sv\menu_map_editor.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\coachmod\437.dff gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\cgui\images\transferset\8.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\ro\menu_map_editor.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\f1\hotring.dff gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\br.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\127.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\pinturas\efectos\mild.fx gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\cgui\images\error.png mtasa-1.5.9.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\locale\uk\menu_browse_servers.png mtasa-1.5.9.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\crosshairs\crosshairs\3.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\am.png gta_sa.exe File opened for modification C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\admin\client\images\flags\by.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\sadlerm\543.txd gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\killmessages_new\icons\539.png gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\mods\deathmatch\resources\gore\sounds\hit3.aac gta_sa.exe File created C:\Program Files (x86)\MTA San Andreas 1.5\MTA\cgui\images\radarset\16.png mtasa-1.5.9.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\msdownld.tmp\AS59E701.tmp\Dec2006_d3dx10_00_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A112E.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A2D70.tmp\Apr2006_d3dx9_30_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A5CED.tmp\Jun2008_d3dx10_38_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS59CEF5.tmp\dxupdate.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS5A1DD0.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A069F.tmp\Mar2008_d3dx10_37_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A44B1.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A4DE9.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A5490.tmp\Mar2008_d3dx10_37_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A8FF3.tmp\Jun2010_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A9AA1.tmp dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59FA89.tmp\Jun2007_d3dx9_34_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A75A5.tmp\Mar2009_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A9756.tmp\MDX_1.0.2905.0_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A0FD6.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A3252.tmp\Aug2006_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A66D0.tmp\Aug2008_xact_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A6837.tmp\Aug2008_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A9AA1.tmp\MDX_1.0.2909.0_x86.cab dxwsetup.exe File created C:\Windows\assembly\tmp\1DO6YGQN\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A2FB2.tmp\Apr2006_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A4DE9.tmp\Nov2007_d3dx10_36_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A7D55.tmp\Aug2009_d3dcsx_42_x64.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2911.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A429E.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A6171.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A622C.tmp\Aug2008_d3dx9_39_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A6A2B.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A776A.tmp\Mar2009_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A847A.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A0B33.tmp\Aug2008_d3dx9_39_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A649D.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A76BE.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A79CB.tmp\Aug2009_d3dx9_42_x64.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.DirectDraw.dll dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS5A3F24.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A04E9.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A09EB.tmp\Jun2008_d3dx10_38_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A5617.tmp\Mar2008_x3daudio_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A5991.tmp\Mar2008_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A68F3.tmp\Nov2008_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A7CC9.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A89E8.tmp\Jun2010_d3dx9_43_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59EAD9.tmp\Apr2005_d3dx9_25_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59F0E4.tmp\Feb2006_d3dx9_29_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A1D24.tmp\Jun2010_d3dx10_43_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A2A63.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A4DE9.tmp\Nov2007_d3dx10_36_x64.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59E3A6.tmp\Apr2006_xinput_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A03D0.tmp\Nov2007_d3dx10_36_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A3BD8.tmp\Apr2007_d3dx9_33_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A4974.tmp\Aug2007_xact_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A58A7.tmp\Mar2008_xaudio_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS5A5F8C.tmp\Jun2008_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS5A87E5.tmp\Feb2010_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS59E8D6.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59F420.tmp\Oct2006_d3dx9_31_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS59FA89.tmp\Jun2007_d3dx9_34_x86.cab dxwsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags GamePanel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 GamePanel.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 bcastdvr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bcastdvr.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_4.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\ = "AudioReverb" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_7.dll" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_4.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{fac23f48-31f5-45a8-b49b-5225d61401aa}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_0.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_3.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e21a7345-eb21-468e-be50-804db97cf708} dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_6.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_8.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\ = "AudioVolumeMeter" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mtasa\URL Protocol mtasa-1.5.9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\ = "AudioReverb" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32 dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance mtasa-1.5.9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_6.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine3_3.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\ = "AudioReverb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mtasa\DefaultIcon\ = "C:\\Program Files (x86)\\MTA San Andreas 1.5\\Multi Theft Auto.exe" mtasa-1.5.9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\ = "AudioVolumeMeter" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\ = "XACT Engine" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\ = "XAudio2" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6f6ea3a9-2cf5-41cf-91c1-2170b1540063} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_5.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mtasa mtasa-1.5.9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\ = "XAudio2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\ = "XACT Engine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\ = "XACT Engine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_4.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32 dxwsetup.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E Multi Theft Auto.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 Multi Theft Auto.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 Multi Theft Auto.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 Multi Theft Auto.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 Multi Theft Auto.exe -
NTFS ADS 14 IoCs
description ioc Process File created C:\Documents and Settings\All Users\Application Data\MTA San Andreas All:NT gta_sa.exe File opened for modification C:\ProgramData:NT2 gta_sa.exe File created C:\Users\Admin\AppData\Roaming:NT gta_sa.exe File opened for modification C:\ProgramData:NT gta_sa.exe File created C:\Documents and Settings\All Users\Application Data\MTA San Andreas All:NT2 gta_sa.exe File opened for modification C:\Documents and Settings\All Users\Application Data\MTA San Andreas All:NT2 gta_sa.exe File created C:\Documents and Settings\All Users\Application Data:NT gta_sa.exe File created C:\Documents and Settings\All Users\Application Data:NT2 gta_sa.exe File opened for modification C:\ProgramData\MTA San Andreas All:NT2 gta_sa.exe File opened for modification C:\Users\Admin\AppData\Roaming:NT2 gta_sa.exe File opened for modification C:\Documents and Settings\All Users\Application Data:NT2 gta_sa.exe File opened for modification C:\Users\Admin\AppData\Roaming:NT gta_sa.exe File created C:\Users\Admin\AppData\Roaming:NT2 gta_sa.exe File opened for modification C:\ProgramData\MTA San Andreas All:NT gta_sa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 3996 Multi Theft Auto.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 4728 gta_sa.exe 4728 gta_sa.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe 3584 wow64_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2276 mtasa-1.5.9.exe 4728 gta_sa.exe 608 gta_sa.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found 616 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3496 7zG.exe Token: 35 3496 7zG.exe Token: SeSecurityPrivilege 3496 7zG.exe Token: SeSecurityPrivilege 3496 7zG.exe Token: SeBackupPrivilege 3480 vssvc.exe Token: SeRestorePrivilege 3480 vssvc.exe Token: SeAuditPrivilege 3480 vssvc.exe Token: SeBackupPrivilege 5108 srtasks.exe Token: SeRestorePrivilege 5108 srtasks.exe Token: SeSecurityPrivilege 5108 srtasks.exe Token: SeTakeOwnershipPrivilege 5108 srtasks.exe Token: SeBackupPrivilege 5108 srtasks.exe Token: SeRestorePrivilege 5108 srtasks.exe Token: SeSecurityPrivilege 5108 srtasks.exe Token: SeTakeOwnershipPrivilege 5108 srtasks.exe Token: 33 4788 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4788 AUDIODG.EXE Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe Token: SeCreatePagefilePrivilege 608 gta_sa.exe Token: SeShutdownPrivilege 608 gta_sa.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3496 7zG.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 4728 gta_sa.exe 608 gta_sa.exe 608 gta_sa.exe 608 gta_sa.exe 608 gta_sa.exe 608 gta_sa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 492 2276 mtasa-1.5.9.exe 75 PID 2276 wrote to memory of 492 2276 mtasa-1.5.9.exe 75 PID 2276 wrote to memory of 492 2276 mtasa-1.5.9.exe 75 PID 492 wrote to memory of 1748 492 dxwebsetup.exe 76 PID 492 wrote to memory of 1748 492 dxwebsetup.exe 76 PID 492 wrote to memory of 1748 492 dxwebsetup.exe 76 PID 1748 wrote to memory of 5060 1748 dxwsetup.exe 83 PID 1748 wrote to memory of 5060 1748 dxwsetup.exe 83 PID 1748 wrote to memory of 1832 1748 dxwsetup.exe 84 PID 1748 wrote to memory of 1832 1748 dxwsetup.exe 84 PID 1748 wrote to memory of 4920 1748 dxwsetup.exe 85 PID 1748 wrote to memory of 4920 1748 dxwsetup.exe 85 PID 1748 wrote to memory of 4412 1748 dxwsetup.exe 86 PID 1748 wrote to memory of 4412 1748 dxwsetup.exe 86 PID 1748 wrote to memory of 4392 1748 dxwsetup.exe 87 PID 1748 wrote to memory of 4392 1748 dxwsetup.exe 87 PID 1748 wrote to memory of 4600 1748 dxwsetup.exe 88 PID 1748 wrote to memory of 4600 1748 dxwsetup.exe 88 PID 1748 wrote to memory of 648 1748 dxwsetup.exe 89 PID 1748 wrote to memory of 648 1748 dxwsetup.exe 89 PID 1748 wrote to memory of 2444 1748 dxwsetup.exe 90 PID 1748 wrote to memory of 2444 1748 dxwsetup.exe 90 PID 1748 wrote to memory of 2044 1748 dxwsetup.exe 91 PID 1748 wrote to memory of 2044 1748 dxwsetup.exe 91 PID 1748 wrote to memory of 1196 1748 dxwsetup.exe 93 PID 1748 wrote to memory of 1196 1748 dxwsetup.exe 93 PID 1748 wrote to memory of 1320 1748 dxwsetup.exe 94 PID 1748 wrote to memory of 1320 1748 dxwsetup.exe 94 PID 1748 wrote to memory of 1536 1748 dxwsetup.exe 95 PID 1748 wrote to memory of 1536 1748 dxwsetup.exe 95 PID 1748 wrote to memory of 2928 1748 dxwsetup.exe 96 PID 1748 wrote to memory of 2928 1748 dxwsetup.exe 96 PID 1748 wrote to memory of 3208 1748 dxwsetup.exe 97 PID 1748 wrote to memory of 3208 1748 dxwsetup.exe 97 PID 1748 wrote to memory of 3240 1748 dxwsetup.exe 98 PID 1748 wrote to memory of 3240 1748 dxwsetup.exe 98 PID 1748 wrote to memory of 4500 1748 dxwsetup.exe 99 PID 1748 wrote to memory of 4500 1748 dxwsetup.exe 99 PID 1748 wrote to memory of 4552 1748 dxwsetup.exe 100 PID 1748 wrote to memory of 4552 1748 dxwsetup.exe 100 PID 1748 wrote to memory of 4504 1748 dxwsetup.exe 101 PID 1748 wrote to memory of 4504 1748 dxwsetup.exe 101 PID 1748 wrote to memory of 4548 1748 dxwsetup.exe 102 PID 1748 wrote to memory of 4548 1748 dxwsetup.exe 102 PID 1748 wrote to memory of 400 1748 dxwsetup.exe 103 PID 1748 wrote to memory of 400 1748 dxwsetup.exe 103 PID 1748 wrote to memory of 1116 1748 dxwsetup.exe 104 PID 1748 wrote to memory of 1116 1748 dxwsetup.exe 104 PID 1748 wrote to memory of 608 1748 dxwsetup.exe 105 PID 1748 wrote to memory of 608 1748 dxwsetup.exe 105 PID 1748 wrote to memory of 1344 1748 dxwsetup.exe 106 PID 1748 wrote to memory of 1344 1748 dxwsetup.exe 106 PID 1748 wrote to memory of 3896 1748 dxwsetup.exe 107 PID 1748 wrote to memory of 3896 1748 dxwsetup.exe 107 PID 1748 wrote to memory of 4696 1748 dxwsetup.exe 108 PID 1748 wrote to memory of 4696 1748 dxwsetup.exe 108 PID 1748 wrote to memory of 3340 1748 dxwsetup.exe 109 PID 1748 wrote to memory of 3340 1748 dxwsetup.exe 109 PID 1748 wrote to memory of 208 1748 dxwsetup.exe 110 PID 1748 wrote to memory of 208 1748 dxwsetup.exe 110 PID 1748 wrote to memory of 1612 1748 dxwsetup.exe 111 PID 1748 wrote to memory of 1612 1748 dxwsetup.exe 111 PID 1748 wrote to memory of 3940 1748 dxwsetup.exe 112 PID 1748 wrote to memory of 3940 1748 dxwsetup.exe 112
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\GTA San Andreas.zip"1⤵PID:4804
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4864
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\GTA San Andreas\" -spe -an -ai#7zMap19745:88:7zEvent169611⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3496
-
C:\Users\Admin\Desktop\GTA San Andreas\mtasa-1.5.9.exe"C:\Users\Admin\Desktop\GTA San Andreas\mtasa-1.5.9.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exe"C:\Users\Admin\AppData\Local\Temp\dxwebsetup.exe" /Q2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe /windowsupdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_24_x64.inf4⤵
- Executes dropped EXE
PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_25_x64.inf4⤵
- Executes dropped EXE
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_26_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_27_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_28_x64.inf4⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_29_x64.inf4⤵
- Executes dropped EXE
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT_x64.inf4⤵
- Executes dropped EXE
PID:648
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_0.dll4⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_30_x64.inf4⤵
- Executes dropped EXE
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_1_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1196
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_1.dll4⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:1320
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe xinput1_1_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_2_x64.inf4⤵
- Executes dropped EXE
PID:2928
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_2.dll4⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3208
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe xinput1_2_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_3_x64.inf4⤵
- Executes dropped EXE
PID:4500
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_3.dll4⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_31_x64.inf4⤵
- Executes dropped EXE
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_4_x64.inf4⤵
- Executes dropped EXE
PID:4548
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_4.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_32_x64.inf4⤵
- Executes dropped EXE
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_00_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_5_x64.inf4⤵
- Executes dropped EXE
PID:1344
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_5.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_6_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4696
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_6.dll4⤵
- Registers COM server for autorun
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_33_x64.inf4⤵
- Executes dropped EXE
PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_33_x64.inf4⤵
- Executes dropped EXE
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_7_x64.inf4⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_7.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver4⤵
- Executes dropped EXE
PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_34_x64.inf4⤵
- Executes dropped EXE
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_34_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3568
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_8_x64.inf4⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_8.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:3772
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_35_x64.inf4⤵
- Executes dropped EXE
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_35_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_9_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3696
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_9.dll4⤵
- Registers COM server for autorun
PID:4764
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx9_36_x64.inf4⤵
- Executes dropped EXE
PID:3844
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_36_x64.inf4⤵
- Executes dropped EXE
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_2_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4884
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT2_10_x64.inf4⤵
- Executes dropped EXE
PID:2996
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_10.dll4⤵
- Registers COM server for autorun
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_37_x64.inf4⤵
- Executes dropped EXE
PID:4312
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_37_x64.inf4⤵
- Executes dropped EXE
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_3_x64.inf4⤵
- Executes dropped EXE
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_0_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4296
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_0.dll4⤵
- Registers COM server for autorun
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_0_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4280
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_0.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_38_x64.inf4⤵
- Executes dropped EXE
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_38_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_4_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_1_x64.inf4⤵
- Executes dropped EXE
PID:4272
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_1.dll4⤵
- Registers COM server for autorun
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_1_x64.inf4⤵
- Executes dropped EXE
PID:4632
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_1.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_39_x64.inf4⤵
- Executes dropped EXE
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_39_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_2_x64.inf4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5076
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_2.dll4⤵
- Registers COM server for autorun
PID:4972
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_2_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1832
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_2.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:4244
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_5_x64.inf4⤵
- Executes dropped EXE
PID:4348
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_3_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4092
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_3.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_3_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4392
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_3.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_40_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_40_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:412
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_6_x64.inf4⤵
- Executes dropped EXE
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_4_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4740
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_4.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_4_x64.inf4⤵
- Executes dropped EXE
PID:2436
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_4.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_41_x64.inf4⤵
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_41_x64.inf4⤵
- Executes dropped EXE
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_42_x64.inf4⤵
- Executes dropped EXE
PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_42_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx11_42_x64.inf4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dcsx_42_x64.inf4⤵
- Executes dropped EXE
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DCompiler_42_x64.inf4⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_5_x64.inf4⤵PID:4560
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_5.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_5_x64.inf4⤵
- Drops file in System32 directory
PID:4504
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_5.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe X3DAudio1_7_x64.inf4⤵PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_6_x64.inf4⤵PID:1192
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_6.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_6_x64.inf4⤵
- Drops file in System32 directory
PID:372
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_6.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DX9_43_x64.inf4⤵PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx10_43_x64.inf4⤵PID:912
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dx11_43_x64.inf4⤵PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe d3dcsx_43_x64.inf4⤵PID:3336
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe D3DCompiler_43_x64.inf4⤵PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XACT3_7_x64.inf4⤵
- Drops file in Windows directory
PID:212
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_7.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXE7F1.tmp\infinst.exe XAudio2_7_x64.inf4⤵
- Drops file in System32 directory
PID:2204
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_7.dll4⤵
- Registers COM server for autorun
- Modifies registry class
PID:1244
-
-
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe"C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe" /nolaunch /kdinstall2⤵
- Drops file in Program Files directory
- Modifies system certificate store
PID:3952
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe"C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996 -
C:\Users\Admin\Desktop\GTA San Andreas\gta_sa.exe"C:\Users\Admin\Desktop\GTA San Andreas\gta_sa.exe"3⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4728 -
C:\Program Files (x86)\MTA San Andreas 1.5\mta\wow64_helper.exe"mta\wow64_helper.exe" BF=1396&BM=1392&CR=1384&SR=13884⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe"C:\Program Files (x86)\MTA San Andreas 1.5\Multi Theft Auto.exe"3⤵PID:4404
-
C:\Users\Admin\Desktop\GTA San Andreas\gta_sa.exe"C:\Users\Admin\Desktop\GTA San Andreas\gta_sa.exe"4⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:608 -
C:\Program Files (x86)\MTA San Andreas 1.5\mta\wow64_helper.exe"mta\wow64_helper.exe" BF=2992&BM=3048&CR=3052&SR=30125⤵PID:3152
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --mojo-platform-channel-handle=4280 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:25⤵PID:416
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --mojo-platform-channel-handle=4580 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:85⤵PID:4288
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --mojo-platform-channel-handle=3456 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:85⤵PID:4272
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=renderer --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --no-sandbox --autoplay-policy=no-user-gesture-required --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --disable-gpu-compositing --enable-blink-features=ShadowDOMV0,CustomElementsV0,HTMLImports --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=5076 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:15⤵PID:4612
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=renderer --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --first-renderer-process --no-sandbox --autoplay-policy=no-user-gesture-required --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --disable-gpu-compositing --enable-blink-features=ShadowDOMV0,CustomElementsV0,HTMLImports --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=5040 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:15⤵PID:3060
-
-
C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe"C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\CEFLauncher.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\locales" --log-severity=warning --resources-dir-path="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CEF\User Data" --kgfiv8n=PHQGHUMEAYLNLFDXFIRCVSCXGGBWKF --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --log-file="C:\Program Files (x86)\MTA San Andreas 1.5\MTA\CEF\cefdebug.txt" --mojo-platform-channel-handle=4276 --field-trial-handle=4448,i,12439036487292927785,4158151739743599476,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:25⤵PID:1820
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3624
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:4816
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 000000000003029E /startuptips1⤵
- Checks SCSI registry key(s)
PID:2648
-
C:\Windows\System32\bcastdvr.exe"C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:3824
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2c41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4788
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:3800
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000702EE /startuptips1⤵PID:2756
-
C:\Windows\System32\GamePanel.exe"C:\Windows\System32\GamePanel.exe" 00000000000802FE /startuptips1⤵PID:4508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD5b165df72e13e6af74d47013504319921
SHA1c45b192cf8904b7579bbc26c799aa7ffa5cbb1d4
SHA2561ec422bd6421c741eef57847260967f215913649901e21dd9c46eb1b3bb10906
SHA512859b6cd538735e5cc1c44f63d66b25588ad1ad32202cae606ff95b8c4a80f6a66db9ef7c5d43820010de9334b8bbbfb079939ce89ba0b760f5d651d7fa8268ed
-
Filesize
679B
MD52c4e850789bf9606aa4783cd9c26099a
SHA1036ee1c9ce3b8c495b3d155fe83e54c00a2611d4
SHA256f02bd6bb0ca1ed41698def1465c05f5b47ca459f886647f2d84f85c5c09dad9c
SHA512f09cb85eb7024c89024d12dd40021d1df046bb825a985bee1cb164a5c026693325bc5d64491702731ed5cb71b5af7eef34f8a922bee6d9d5881ff113dce23d21
-
Filesize
3.6MB
MD54c56e7c5b2a61353e534c7d15d05856d
SHA1e6e0a59a1e8217ae06cda29942537bc4be25d5a1
SHA25610b09474bfe4e2bb395472628646bc5f353fbfbec976575c45eeff49984ebaa6
SHA5126f630ea0764b4551d80a96f6c2b9391ed5741f14431eec951699c0e42b9434a45841d71bea5576b285cc20d38fd082b4cfc8062e4aa61f80aed9e57869cdd5d2
-
Filesize
667B
MD5fbed164855ae10f4c2d4eb238f414e6a
SHA17c3ec7759a23e77242bdc70c8033c013f2c794d6
SHA2569af2752d59fc38dd26d30769132a0887ff4123269c0dc4406f5107295e69c7c1
SHA51268e7d441aa0b842329f63ed34bb392d1582b635eee1bd1c8a797e9a59303fc85b0d842de0fd29d88fa3c8ac0bb6d858671101633161487d6353e73c862fb228d
-
Filesize
3.6MB
MD544f5c5e27d6825e4e62420bc29b8b533
SHA1046455294e199af99c7c2d9174d25b230e6fd0e6
SHA25630b06dbbd202494bae3b87487e7273adcffd17a9d2c29977030fde0570aa841b
SHA5120c9adca329c386cb2caf0f36d672ba326929f02c29748b13188bb7ade3fbec9131ce86a6bf1b3064a2fbb8de6b8adc34208f667df31c5db182918e79744a830b
-
Filesize
667B
MD5831fb8a4394d256a5d7c15c16757912c
SHA1961d7274de32808c4dce971d943ddd79a12e8d49
SHA2566c152334efa5b011a44f160a23a5c58b66f3bcebbf6c4bc0722a526d36699a4b
SHA51240f3d40cb40bd887ffa15a5fc60468e48f06bb1704d19061f9b51a9e2c15ab363644aac4618276910f6fc8d90f1083931916a9943306dcf736fc72feba2385c8
-
Filesize
3.6MB
MD5914c3237e4d145a18dcd1d0d4c8659e1
SHA132503c8f8d80551c896bc2dbf2c8ae3c490f0ec4
SHA256f9dd288c9895973f8db1856d172779041c6dee173ad1ef53b1727fc85cb6b75f
SHA512c760b5b0b5507da8f2336b2b0625f344f28fac33da16a7d8771a122b0ba54ebf5d2a2f702f4ebb83ded746f38d63abd378a9aa3b3e50579fab7c047fe38e2c02
-
Filesize
667B
MD5925202b48a83647982cb0d55ab10668d
SHA1b04a29859288545a3f8f9daf6aa39bb7a8b4b59c
SHA2566f56c5be97e703584dd832f35ebdc78c6aeb07cc9df155d47ed9903142086488
SHA51272b6b4b951d04ecee1c4ea613734113b864a542dcc554e86e8d7b7fa2b0d05a1e7623051ca0809c3e934cf28cadca54acb76ad515f71a263ffd17c3872677b69
-
Filesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
Filesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
Filesize
56KB
MD5afd73a6c2e1172e4075c8b37816eb391
SHA1eceaeaca967c9ac3239f65b4d4f75d994dabd7ee
SHA256ea544793b661304f31f18e9d107a4b4b46bd198d806f6366870746fe52e01df9
SHA5125c313c81808c664f056ccd64784e607439ed45874fe322afdf690aba6d8dc54c2b54e42f69ce003bd0aefd0ebe5518f102f846aaa96254d3218d62b4f5dc463b
-
Filesize
56KB
MD5afd73a6c2e1172e4075c8b37816eb391
SHA1eceaeaca967c9ac3239f65b4d4f75d994dabd7ee
SHA256ea544793b661304f31f18e9d107a4b4b46bd198d806f6366870746fe52e01df9
SHA5125c313c81808c664f056ccd64784e607439ed45874fe322afdf690aba6d8dc54c2b54e42f69ce003bd0aefd0ebe5518f102f846aaa96254d3218d62b4f5dc463b
-
Filesize
59KB
MD544f9c211701098d36dde44c5cf3afd63
SHA1c020bb7dfb5932c5cbe19ca5d9feffde05781134
SHA256d636d29f6019bcc232e62553728871097097aae05a6426bb86af15720de2e0e6
SHA512b8aa96c4b8861b76f0c5c606f5458cc1e06e6e2ecd684f9ebde9e68a4d5057e84413816d78f88525fef63f4863a4b498c6d8cbc74faf8c555029dde7e34dec5a
-
Filesize
59KB
MD544f9c211701098d36dde44c5cf3afd63
SHA1c020bb7dfb5932c5cbe19ca5d9feffde05781134
SHA256d636d29f6019bcc232e62553728871097097aae05a6426bb86af15720de2e0e6
SHA512b8aa96c4b8861b76f0c5c606f5458cc1e06e6e2ecd684f9ebde9e68a4d5057e84413816d78f88525fef63f4863a4b498c6d8cbc74faf8c555029dde7e34dec5a
-
Filesize
61KB
MD5def5caad8a452d6515bd40df6dd6b51f
SHA1c26a793ef0a117b9b960caaabf31fef6036576de
SHA25634df5a253007edd15d14f28a333bac638fe961f0f3941b192d7a6a760c2635fe
SHA5122f3984f126de1c89cb815e00587d41c9bc32358530d9d2931ef917f6d3a45422a80caf6bcbb1615a61e51d7cb81532795cafefdfc39f9dab7c2f7d70cc22a1bf
-
Filesize
61KB
MD5def5caad8a452d6515bd40df6dd6b51f
SHA1c26a793ef0a117b9b960caaabf31fef6036576de
SHA25634df5a253007edd15d14f28a333bac638fe961f0f3941b192d7a6a760c2635fe
SHA5122f3984f126de1c89cb815e00587d41c9bc32358530d9d2931ef917f6d3a45422a80caf6bcbb1615a61e51d7cb81532795cafefdfc39f9dab7c2f7d70cc22a1bf
-
Filesize
65KB
MD560db6abbe4d4f22d87cd15c9bdae79e7
SHA14dc25047507cb28a0855c8c2f5bf11fb0dbf1366
SHA25610e420d85c6d2905d9ca076681c3b1d648bc1b5b3893c8eb5ff420d2b964f0cb
SHA512846fc61367cc3fff2c0516c1872f1380e120684853fa9e4a6d077f94c83c99dfdc9f3d2cf7de587fe3988a3224b7ea7e0f27c7a76e11c5a6daaf03ed15864476
-
Filesize
65KB
MD560db6abbe4d4f22d87cd15c9bdae79e7
SHA14dc25047507cb28a0855c8c2f5bf11fb0dbf1366
SHA25610e420d85c6d2905d9ca076681c3b1d648bc1b5b3893c8eb5ff420d2b964f0cb
SHA512846fc61367cc3fff2c0516c1872f1380e120684853fa9e4a6d077f94c83c99dfdc9f3d2cf7de587fe3988a3224b7ea7e0f27c7a76e11c5a6daaf03ed15864476
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
56KB
MD57b1fbe9f5f43b2261234b78fe115cf8e
SHA1dd0f256ae38b4c4771e1d1ec001627017b7bb741
SHA256762ff640013db2bd4109d7df43a867303093815751129bd1e33f16bf02e52cce
SHA512d21935a9867c0f2f7084917c79fbb1da885a1bfd4793cf669ff4da8c777b3a201857250bfb7c2b616625a8d3573c68395d210446d2c284b41cf09cc7cbb07885
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
477B
MD5ad8982eaa02c7ad4d7cdcbc248caa941
SHA14ccd8e038d73a5361d754c7598ed238fc040d16b
SHA256d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00
SHA5125c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28
-
Filesize
288KB
MD52cbd6ad183914a0c554f0739069e77d7
SHA17bf35f2afca666078db35ca95130beb2e3782212
SHA2562cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
SHA512ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
Filesize
288KB
MD52cbd6ad183914a0c554f0739069e77d7
SHA17bf35f2afca666078db35ca95130beb2e3782212
SHA2562cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f
SHA512ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10
-
Filesize
99.1MB
MD53a18551eb8a004be178629a088ba2763
SHA1586612e58bcbee1d6ee86804709fcc3cd7cc6143
SHA2561a1cf5342a69dc344d5b4e71f4822b93440377952f5bd5ca53da9c06d325624d
SHA512c4dcbd716b5267f0df3465a9ef16ba18f3b29222ce64e8d0269c2defcf572dfcc66e578083a26e47a6def9ed4b7eeacc0b8bc99ceb0c537d6ab1c396660a9ab1
-
Filesize
99.1MB
MD53a18551eb8a004be178629a088ba2763
SHA1586612e58bcbee1d6ee86804709fcc3cd7cc6143
SHA2561a1cf5342a69dc344d5b4e71f4822b93440377952f5bd5ca53da9c06d325624d
SHA512c4dcbd716b5267f0df3465a9ef16ba18f3b29222ce64e8d0269c2defcf572dfcc66e578083a26e47a6def9ed4b7eeacc0b8bc99ceb0c537d6ab1c396660a9ab1
-
Filesize
315B
MD5455e4b65665999751cb12b4519844e01
SHA14bc7d1107012eb8841ad9bc0c11a7b256b2cc9f1
SHA2567320d995daef51926f14537db1da9f26c29256efadd369eb06914d0a9ed6b345
SHA5126903cf51841abbd04057f52c277632530f39d7388027ce5ffaf71cabe85fccd4b4b501ac09836e98f4e63ebeda2219f37ea5f428285a36bc6c43cc5685ca0373
-
Filesize
511B
MD5de4851b0ee7949c4f3d85900b15850d4
SHA1b939cb31bd11113410ce17d7f1352752b5b4e6e9
SHA256b098b6555571c0255f3203b4fd514b944fdeb13c3e19a032565d73e917a800f7
SHA5128be66246de6f09ef3f9de230a69adcc89db9be5658ddf64b3c0e5568a99f78267b4f9e7f5f9c213c484b8c49e19288fa004f2087a10358530db137169055fccc
-
Filesize
707B
MD59d65d483ffe7c80a0ccec678cdadcade
SHA123c90fbb4d60b8a4eb5c2af32c9273b5b7eb97c4
SHA256f024266818993ed644bb3e3a1431da8893f24a26dc91398c7d736a1d838d1f46
SHA51247baad17d6f071b17dd78647123df8a3d93e526831f75fb41631d0eadc4f6618e924f4379c131a9004ea8a29ba361478fa5397b09cefc9ea545932ae37e03a0e
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
Filesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
Filesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
Filesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
Filesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
Filesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
Filesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
Filesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
Filesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
Filesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
Filesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
Filesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
Filesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
Filesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
Filesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
Filesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
8KB
MD565d017ba65785b43720de6c9979a2e8c
SHA10aed2846e1b338077bae5a7f756c345a5c90d8a9
SHA256ccc6aaf1071d9077475b574d9bf1fc23de40a06547fc90cf4255a44d3bf631ac
SHA51231a19105892d5a9b49eb81a90a2330c342a5504fa4940b99a12279a63e1a19ee5d4b257d0900794ff7021a09408995a5d12e95cc38f09cf12fb2fd860d205c95
-
Filesize
15KB
MD589351a0a6a89519c86c5531e20dab9ea
SHA19e801aaaae9e70d8f7fc52f6f12cedc55e4c8a00
SHA256f530069ef87a1c163c4fd63a3d5b053420ce3d7a98739c70211b4a99f90d6277
SHA51213168fa828b581383e5f64d3b54be357e98d2eb9362b45685e7426ffc2f0696ab432cc8a3f374ce8abd03c096f1662d954877afa886fc4aa74709e6044b75c08
-
Filesize
5KB
MD5a1cd3f159ef78d9ace162f067b544fd9
SHA172671fdf4bfeeb99b392685bf01081b4a0b3ae66
SHA25647b9e251c9c90f43e3524965aecc07bd53c8e09c5b9f9862b44c306667e2b0b6
SHA512ccc70166c7d7746cd42cd0cec322b2adf4a478ff67c35d465f0f0f5b2b369c996a95557b678c09cb21b8311d8a91eed4196ddc218ea7d510f81464669b911362
-
Filesize
15KB
MD57caaf58a526da33c24cbe122e7839693
SHA17687112cb6593947226f8a8319d6e2d0cdef3b11
SHA25619debdc4c0b6f5dc9582bda7a2c1146516f683e8d741190e6d4b81ad10b33f61
SHA512aafd0cb2abb3d2dee95c2d037a6a1a5bff0518e3210ced0c39e6d6696e4fab4734df01476fe9dcb208f02c529cd03346bc8b7f3319ae49701bbf2cb453d59bae
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
6KB
MD57fc4723bb0a4118e5f91047021d1aacd
SHA1092a321a21d802045105ecc8cd3c9d7d2c6da923
SHA2568f9bfeebfa3b070b116de61a63271b6c25af0dbb4bbfb4ae73e334d1f8517efd
SHA5121fe86533987ff1c4d446b231dc1ff2c3bbce224ae91b73ffead539f08740bfb06d2f40f1aedf0571106dc4e12eec27aa32018c2bf5361b7488c07b4d90800f02
-
Filesize
9KB
MD54ccc4a742d4423f2f0ed744fd9c81f63
SHA1704f00a1acc327fd879cf75fc90d0b8f927c36bc
SHA256416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6
SHA512790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405