Analysis
-
max time kernel
2452s -
max time network
2111s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2023, 21:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamunlocked.net/scooby-doo-and-the-spooky-swamp-free-download/
Resource
win10v2004-20220812-en
General
-
Target
https://steamunlocked.net/scooby-doo-and-the-spooky-swamp-free-download/
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1112 dxwsetup.exe 2268 infinst.exe 4836 infinst.exe 4320 infinst.exe 1252 infinst.exe 4776 infinst.exe 3896 infinst.exe 1780 infinst.exe 3176 infinst.exe 3348 infinst.exe 1796 infinst.exe 4464 infinst.exe 4676 infinst.exe 4668 infinst.exe 4240 infinst.exe 1364 infinst.exe 2196 infinst.exe 2316 infinst.exe 812 infinst.exe 4200 infinst.exe 4036 infinst.exe 3524 infinst.exe 1000 infinst.exe 2460 infinst.exe 1972 infinst.exe 3064 infinst.exe 3088 infinst.exe 4428 infinst.exe 3944 infinst.exe 4756 infinst.exe 864 infinst.exe 1540 infinst.exe 1444 infinst.exe 4604 infinst.exe 4064 infinst.exe 3916 infinst.exe 1096 infinst.exe 4500 infinst.exe 5048 infinst.exe 452 infinst.exe 3872 infinst.exe 760 infinst.exe 3948 infinst.exe 3384 infinst.exe 4136 infinst.exe 2528 infinst.exe 700 infinst.exe 400 infinst.exe 2736 infinst.exe 2348 infinst.exe 2000 infinst.exe 4360 infinst.exe 4372 infinst.exe 5112 infinst.exe 3220 infinst.exe 2964 infinst.exe 2016 infinst.exe 316 infinst.exe 2780 infinst.exe 2280 infinst.exe 5080 infinst.exe 116 infinst.exe 4444 infinst.exe 3452 infinst.exe -
Registers COM server for autorun 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_0.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c9b6dde-6809-46e6-a278-9b6a97588670}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{54b68bc7-3a45-416b-a8c9-19bf19ec1df5}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_10.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_5.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_9.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{343e68e6-8f82-4a8d-a2da-6e9a944b378c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d3332f02-3dd0-4de9-9aec-20d85c4111b6}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6a93130e-1d53-41d1-a9cf-e758800bb179}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_7.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d06df0d0-8518-441e-822f-5451d5c595b8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8bb7778b-645b-4475-9a73-1de3170bd3af}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_6.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0aa000aa-f404-11d9-bd7a-0010dc4f8f81}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ThreadingModel = "Both" regsvr32.exe -
Loads dropped DLL 64 IoCs
pid Process 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 728 regsvr32.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 1112 dxwsetup.exe 668 regsvr32.exe 1112 dxwsetup.exe 4164 regsvr32.exe 1112 dxwsetup.exe 4772 regsvr32.exe 1112 dxwsetup.exe 3736 regsvr32.exe 1112 dxwsetup.exe 2652 regsvr32.exe 2652 regsvr32.exe 1112 dxwsetup.exe 3380 regsvr32.exe 3380 regsvr32.exe 1112 dxwsetup.exe 2752 regsvr32.exe 2752 regsvr32.exe 1112 dxwsetup.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dxwebsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dxwebsetup.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe File created C:\Windows\assembly\Desktop.ini dxwsetup.exe File opened for modification C:\Windows\assembly\Desktop.ini dxwsetup.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: dxwsetup.exe File opened (read-only) \??\P: dxwsetup.exe File opened (read-only) \??\V: dxwsetup.exe File opened (read-only) \??\W: dxwsetup.exe File opened (read-only) \??\B: dxwsetup.exe File opened (read-only) \??\F: dxwsetup.exe File opened (read-only) \??\I: dxwsetup.exe File opened (read-only) \??\K: dxwsetup.exe File opened (read-only) \??\N: dxwsetup.exe File opened (read-only) \??\Q: dxwsetup.exe File opened (read-only) \??\O: dxwsetup.exe File opened (read-only) \??\T: dxwsetup.exe File opened (read-only) \??\U: dxwsetup.exe File opened (read-only) \??\Y: dxwsetup.exe File opened (read-only) \??\Z: dxwsetup.exe File opened (read-only) \??\A: dxwsetup.exe File opened (read-only) \??\G: dxwsetup.exe File opened (read-only) \??\H: dxwsetup.exe File opened (read-only) \??\R: dxwsetup.exe File opened (read-only) \??\S: dxwsetup.exe File opened (read-only) \??\X: dxwsetup.exe File opened (read-only) \??\E: dxwsetup.exe File opened (read-only) \??\J: dxwsetup.exe File opened (read-only) \??\M: dxwsetup.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\SET4B9F.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET5637.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET5FFF.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine3_7.dll dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Nov2008_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2CFD.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET3563.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2009_d3dx10_41_x86.cab dxwsetup.exe File opened for modification C:\Windows\system32\SET47D0.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\d3dx11_43.dll dxwsetup.exe File created C:\Windows\SysWOW64\SET2893.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET55CF.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET5A8B.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\d3dx10_43.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET6819.tmp infinst.exe File created C:\Windows\system32\SET3590.tmp infinst.exe File opened for modification C:\Windows\system32\xactengine2_8.dll infinst.exe File created C:\Windows\SysWOW64\SET4D27.tmp dxwsetup.exe File created C:\Windows\system32\SET5CFE.tmp infinst.exe File opened for modification C:\Windows\system32\SET3FF0.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET60EB.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET620F.tmp infinst.exe File opened for modification C:\Windows\system32\SET63B4.tmp infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Mar2008_d3dx9_37_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_xaudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine2_5.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET3968.tmp infinst.exe File created C:\Windows\SysWOW64\SET5A8B.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Oct2006_d3dx9_31_x86.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET530E.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET5457.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET5864.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\xactengine2_6.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\D3DCompiler_34.dll dxwsetup.exe File opened for modification C:\Windows\system32\x3daudio1_2.dll infinst.exe File opened for modification C:\Windows\SysWOW64\XAPOFX1_3.dll dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET65A5.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2006_xact_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\system32\SET433C.tmp infinst.exe File opened for modification C:\Windows\system32\SET4FB0.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\SET36EE.tmp dxwsetup.exe File created C:\Windows\SysWOW64\SET3D61.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\XAudio2_3.dll dxwsetup.exe File created C:\Windows\SysWOW64\SET6360.tmp dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2008_d3dx10_39_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Aug2007_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2BF2.tmp dxwsetup.exe File opened for modification C:\Windows\system32\d3dx9_32.dll infinst.exe File opened for modification C:\Windows\system32\SET2B8D.tmp infinst.exe File created C:\Windows\system32\SET364C.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\xactengine2_8.dll dxwsetup.exe File opened for modification C:\Windows\system32\XAPOFX1_3.dll infinst.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Jun2010_D3DCompiler_43_x86.cab dxwsetup.exe File created C:\Windows\SysWOW64\DirectX\WebSetup\Feb2007_xact_x64.cab dxwsetup.exe File created C:\Windows\SysWOW64\SET2585.tmp dxwsetup.exe File opened for modification C:\Windows\SysWOW64\SET2B25.tmp dxwsetup.exe File opened for modification C:\Windows\system32\SET59E1.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\XAPOFX1_2.dll dxwsetup.exe File opened for modification C:\Windows\system32\SET532B.tmp infinst.exe File opened for modification C:\Windows\system32\SET589A.tmp infinst.exe File opened for modification C:\Windows\SysWOW64\D3DX9_41.dll dxwsetup.exe File created C:\Windows\SysWOW64\directx\websetup\SET8E10.tmp dxwsetup.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\msdownld.tmp\AS7527D0.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS757F46.tmp\Mar2008_d3dx9_37_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS758C85.tmp\Jun2008_xact_x64.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS758EF6.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75B4CD.tmp dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File created C:\Windows\assembly\tmp\ZJ7UBF2L\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File created C:\Windows\assembly\tmp\1DO6YGQN\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS751EA8.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS756A95.tmp\Apr2007_d3dx9_33_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS756A95.tmp\Apr2007_d3dx9_33_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS759704.tmp dxwsetup.exe File opened for modification C:\Windows\assembly\tmp\30ROE94Y\__AssemblyInfo__.ini dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75A29D.tmp\Mar2009_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File opened for modification C:\Windows\msdownld.tmp\AS7512F0.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS751BC9.tmp\Aug2005_d3dx9_27_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS757CF4.tmp\Nov2007_x3daudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS758159.tmp\Mar2008_d3dx10_37_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS7595DB.tmp\Nov2008_x3daudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS755577.tmp\Aug2005_d3dx9_27_x64.cab dxwsetup.exe File created C:\Windows\assembly\tmp\O32JTAQU\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS753462.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS753D2C.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS758159.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS7527D0.tmp\Jun2007_d3dx9_34_x86.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2910.0\Microsoft.DirectX.Direct3DX.dll dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.DirectPlay.dll dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.DirectSound.dll dxwsetup.exe File created C:\Windows\msdownld.tmp\AS754848.tmp\Aug2009_D3DCompiler_42_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS756C99.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75833E.tmp\Mar2008_x3daudio_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS7595DB.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75C6A0.tmp dxwsetup.exe File created C:\Windows\msdownld.tmp\AS7511A8.tmp\Apr2006_xinput_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS7593E7.tmp\Aug2008_xaudio_x86.cab dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS755DC4.tmp\Apr2006_xact_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75674A.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS7573AD.tmp\Jun2007_xact_x64.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.Diagnostics.dll dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2902.0\Microsoft.DirectX.DirectInput.dll dxwsetup.exe File created C:\Windows\msdownld.tmp\AS754F5D.tmp\Feb2005_d3dx9_24_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75714C.tmp\Jun2007_d3dx10_34_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS759C54.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS759FCE.tmp dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75B673.tmp\Feb2010_xaudio_x64.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS75C875.tmp\MDX_1.0.2910.0_x86.cab dxwsetup.exe File created C:\Windows\Microsoft.NET\DirectX for Managed Code\1.0.2904.0\Microsoft.DirectX.Direct3DX.xml dxwsetup.exe File opened for modification C:\Windows\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS75191A.tmp\Apr2005_d3dx9_25_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75200F.tmp\Apr2006_d3dx9_30_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS75331A.tmp\Mar2008_d3dx10_37_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS757488.tmp\Aug2007_d3dx9_35_x64.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS75A5F8.tmp dxwsetup.exe File opened for modification C:\Windows\Logs\DirectX.log infinst.exe File created C:\Windows\msdownld.tmp\AS75C344.tmp\MDX_1.0.2904.0_x86.cab dxwsetup.exe File opened for modification C:\Windows\msdownld.tmp\AS751254.tmp\Aug2006_xinput_x86.cab dxwsetup.exe File created C:\Windows\msdownld.tmp\AS753462.tmp\Jun2008_d3dx9_38_x86.cab dxwsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e8baa059b9aed801 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\uploadhaven.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "197017391" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31007467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "300177722" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{3694640F-8EDE-11ED-B696-DEF0885D2AEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea276adc2656c04d84fa5d2f5ddf9c5b00000000020000000000106600000001000020000000ef9ab6469646e63620b16684a42fe5c4a48037b0dfe20d3ed4e39f0223c61bb0000000000e80000000020000200000007c9d27dee94f62954114045072d52fc375eb23dfe82e45ab0386ca01a7b7734f20000000e7b65fb09a6887b121d841c0f8da0a1cd222307f15279fdba360b372c8ecff31400000002dd5301a1003e08495050584890938b3294a4aab63138af8c16e7089d9a13f308aca4c4e7d6dd45eb434e2cd4aa4a774944e1a3919000827e4144289a35202f6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f053210ceb22d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31007467" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 302d4501eb22d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\DOMStorage\uploadhaven.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\uploadhaven.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ea276adc2656c04d84fa5d2f5ddf9c5b00000000020000000000106600000001000020000000ca9df3f4fba16484940aa7c190b88c058c017245254c90c20bd1081298171f9b000000000e80000000020000200000001cdb17d3b11a8cfb391c89f84e641a355406cd62147ef0a2e47449a47e5a075820000000b552f7820e9f0c0853a8df946a92115b1d9c2ab71be8c5f7fc18ea5bd50bf6ce40000000ae87370094c001b3d2248848497f214c94b153bfd784a4726bfc9713a0f198f488da6003527577185815f356e77c6af96478254ddf2889f0fb3b772477d23001 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31007467" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{17DC54DC-1515-4EF5-968B-155468CCD4E1}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "187798748" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31007467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "379897032" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "187798748" iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f4769300-b949-4df9-b333-00d33932e9a6}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_1.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{f5ca7b34-8055-42c0-b836-216129eb7e30}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1138472b-d187-44e9-81f2-ae1b0e7785f1}\InProcServer32\ = "C:\\Windows\\system32\\xactengine2_3.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{65d822a4-4799-42c6-9b18-d26cf66dd320}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32\ = "C:\\Windows\\system32\\xactengine3_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_2.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{c7338b95-52b8-4542-aa79-42eb016c8c1c}\ = "AudioVolumeMeter" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9cab402c-1d37-44b4-886d-fa4f36170a4c}\ = "AudioReverb" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\InProcServer32 dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c60fae90-4183-4a3f-b2f7-ac1dc49b0e5c}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{629cf0de-3ecc-41e7-9926-f7e43eebec51}\InProcServer32 dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0977d092-2d95-4e43-8d42-9ddcc2545ed5}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5a508685-a254-4fba-9b82-9a24b00306af}\ = "XAudio2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4c5e637a-16c7-4de3-9c46-5ed22181962d}\ = "XAudio2" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{962f5027-99be-4692-a468-85802cf8de61}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3b80ee2a-b0f5-4780-9e30-90cb39685b03}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_2.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c0c56f46-29b1-44e9-9939-a32ce86867e2}\ = "AudioVolumeMeter" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\ = "AudioReverb" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bcc782bc-6492-4c22-8c35-f5d72fe73c6e}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine2_7.dll" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{03219e78-5bc3-44d1-b92e-f63d89cc6526}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_4.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cac1105f-619b-4d04-831a-44e1cbf12d57}\InProcServer32\ = "C:\\Windows\\SysWow64\\XAudio2_7.dll" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{b802058a-464a-42db-bc10-b650d6f2586a}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{248d8a3b-6256-44d3-a018-2ac96c459f47}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\ = "AudioVolumeMeter" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{94c1affa-66e7-4961-9521-cfdef3128d4f}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\ = "XACT Engine" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c1e3f122-a2ea-442c-854f-20d98f8357a1}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_1.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e180344b-ac83-4483-959e-18a5c56a5e19}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{77c56bf4-18a1-42b0-88af-5072ce814949}\ = "XACT Engine" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d} dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_6.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cecec95a-d894-491a-bee3-5e106fb59f2d}\ = "AudioReverb" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f1b577e-5e5a-4e8a-ba73-c657ea8e8598}\ = "XACT Engine" dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{bc3e0fc6-2e0d-4c45-bc61-d9c328319bd8}\ = "XACT Engine" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3a2495ce-31d0-435b-8ccf-e9f0843fd960} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{e21a7345-eb21-468e-be50-804db97cf708}\InProcServer32 dxwsetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{074b110f-7f58-4743-aea5-12f15b5074ed}\InProcServer32\ = "C:\\Windows\\SysWow64\\xactengine3_5.dll" dxwsetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{cd0d66ec-8057-43f5-acbd-66dfb36fd78c} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{e48c5a3f-93ef-43bb-a092-2c7ceb946f27}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2139e6da-c341-4774-9ac3-b4e026347f64}\InProcServer32\ = "C:\\Windows\\system32\\XAudio2_5.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3eda9b49-2085-498b-9bb2-39a6778493de}\InProcServer32\ThreadingModel = "Both" dxwsetup.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 1604 vssvc.exe Token: SeRestorePrivilege 1604 vssvc.exe Token: SeAuditPrivilege 1604 vssvc.exe Token: SeBackupPrivilege 5056 srtasks.exe Token: SeRestorePrivilege 5056 srtasks.exe Token: SeSecurityPrivilege 5056 srtasks.exe Token: SeTakeOwnershipPrivilege 5056 srtasks.exe Token: SeBackupPrivilege 5056 srtasks.exe Token: SeRestorePrivilege 5056 srtasks.exe Token: SeSecurityPrivilege 5056 srtasks.exe Token: SeTakeOwnershipPrivilege 5056 srtasks.exe Token: 33 380 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 380 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 4816 Scooby2.exe 2392 OpenWith.exe 4816 Scooby2.exe 4844 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 628 1976 iexplore.exe 79 PID 1976 wrote to memory of 628 1976 iexplore.exe 79 PID 1976 wrote to memory of 628 1976 iexplore.exe 79 PID 1976 wrote to memory of 3068 1976 iexplore.exe 83 PID 1976 wrote to memory of 3068 1976 iexplore.exe 83 PID 1976 wrote to memory of 3068 1976 iexplore.exe 83 PID 4416 wrote to memory of 1112 4416 dxwebsetup.exe 129 PID 4416 wrote to memory of 1112 4416 dxwebsetup.exe 129 PID 4416 wrote to memory of 1112 4416 dxwebsetup.exe 129 PID 1112 wrote to memory of 2268 1112 dxwsetup.exe 143 PID 1112 wrote to memory of 2268 1112 dxwsetup.exe 143 PID 1112 wrote to memory of 4836 1112 dxwsetup.exe 144 PID 1112 wrote to memory of 4836 1112 dxwsetup.exe 144 PID 1112 wrote to memory of 4320 1112 dxwsetup.exe 145 PID 1112 wrote to memory of 4320 1112 dxwsetup.exe 145 PID 1112 wrote to memory of 1252 1112 dxwsetup.exe 146 PID 1112 wrote to memory of 1252 1112 dxwsetup.exe 146 PID 1112 wrote to memory of 4776 1112 dxwsetup.exe 147 PID 1112 wrote to memory of 4776 1112 dxwsetup.exe 147 PID 1112 wrote to memory of 3896 1112 dxwsetup.exe 148 PID 1112 wrote to memory of 3896 1112 dxwsetup.exe 148 PID 1112 wrote to memory of 1780 1112 dxwsetup.exe 149 PID 1112 wrote to memory of 1780 1112 dxwsetup.exe 149 PID 1112 wrote to memory of 728 1112 dxwsetup.exe 150 PID 1112 wrote to memory of 728 1112 dxwsetup.exe 150 PID 1112 wrote to memory of 3176 1112 dxwsetup.exe 151 PID 1112 wrote to memory of 3176 1112 dxwsetup.exe 151 PID 1112 wrote to memory of 3348 1112 dxwsetup.exe 152 PID 1112 wrote to memory of 3348 1112 dxwsetup.exe 152 PID 1112 wrote to memory of 668 1112 dxwsetup.exe 153 PID 1112 wrote to memory of 668 1112 dxwsetup.exe 153 PID 1112 wrote to memory of 1796 1112 dxwsetup.exe 154 PID 1112 wrote to memory of 1796 1112 dxwsetup.exe 154 PID 1112 wrote to memory of 4464 1112 dxwsetup.exe 155 PID 1112 wrote to memory of 4464 1112 dxwsetup.exe 155 PID 1112 wrote to memory of 4164 1112 dxwsetup.exe 156 PID 1112 wrote to memory of 4164 1112 dxwsetup.exe 156 PID 1112 wrote to memory of 4676 1112 dxwsetup.exe 157 PID 1112 wrote to memory of 4676 1112 dxwsetup.exe 157 PID 1112 wrote to memory of 4668 1112 dxwsetup.exe 158 PID 1112 wrote to memory of 4668 1112 dxwsetup.exe 158 PID 1112 wrote to memory of 4772 1112 dxwsetup.exe 159 PID 1112 wrote to memory of 4772 1112 dxwsetup.exe 159 PID 1112 wrote to memory of 4240 1112 dxwsetup.exe 160 PID 1112 wrote to memory of 4240 1112 dxwsetup.exe 160 PID 1112 wrote to memory of 1364 1112 dxwsetup.exe 161 PID 1112 wrote to memory of 1364 1112 dxwsetup.exe 161 PID 1112 wrote to memory of 3736 1112 dxwsetup.exe 162 PID 1112 wrote to memory of 3736 1112 dxwsetup.exe 162 PID 1112 wrote to memory of 2196 1112 dxwsetup.exe 163 PID 1112 wrote to memory of 2196 1112 dxwsetup.exe 163 PID 1112 wrote to memory of 2316 1112 dxwsetup.exe 164 PID 1112 wrote to memory of 2316 1112 dxwsetup.exe 164 PID 1112 wrote to memory of 812 1112 dxwsetup.exe 165 PID 1112 wrote to memory of 812 1112 dxwsetup.exe 165 PID 1112 wrote to memory of 2652 1112 dxwsetup.exe 166 PID 1112 wrote to memory of 2652 1112 dxwsetup.exe 166 PID 1112 wrote to memory of 4200 1112 dxwsetup.exe 167 PID 1112 wrote to memory of 4200 1112 dxwsetup.exe 167 PID 1112 wrote to memory of 3380 1112 dxwsetup.exe 168 PID 1112 wrote to memory of 3380 1112 dxwsetup.exe 168 PID 1112 wrote to memory of 4036 1112 dxwsetup.exe 169 PID 1112 wrote to memory of 4036 1112 dxwsetup.exe 169 PID 1112 wrote to memory of 3524 1112 dxwsetup.exe 170
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://steamunlocked.net/scooby-doo-and-the-spooky-swamp-free-download/1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:628
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3196
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\HOW TO RUN GAME!!.txt1⤵PID:4928
-
C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby2.exe"C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby2.exe"1⤵PID:5004
-
C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\_Redist\dxwebsetup.exe"C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\_Redist\dxwebsetup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_24_x64.inf3⤵
- Executes dropped EXE
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_25_x64.inf3⤵
- Executes dropped EXE
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_26_x64.inf3⤵
- Executes dropped EXE
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_27_x64.inf3⤵
- Executes dropped EXE
PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_28_x64.inf3⤵
- Executes dropped EXE
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_29_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3896
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT_x64.inf3⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_0.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_30_x64.inf3⤵
- Executes dropped EXE
PID:3176
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_1_x64.inf3⤵
- Executes dropped EXE
PID:3348
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_1.dll3⤵
- Loads dropped DLL
- Modifies registry class
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe xinput1_1_x64.inf, Install_Driver3⤵
- Executes dropped EXE
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_2_x64.inf3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4464
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_2.dll3⤵
- Loads dropped DLL
- Modifies registry class
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe xinput1_2_x64.inf, Install_Driver3⤵
- Executes dropped EXE
PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_3_x64.inf3⤵
- Executes dropped EXE
PID:4668
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_3.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_31_x64.inf3⤵
- Executes dropped EXE
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_4_x64.inf3⤵
- Executes dropped EXE
PID:1364
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_4.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3736
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_32_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2196
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_00_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_5_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:812
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_5.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_6_x64.inf3⤵
- Executes dropped EXE
PID:4200
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_6.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_33_x64.inf3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4036
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_33_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_7_x64.inf3⤵
- Executes dropped EXE
PID:1000
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_7.dll3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe xinput1_3_x64.inf, Install_Driver3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_34_x64.inf3⤵
- Executes dropped EXE
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_34_x64.inf3⤵
- Executes dropped EXE
PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_8_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3088
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_8.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_35_x64.inf3⤵
- Executes dropped EXE
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_35_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_9_x64.inf3⤵
- Executes dropped EXE
PID:4756
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_9.dll3⤵
- Registers COM server for autorun
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx9_36_x64.inf3⤵
- Executes dropped EXE
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_36_x64.inf3⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_2_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT2_10_x64.inf3⤵
- Executes dropped EXE
PID:4604
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine2_10.dll3⤵
- Registers COM server for autorun
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_37_x64.inf3⤵
- Executes dropped EXE
PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_37_x64.inf3⤵
- Executes dropped EXE
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_3_x64.inf3⤵
- Executes dropped EXE
PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_0_x64.inf3⤵
- Executes dropped EXE
PID:4500
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_0.dll3⤵
- Registers COM server for autorun
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_0_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5048
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_0.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_38_x64.inf3⤵
- Executes dropped EXE
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_38_x64.inf3⤵
- Executes dropped EXE
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_4_x64.inf3⤵
- Executes dropped EXE
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_1_x64.inf3⤵
- Executes dropped EXE
PID:3948
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_1.dll3⤵
- Registers COM server for autorun
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_1_x64.inf3⤵
- Executes dropped EXE
PID:3384
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_1.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_39_x64.inf3⤵
- Executes dropped EXE
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_39_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_2_x64.inf3⤵
- Executes dropped EXE
PID:700
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_2.dll3⤵
- Registers COM server for autorun
PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_2_x64.inf3⤵
- Executes dropped EXE
PID:400
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_2.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_5_x64.inf3⤵
- Executes dropped EXE
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_3_x64.inf3⤵
- Executes dropped EXE
PID:2348
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_3.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_3_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2000
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_3.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:764
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_40_x64.inf3⤵
- Executes dropped EXE
PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_40_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4372
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_6_x64.inf3⤵
- Executes dropped EXE
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_4_x64.inf3⤵
- Executes dropped EXE
PID:3220
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_4.dll3⤵
- Registers COM server for autorun
PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_4_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2964
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_4.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_41_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_41_x64.inf3⤵
- Executes dropped EXE
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_42_x64.inf3⤵
- Executes dropped EXE
PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_42_x64.inf3⤵
- Executes dropped EXE
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx11_42_x64.inf3⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5080
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dcsx_42_x64.inf3⤵
- Executes dropped EXE
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DCompiler_42_x64.inf3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_5_x64.inf3⤵
- Executes dropped EXE
PID:3452
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_5.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_5_x64.inf3⤵PID:2648
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_5.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe X3DAudio1_7_x64.inf3⤵
- Drops file in System32 directory
PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_6_x64.inf3⤵
- Drops file in Windows directory
PID:4356
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_6.dll3⤵
- Registers COM server for autorun
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_6_x64.inf3⤵
- Drops file in System32 directory
PID:2068
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_6.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DX9_43_x64.inf3⤵
- Drops file in Windows directory
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx10_43_x64.inf3⤵
- Drops file in Windows directory
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dx11_43_x64.inf3⤵PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe d3dcsx_43_x64.inf3⤵
- Drops file in System32 directory
PID:3200
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe D3DCompiler_43_x64.inf3⤵
- Drops file in Windows directory
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XACT3_7_x64.inf3⤵PID:3672
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\xactengine3_7.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exeC:\Users\Admin\AppData\Local\Temp\DXFEA2.tmp\infinst.exe XAudio2_7_x64.inf3⤵PID:944
-
-
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe /s C:\Windows\system32\XAudio2_7.dll3⤵
- Registers COM server for autorun
- Modifies registry class
PID:320
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby2.exe"C:\Users\Admin\Downloads\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby-Doo.and.the.Spooky.Swamp\Scooby2.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4816
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
PID:3676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
PID:4476
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4844
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x4f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5586e3ed4faca9a09274f14693a18ada0
SHA15cb107a7ca3eb4a72715c2c1b872c021e59a0817
SHA25601cbf776c5c8fd0b8293cfb84115dea622a3ad007e3cf6ff8c969cae24f493f9
SHA512e64b25f65df4d40332e7d3359dfb2ee8baf8b86b44f2e268383ddfb51629fc66cfe592062f6fb9329823c0ccaa01874ad980cae74f28899499791d8c962814ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a84659e00d09b65942dd6319948f4b09
SHA15019ed50b4dc83eb14ee8f741b7fb78b0cd32483
SHA2565883ea503ab00c9fa511bb6ba9f0367ef9e37951f681ed647d76e61646946708
SHA512974b291e90ddf2bea9436bfb1ba6649530a29d1611885fc909e41a99f47211414c9cb86d13cbd30229274da1ca35533ad0da2c695499df77036cfe0b096ca404
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_15F934FF48FB1733D8E1597F1CF89F8E
Filesize471B
MD517cf9dce587a0172ed5024014092613a
SHA1c4d54d41bb2065c443b71ce4cb0765afcf25ff5d
SHA256c9e7f02104dba48ac14728545d4e4fbc2393ab6c2cb4b36504aad9626f8d10b1
SHA512f0a65589627b6572c572246afb34bd963aeb3e64415a833bb35c7c65d5016ca3f28a8af2d8f727857677c42e2570c66fe219bd5f31a46df07d50edd0bee97928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD597aee7e8650be974a5dd256c8e349567
SHA1ad98225ee7868c29b2856f18f4499f74a5c6e303
SHA256106722433eacca17ba5c9c33cc6023ee230eae71df7175b2e3098e3da977be01
SHA5124a8371aad1235116aa6872618c30c588570a452109955469248439839cc007994282cc6c863891e5b7160e9a0999d567a85a382a9a4c4426170fa7433114bee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD54c7b4e31cf8ffd280151d92b89c59935
SHA1fb213ca126f55b48e627fdce0d46454437ed9ea0
SHA25662bc5498cd94c1d88df42b9122e529c03a1b032d1fefb72b27c1ad85dbc25748
SHA512902074616d4d14ccf832c3a7dc092d1ecfd70b9dd8c7351b58a1dc161363a707551f97e84a2d02acb447151d8e1f2773cc1bdf8e960b28fe189877790ec044a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD598f229af08fb0c20f78536968455d874
SHA1dd308439e013db4f5f9ea005ef3d0b999ace4739
SHA25699f0b262a2afae855ca00206af66d5aa9672bff1ce2ea8b7a64ca14b3d022bed
SHA512657ae9dfee4b6d54348a2f6071d2413d331104269c45831c84dcb9cf13e0140dc0c71649966089249a2012b1e55efde482b67fd08e8f574222ba4b8706f8dbf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_15F934FF48FB1733D8E1597F1CF89F8E
Filesize406B
MD5cd73858615e527386b640bb900ccb340
SHA16bdaa18c01210bebc51cda5e106fd5423d101dcc
SHA2564f1793ed8c7df97748f626675a4bf3b395645ba198f518cec8f07adebe793cc1
SHA512f5efcfda155b61a0f98af2cb8cb77936fecbea4dd6277e804eab65d4e89e2ef9408fc826c6dd667cf1c7874137189788261cdf7227d7bf3ab7815d21b15d5199
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
852B
MD5c63b78be661db700e44996e6e90901c6
SHA114860bb02fe3b5d0d9ee424b618e359150b9116e
SHA2567c9a34cf2493d57cb4c921fd93fba2a0009cfda1a4b1ddfeeceee8e019c28e42
SHA512359a46776040af3f134d29a45ffda0e48642f70490f74a1fc5539f7c697ef3a02a50b0adeddd012414b4b295eec447a7c587b4b4e3b7db2244ff0e98f0fdbd7a
-
Filesize
3KB
MD50e7c64fc0b44edb0ead6b119ed681112
SHA14af5d391d6cc3c8057ceb4a2bea0318fe4012d3f
SHA2563dd632f4b979607c28e9ff2a96c59377bff0f26e640b590ea91e0b5e05a7fc64
SHA512b7d5c7e2bb551460f7b7b5182d31aef1f507368cd4e0404f22616cc3b4738ba962de3644770871e29b8dac5f153f7e5588ff56a5fc360fc7265d0957bfb5455a
-
Filesize
3.4MB
MD5b165df72e13e6af74d47013504319921
SHA1c45b192cf8904b7579bbc26c799aa7ffa5cbb1d4
SHA2561ec422bd6421c741eef57847260967f215913649901e21dd9c46eb1b3bb10906
SHA512859b6cd538735e5cc1c44f63d66b25588ad1ad32202cae606ff95b8c4a80f6a66db9ef7c5d43820010de9334b8bbbfb079939ce89ba0b760f5d651d7fa8268ed
-
Filesize
679B
MD52c4e850789bf9606aa4783cd9c26099a
SHA1036ee1c9ce3b8c495b3d155fe83e54c00a2611d4
SHA256f02bd6bb0ca1ed41698def1465c05f5b47ca459f886647f2d84f85c5c09dad9c
SHA512f09cb85eb7024c89024d12dd40021d1df046bb825a985bee1cb164a5c026693325bc5d64491702731ed5cb71b5af7eef34f8a922bee6d9d5881ff113dce23d21
-
Filesize
3.6MB
MD54c56e7c5b2a61353e534c7d15d05856d
SHA1e6e0a59a1e8217ae06cda29942537bc4be25d5a1
SHA25610b09474bfe4e2bb395472628646bc5f353fbfbec976575c45eeff49984ebaa6
SHA5126f630ea0764b4551d80a96f6c2b9391ed5741f14431eec951699c0e42b9434a45841d71bea5576b285cc20d38fd082b4cfc8062e4aa61f80aed9e57869cdd5d2
-
Filesize
667B
MD5fbed164855ae10f4c2d4eb238f414e6a
SHA17c3ec7759a23e77242bdc70c8033c013f2c794d6
SHA2569af2752d59fc38dd26d30769132a0887ff4123269c0dc4406f5107295e69c7c1
SHA51268e7d441aa0b842329f63ed34bb392d1582b635eee1bd1c8a797e9a59303fc85b0d842de0fd29d88fa3c8ac0bb6d858671101633161487d6353e73c862fb228d
-
Filesize
3.6MB
MD544f5c5e27d6825e4e62420bc29b8b533
SHA1046455294e199af99c7c2d9174d25b230e6fd0e6
SHA25630b06dbbd202494bae3b87487e7273adcffd17a9d2c29977030fde0570aa841b
SHA5120c9adca329c386cb2caf0f36d672ba326929f02c29748b13188bb7ade3fbec9131ce86a6bf1b3064a2fbb8de6b8adc34208f667df31c5db182918e79744a830b
-
Filesize
667B
MD5831fb8a4394d256a5d7c15c16757912c
SHA1961d7274de32808c4dce971d943ddd79a12e8d49
SHA2566c152334efa5b011a44f160a23a5c58b66f3bcebbf6c4bc0722a526d36699a4b
SHA51240f3d40cb40bd887ffa15a5fc60468e48f06bb1704d19061f9b51a9e2c15ab363644aac4618276910f6fc8d90f1083931916a9943306dcf736fc72feba2385c8
-
Filesize
3.6MB
MD5914c3237e4d145a18dcd1d0d4c8659e1
SHA132503c8f8d80551c896bc2dbf2c8ae3c490f0ec4
SHA256f9dd288c9895973f8db1856d172779041c6dee173ad1ef53b1727fc85cb6b75f
SHA512c760b5b0b5507da8f2336b2b0625f344f28fac33da16a7d8771a122b0ba54ebf5d2a2f702f4ebb83ded746f38d63abd378a9aa3b3e50579fab7c047fe38e2c02
-
Filesize
667B
MD5925202b48a83647982cb0d55ab10668d
SHA1b04a29859288545a3f8f9daf6aa39bb7a8b4b59c
SHA2566f56c5be97e703584dd832f35ebdc78c6aeb07cc9df155d47ed9903142086488
SHA51272b6b4b951d04ecee1c4ea613734113b864a542dcc554e86e8d7b7fa2b0d05a1e7623051ca0809c3e934cf28cadca54acb76ad515f71a263ffd17c3872677b69
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
Filesize
56KB
MD5ac36c85030678eb69a498793a36a81e9
SHA1a1719053eec7a206bd1d005e1038a1a7ca2eb1a0
SHA25685a8b155b066d81efb5d4959f5ea59a9ce43d40663cb2aba05ef0e6d01c22c18
SHA51247f26ed02bedc96b504344ac53418f63b1da4844b6db61d334dd9b09d0481584dbddc166a654c5b553d5609fb8fb90c01dee9329c68dd74c24ee6bd8eb136d06
-
Filesize
56KB
MD5afd73a6c2e1172e4075c8b37816eb391
SHA1eceaeaca967c9ac3239f65b4d4f75d994dabd7ee
SHA256ea544793b661304f31f18e9d107a4b4b46bd198d806f6366870746fe52e01df9
SHA5125c313c81808c664f056ccd64784e607439ed45874fe322afdf690aba6d8dc54c2b54e42f69ce003bd0aefd0ebe5518f102f846aaa96254d3218d62b4f5dc463b
-
Filesize
56KB
MD5afd73a6c2e1172e4075c8b37816eb391
SHA1eceaeaca967c9ac3239f65b4d4f75d994dabd7ee
SHA256ea544793b661304f31f18e9d107a4b4b46bd198d806f6366870746fe52e01df9
SHA5125c313c81808c664f056ccd64784e607439ed45874fe322afdf690aba6d8dc54c2b54e42f69ce003bd0aefd0ebe5518f102f846aaa96254d3218d62b4f5dc463b
-
Filesize
59KB
MD544f9c211701098d36dde44c5cf3afd63
SHA1c020bb7dfb5932c5cbe19ca5d9feffde05781134
SHA256d636d29f6019bcc232e62553728871097097aae05a6426bb86af15720de2e0e6
SHA512b8aa96c4b8861b76f0c5c606f5458cc1e06e6e2ecd684f9ebde9e68a4d5057e84413816d78f88525fef63f4863a4b498c6d8cbc74faf8c555029dde7e34dec5a
-
Filesize
59KB
MD544f9c211701098d36dde44c5cf3afd63
SHA1c020bb7dfb5932c5cbe19ca5d9feffde05781134
SHA256d636d29f6019bcc232e62553728871097097aae05a6426bb86af15720de2e0e6
SHA512b8aa96c4b8861b76f0c5c606f5458cc1e06e6e2ecd684f9ebde9e68a4d5057e84413816d78f88525fef63f4863a4b498c6d8cbc74faf8c555029dde7e34dec5a
-
Filesize
61KB
MD5def5caad8a452d6515bd40df6dd6b51f
SHA1c26a793ef0a117b9b960caaabf31fef6036576de
SHA25634df5a253007edd15d14f28a333bac638fe961f0f3941b192d7a6a760c2635fe
SHA5122f3984f126de1c89cb815e00587d41c9bc32358530d9d2931ef917f6d3a45422a80caf6bcbb1615a61e51d7cb81532795cafefdfc39f9dab7c2f7d70cc22a1bf
-
Filesize
61KB
MD5def5caad8a452d6515bd40df6dd6b51f
SHA1c26a793ef0a117b9b960caaabf31fef6036576de
SHA25634df5a253007edd15d14f28a333bac638fe961f0f3941b192d7a6a760c2635fe
SHA5122f3984f126de1c89cb815e00587d41c9bc32358530d9d2931ef917f6d3a45422a80caf6bcbb1615a61e51d7cb81532795cafefdfc39f9dab7c2f7d70cc22a1bf
-
Filesize
65KB
MD560db6abbe4d4f22d87cd15c9bdae79e7
SHA14dc25047507cb28a0855c8c2f5bf11fb0dbf1366
SHA25610e420d85c6d2905d9ca076681c3b1d648bc1b5b3893c8eb5ff420d2b964f0cb
SHA512846fc61367cc3fff2c0516c1872f1380e120684853fa9e4a6d077f94c83c99dfdc9f3d2cf7de587fe3988a3224b7ea7e0f27c7a76e11c5a6daaf03ed15864476
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
2.6MB
MD5a73e7421449cca62b0561bad4c8ef23d
SHA1cf51ca7d28fcdc79c215450fb759ffe9101b6cfe
SHA2567986e3fbe05418fe5d8425f2f1b76b7a7b09952f3ec560b286dd744bf7178059
SHA51263d24647ac5d0beb8f1284973927263cb6e05b4c399cda3912178114b42d541dd516c6d67a453ea997d9d0cd9126a1802678062f0951c2547e1b445ba50dfbe4
-
Filesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
Filesize
2.7MB
MD55e2b8b8a5ed016468716b9ff82a1806f
SHA1f1772121149d87745738cd471d0e504301a9ad0d
SHA2565b70f0ac40a38c903062a12ff7cd71d907e75238a044ded9b34fb51e9a9a2799
SHA5124620c9bafb7dfaa8d4351d0d99ae3442ceb2220201f16bd9bab4fbeb1f411fd63d4f0e79abf6e762f4d0e62d42608fbeebd13943ce338eca59ad1080ea6c2728
-
Filesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
Filesize
554KB
MD5fb3bc0754921873a65f5fbdca845e6ee
SHA167cde5bc8577cd3040e275d290ac021874da9fe8
SHA256f500c350dd71df7452b92444e19b4644b04283434a6557123f1e4d9fb078c3f8
SHA512292b8bda44e6ff6449c4b38da9b8317491c0f0da3d1e5f7947741de27cc51bbc078fbf947c89c4be3a0b54f7066f0480990d1de57919edba3414aace77c47635
-
Filesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
Filesize
562KB
MD5afcf5f50c632f3a5598abc28f196d77c
SHA1294385693592f9d6320f8b0b18f45bc194d01a4d
SHA2565e90089e69e4f7e2e42ea4a81fb62005c3710d0a4acdf207b97ed03f5641d013
SHA51229746ffc665051e13386e452c3e41a593b6339e09a228927929be100cddb3e0e0fd3b54abe02eb7d46a3d97466ecb02bac362398b72fd8e804cbb21c8bc856d9
-
Filesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
Filesize
563KB
MD5ccd53738df4fa27849b6bb05dd67d10d
SHA128126653a3d1b4574fcb0c09176f5fa0ff28ef78
SHA256c29d337bf7639fbf424b34cc0409d2715762e1b4d82881fb524a2508381c9f62
SHA512aa3a10504fbe49a4c44151beec7d9b543f4b89a51621fa60810f385bdc8a6821e4bfc37cd46f3688013f6f4facd33ab45bd0deb4a1fe16453e1be8f11f2119c3
-
Filesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
Filesize
564KB
MD543c280c3b15ceb2472ab560d09629664
SHA1e3a897d7608d03c93b5c2b8aef52703452cf6696
SHA256bebbc40ca25ef22e9d16b0de1123e0cb0444fe7a78b4f0b4395bdfd81618698c
SHA5125229eef9153b992684b6dcb4a32b231c63322b5e4b49ef262228c0dcca4760f97cda5d15a7fcdf77d813eb24b359101e716f72988374106ace13473f27e731c5
-
Filesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
Filesize
564KB
MD5490807c150b7d8be44bde871f4df8c56
SHA169b68a5b8cc3f3e75aa2ba284654ca58bb62f23e
SHA25636a21fc4f4c8f6ba4ad900613ee1b08ff43f2545585a2601c9fc4cf083d68a77
SHA5129442e26de55009428cc6e747637c2cb64bd2f008541ccbb37fed4e83ff66845c7cf3874d93542e0ba544e2db61f4864b665b7720568eba284beb095489f3ca64
-
Filesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
Filesize
565KB
MD5933085360527de1b4947289ca468184e
SHA1d5ee5e1e3c992c7518b5ce510c627c1564131b12
SHA25678d85f0e2cb7d7bde534222f4ebfea1c9e06d37ecd3bb7ebd59e35f00b94b11d
SHA5122e22398d7cdcd6a46daf3dd3478d861bc4012ba1b54862311ae031ebcd3f908352157cbeea528f22ef1824f8924c3f217311feaf1804cf675eafc07a8d3962eb
-
Filesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
Filesize
550KB
MD5d3f1922325be8e7e1c72bfd8179454ce
SHA189134f43ce2af4adfbc4087392aee6fe56be7ff4
SHA2568418941d8f1d4c84288e0bf54392378dd3d87b602bb693ff4f8a633022681c12
SHA512d33f513ff6c199acabe86eca6dc06d56c330ccb78be4d13fb6b1906a3cba3c93afe982b05cb057f2b88f6e6637452f4d99d4a4fe6f3f7c473de9e67a40758bed
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
173KB
MD57ed554b08e5b69578f9de012822c39c9
SHA1036d04513e134786b4758def5aff83d19bf50c6e
SHA256fb4f297e295c802b1377c6684734b7249d55743dfb7c14807bef59a1b5db63a2
SHA5127af5f9c4a3ad5c120bcdd681b958808ada4d885d21aeb4a009a36a674ad3ece9b51837212a982db6142a6b5580e5b68d46971b802456701391ce40785ae6ebd9
-
Filesize
56KB
MD57b1fbe9f5f43b2261234b78fe115cf8e
SHA1dd0f256ae38b4c4771e1d1ec001627017b7bb741
SHA256762ff640013db2bd4109d7df43a867303093815751129bd1e33f16bf02e52cce
SHA512d21935a9867c0f2f7084917c79fbb1da885a1bfd4793cf669ff4da8c777b3a201857250bfb7c2b616625a8d3573c68395d210446d2c284b41cf09cc7cbb07885
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
515KB
MD5ac3a5f7be8cd13a863b50ab5fe00b71c
SHA1eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9
SHA2568f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da
SHA512c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba
-
Filesize
477B
MD5ad8982eaa02c7ad4d7cdcbc248caa941
SHA14ccd8e038d73a5361d754c7598ed238fc040d16b
SHA256d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00
SHA5125c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28
-
Filesize
1451.8MB
MD59a91f708a5f4c45db99f8141d6cdfb7b
SHA1c9330ab22e048f4a449237a3caabcf1f804447c1
SHA256f002072d73a071c12403c5898c3b385be05d3916acfdcefc5dd55716b68c371c
SHA5123663d7046b4397194c1d51808cad351d2b023d3af07c3cf19c3c3345604a7bd9d57789c1729041da71bff5fc66655c19901eeea8075e9bb917cae3b948482ff8
-
Filesize
315B
MD5a0f48d73f61bf35e68d118bc63b59949
SHA18e426f9d8747eee0e4b54ae0ab1f5f22faf7879c
SHA2560b7e8fdb7a322fdb685d5de4a84aa3182cc747104f5c6179097dabe77437813f
SHA5123ba6514e71085d892db377d792a1a6842247f024b3240cbdcc297812a825873a9a5bb75ff10d598df1376eabcfaec7c8d0d8b22854076b328213a76dbd74740e
-
Filesize
511B
MD54ff939d603084f85b6a89428e08dcee0
SHA1ed5f6fbf25c15cb30aa2d8aed9185ee09737b34a
SHA2562705a2fbc74b8101eabd2ffbe7709d2d3799de7d97737855d32b8751373120c0
SHA512124672dc2ff8665b3c7495d1b91f4cb291cc5c98b6adff50d6d2e085e2a6dc192cb83d588e835fb62b9a06dd51b87c2fc18d59e3abbe5c7675a48ca0e51c74a1
-
Filesize
707B
MD58ba2e6ab9834f2f2e6ee0feee5770639
SHA18debd8c71d1464250982d482820927ba9ffeac65
SHA2566260c031b8782b16b2ada68311e495e5d346187b2aa1795884f1468e694a9293
SHA51246e3e1296e310db56c5cddc55458b62cadb91fa915734a04d8dd6cfcdb4224b5b92d144f62c2ca28981a7254bfb384ebbe5e4f46a4079d11fd551a57f2a4c00a
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
93KB
MD5984cad22fa542a08c5d22941b888d8dc
SHA13e3522e7f3af329f2235b0f0850d664d5377b3cd
SHA25657bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308
SHA5128ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405
-
Filesize
1.5MB
MD5a5412a144f63d639b47fcc1ba68cb029
SHA181bd5f1c99b22c0266f3f59959dfb4ea023be47e
SHA2568a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6
SHA5122679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405