Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
24-06-2021 04:58
Static task
static1
Behavioral task
behavioral1
Sample
789543351b1c5d10216ff9319e835a3c.exe
Resource
win7v20210408
General
-
Target
789543351b1c5d10216ff9319e835a3c.exe
-
Size
83KB
-
MD5
789543351b1c5d10216ff9319e835a3c
-
SHA1
929dc87f7358e7ae0a3bebc54c42ac227a856b79
-
SHA256
9f8cd68021a1987bcb5115056f67fbdc12d24718e51c9103c696702512d78725
-
SHA512
8f8413fa6aa56bcab18ac3371dc8df14174cdde765c3e2eadf47159617aa638623413063ac39619282b56ab1fec30b6ef44bb2ea001dd81de2475fc8bb476e13
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
Processes:
fastpdf_ext_process.exefastpdf_ext_process.exeregsvr32.exefastpdf_ext_process.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Thorzip regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Thorzip\ = "{E1E3163A-D2B0-4C20-A859-1B420ECB881A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe -
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 49 IoCs
Processes:
IMedia-553.exeIMediaB.exesyzs03_1000219144.exeIMediaT.exeIMediaDesk.exeIMedia.exeMarket.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exeleishenzip_247915520_tiangua_001.exeQMEmulatorService.exeFlashZip_2710.exefpprotect.exefastpdf_ext_process.exeSZipMd5Tool.exefastpdf_ext_process64.exeOfficeDownloaderInstall_0_100016_lanshan.exefastpdf_ext_process64.exefastpdf_ext_process.exefastpdf_ext_process64.exefastpdf_ext_process.exeSZipService.exefastpdf.execonhost.exeSZipUpdate.exeSZipMd5Tool.exeSZipMd5Tool.exeSZipTray.exeSZipTray.exeSZipTray.execef_frame_render.exeAppMarket.exesyzs_dl_svr.execef_frame_render.execef_frame_render.exeThorFileManager.exeThorReport.exeSZipMd5Tool.exeSZipMd5Tool.exeSZipMd5Tool.exek52zip20210520-220-21.exekzipservice.execef_frame_render.exefastpdf.exekzip_casual64.exekzip_main.exekrecommend.exepid process 1000 IMedia-553.exe 1668 IMediaB.exe 568 syzs03_1000219144.exe 1892 IMediaT.exe 1680 IMediaDesk.exe 944 IMedia.exe 1304 Market.exe 1784 Tinst.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 1604 leishenzip_247915520_tiangua_001.exe 1296 QMEmulatorService.exe 1780 FlashZip_2710.exe 816 fpprotect.exe 1064 fastpdf_ext_process.exe 1260 SZipMd5Tool.exe 868 fastpdf_ext_process64.exe 1064 fastpdf_ext_process.exe 1664 OfficeDownloaderInstall_0_100016_lanshan.exe 1312 fastpdf_ext_process64.exe 2068 fastpdf_ext_process.exe 2164 fastpdf_ext_process64.exe 2196 fastpdf_ext_process.exe 2236 SZipService.exe 2360 fastpdf.exe 2388 conhost.exe 2432 SZipUpdate.exe 2460 SZipMd5Tool.exe 2768 SZipMd5Tool.exe 3064 SZipTray.exe 2444 SZipTray.exe 2124 SZipTray.exe 2424 cef_frame_render.exe 380 AppMarket.exe 2952 syzs_dl_svr.exe 2480 cef_frame_render.exe 520 cef_frame_render.exe 2424 cef_frame_render.exe 1692 ThorFileManager.exe 1880 ThorReport.exe 1900 SZipMd5Tool.exe 1564 SZipMd5Tool.exe 1672 SZipMd5Tool.exe 2736 k52zip20210520-220-21.exe 1776 kzipservice.exe 1976 cef_frame_render.exe 3012 fastpdf.exe 2200 kzip_casual64.exe 2660 kzip_main.exe 2740 krecommend.exe -
Modifies Windows Firewall 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cef_frame_render.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Control Panel\International\Geo\Nation cef_frame_render.exe -
Loads dropped DLL 64 IoCs
Processes:
789543351b1c5d10216ff9319e835a3c.exeIMedia-553.exeIMediaDesk.exeIMediaB.exeIMedia.exesyzs03_1000219144.exerundll32.exerundll32.exeMarket.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exeleishenzip_247915520_tiangua_001.exeQMEmulatorService.exepid process 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1000 IMedia-553.exe 1000 IMedia-553.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1000 IMedia-553.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1000 IMedia-553.exe 1000 IMedia-553.exe 1680 IMediaDesk.exe 1680 IMediaDesk.exe 1668 IMediaB.exe 1668 IMediaB.exe 1000 IMedia-553.exe 944 IMedia.exe 944 IMedia.exe 568 syzs03_1000219144.exe 568 syzs03_1000219144.exe 864 rundll32.exe 864 rundll32.exe 864 rundll32.exe 864 rundll32.exe 568 syzs03_1000219144.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1344 rundll32.exe 1224 568 syzs03_1000219144.exe 1304 Market.exe 1304 Market.exe 568 syzs03_1000219144.exe 1784 Tinst.exe 1784 Tinst.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1996 789543351b1c5d10216ff9319e835a3c.exe 1604 leishenzip_247915520_tiangua_001.exe 1604 leishenzip_247915520_tiangua_001.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
IMedia-553.execef_frame_render.exeSZipMd5Tool.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IMedia-553.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cef_frame_render.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SZipMd5Tool.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
SZipTray.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\ SZipTray.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 SZipTray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
syzs03_1000219144.exeQMEmulatorService.exeleishenzip_247915520_tiangua_001.exeAppMarket.exeThorReport.exedescription ioc process File opened for modification \??\PhysicalDrive0 syzs03_1000219144.exe File opened for modification \??\PhysicalDrive0 QMEmulatorService.exe File opened for modification \??\PhysicalDrive0 leishenzip_247915520_tiangua_001.exe File opened for modification \??\PhysicalDrive0 AppMarket.exe File opened for modification \??\PhysicalDrive0 ThorReport.exe -
Drops file in System32 directory 4 IoCs
Processes:
QMEmulatorService.exeSZipMd5Tool.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.db QMEmulatorService.exe File created C:\Windows\system32\SZipOverlayIcon.dll SZipMd5Tool.exe File created C:\Windows\system32\SZipOverlayIcon64.dll SZipMd5Tool.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.db QMEmulatorService.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Tinst.exeFastpdf_setup_ver21042017.420.1.1.1.exek52zip20210520-220-21.exeIMedia-553.exedescription ioc process File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\Logon\no_qrcode.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\normal\56.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\oversea\normal\7.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\oversea\normal\90.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\webctrl\MultiTab\tab_button_bkg_normal_unpushed.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\locale\es.pak Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\gamecenter\approve_hover.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\I18N\2052\StringBundle.xml Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\lib-syzs-market-report.f2aeb2f0.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\intro_pic01.d360b15.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\RemoteControl\qrcode.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\page-login.9094cc20.js Tinst.exe File created C:\Program Files (x86)\fastpdf\imageformats\qjpeg.dll Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\k52zip\api-ms-win-core-util-l1-1-0.dll k52zip20210520-220-21.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\hardwarecheck\button\fold_down.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\libGLESv2.dll Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\play_down.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy\I18N\1028\GFStringBundle.xml Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy.tpc Tinst.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\64.png Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\fastpdf\qt5winextras.dll Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\normal\8.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\hover\2.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\hot-icon.0920899.png Tinst.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\50.png Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\10001.xml Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\component-models.5fb6ba2f.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\component-publicComponents.3de03a0b.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\I18N\1041\StringBundle.xml Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\lib-syzs-market-ajax.7958d292.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\TF01.c7e662e.png Tinst.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\10002.xml Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\window\OverseaTab\store_hover.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\normal\57.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\normal\83.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\oversea\hover\20.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\lib-syzs-market-react-components.8c435163.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\page-main.208cddc9.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\gamecenter\code_normal.png Tinst.exe File created C:\Program Files (x86)\fastpdf\api-ms-win-crt-filesystem-l1-1-0.dll Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\gamemigrate\appdefault.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\hardwarecheck\vt.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\oversea\normal\10.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy\Res\button\def_hover.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\button\close_nor.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\hardwarecheck\vt_tip.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\normal\1.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\window\tab\store_normal.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\static\media\video-error.e06059f9.png Tinst.exe File created C:\Program Files (x86)\fastpdf\translations\qt_cs.qm Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\fastpdf\translations\qt_ko.qm Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\lib-halo-jsbridge-syzs.0a2ffb95.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\api-ms-win-core-interlocked-l1-1-0.dll Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\lib-syzs-market-utils.daf5b6c0.js Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\arkGraphic.dll Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy\I18N\1028\StringBundle.xml Tinst.exe File created C:\Program Files (x86)\fastpdf\common.dat Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\I18N\1031\GFStringBundle.xml Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\msvcp100.dll Tinst.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\44.png Fastpdf_setup_ver21042017.420.1.1.1.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\runtime.19dd9251.js Tinst.exe File created C:\Program Files (x86)\fastpdf\libssl-1_1.dll Fastpdf_setup_ver21042017.420.1.1.1.exe File opened for modification C:\Program Files (x86)\IMedia\IMediaDesk.exe IMedia-553.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy\Res\JoinGame\join_btn_h.png Tinst.exe -
Drops file in Windows directory 1 IoCs
Processes:
leishenzip_247915520_tiangua_001.exedescription ioc process File created C:\Windows\Tasks\ThorUpdate.job leishenzip_247915520_tiangua_001.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
k52zip20210520-220-21.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 k52zip20210520-220-21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString k52zip20210520-220-21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
k52zip20210520-220-21.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS k52zip20210520-220-21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName k52zip20210520-220-21.exe -
Processes:
SZipTray.exeSZipTray.exeSZipTray.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_ADDON_MANAGEMENT\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_XMLHTTP\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_TABBED_BROWSING\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\SZipTray.exe = "11000" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_WEBSOCKET\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\SZipTray.exe = "11000" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_ADDON_MANAGEMENT\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_NINPUT_LEGACYMODE\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION\SZipTray.exe = "11000" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_XMLHTTP SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_WEBSOCKET\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_SPELLCHECKING\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS SZipTray.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_XMLHTTP SZipTray.exe -
Modifies registry class 64 IoCs
Processes:
SZipMd5Tool.exefastpdf_ext_process.exeThorFileManager.exekzip_main.exeregsvr32.exekzip_casual64.exeregsvr32.exefastpdf_ext_process64.exefastpdf_ext_process.exefastpdf_ext_process64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{af0cdab9-10e3-569e-aacf-a8bc0bf9c13f}\1.0\0\win32 SZipMd5Tool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.bmp\Shell\ kother_to_pdf\Icon = "C:\\Program Files (x86)\\fastpdf\\pdfconverter.exe,0" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.lzh\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\",0" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.swm ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.rpm\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\",0" ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lzma86\ = "thorzip.lzma86" ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.lzh\ = "k52zip.lzh" kzip_main.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.ntfs\shell\open kzip_main.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jpg\Shell\ qimage_extract_text\Icon = "C:\\Program Files (x86)\\fastpdf\\fastpdf.exe,0" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0af4c9cd-825f-5677-8e7d-856f0e27270d}\Programmable SZipMd5Tool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4D722F57-3CEB-4697-AC22-9B6829F9842F}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.img\Shell ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wim\ = "thorzip.wim" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6B4DFEAB-4A11-45B9-A2D9-E12ABCD71A4E}\InprocServer32 kzip_casual64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\kzipext\ = "{B1832224-9F22-4965-A6E8-E6A6E3C4FDF7}" kzip_casual64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.deb\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\",0" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.xls\Shell\ kother_to_pdf fastpdf_ext_process.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.tar kzip_main.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.cpio\shell\open\command kzip_main.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.xar\shell\open kzip_main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Background\shellex\ContextMenuHandlers\ShiningZipShell regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.tpz ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bz ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.xpi\DefaultIcon ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.cpio\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\" \"%1\"" ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0af4c9cd-825f-5677-8e7d-856f0e27270d}\ = "ShiningZipAccer Class" SZipMd5Tool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.tgz\DefaultIcon ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.split\ = "压缩文件" ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.hfs\shell kzip_main.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.doc\Shell\ kother_to_pdf\Icon = "C:\\Program Files (x86)\\fastpdf\\pdfconverter.exe,0" fastpdf_ext_process.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.zipx\ = "压缩文件" ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.alz\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\" \"%1\"" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.lzh ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.z ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.001\Shell\Open\Command ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.iso\shell\open\command\ = "C:\\Program Files (x86)\\k52zip\\kzip_main.exe -from:extension_association -action:open -in=\"%1\"" kzip_main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{60D7BB01-CD27-4D13-AE76-17BD82A461E5} fastpdf_ext_process64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{0af4c9cd-825f-5677-8e7d-856f0e27270d}\TypeLib SZipMd5Tool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{60D7BB01-CD27-4D13-AE76-17BD82A461E5}\Implemented Categories fastpdf_ext_process64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{47c05740-b821-5f6f-b07a-e45adf9de811}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\ShiningZip\\" SZipMd5Tool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.gzip\ = "thorzip.gzip" ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.arj\ = "thorzip.arj" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz2 ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7660b6a6-0bf7-5252-be80-c2149103ef9c}\ProgID SZipMd5Tool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.ace\Shell\Open ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.bzip2\Shell\Open\Command ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.tbz2\ = "压缩文件" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.jar ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.tif\Shell\ kother_to_pdf\Icon = "C:\\Program Files (x86)\\fastpdf\\pdfconverter.exe,0" fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\s fastpdf_ext_process64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0af4c9cd-825f-5677-8e7d-856f0e27270d} SZipMd5Tool.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.zipx\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\" \"%1\"" ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.z\OpenWithProgids\k52zip.z kzip_main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.xlsx\Shell fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\.img ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.tar\Shell ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.lzh\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\" \"%1\"" ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.hfs\Shell\Open ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.lzma86\Shell\Open\Command ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\thorzip.dmg\ = "压缩文件" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.xlsx fastpdf_ext_process.exe Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\k52zip.lzh\DefaultIcon\ = "C:\\Program Files (x86)\\k52zip\\kzip_main.exe" kzip_main.exe -
Processes:
cef_frame_render.exesyzs03_1000219144.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C cef_frame_render.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 cef_frame_render.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 syzs03_1000219144.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 04000000010000001000000079e4a9840d7d3a96d7c04fe2434c892e0f0000000100000014000000b34ddd372ed92e8f2abfbb9e20a9d31f204f194b090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000003de503556d14cbb66f0a3e21b1bc397b23dd1550b00000001000000120000004400690067006900430065007200740000001d000000010000001000000059779e39e21a2e3dfced6857ed5c5fd9030000000100000014000000a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c54361900000001000000100000000f3a0527d242de2dc98e5cfcb1e991ee2000000001000000b3030000308203af30820297a0030201020210083be056904246b1a1756ac95991c74a300d06092a864886f70d01010505003061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3061310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3120301e06035504031317446967694365727420476c6f62616c20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e23be11172dea8a4d3a357aa50a28f0b7790c9a2a5ee12ce965b010920cc0193a74e30b753f743c46900579de28d22dd870640008109cece1b83bfdfcd3b7146e2d666c705b37627168f7b9e1e957deeb748a308dad6af7a0c3906657f4a5d1fbc17f8abbeee28d7747f7a78995985686e5c23324bbf4ec0e85a6de370bf7710bffc01f685d9a844105832a97518d5d1a2be47e2276af49a33f84908608bd45fb43a84bfa1aa4a4c7d3ecf4f5f6c765ea04b37919edc22e66dce141a8e6acbfecdb3146417c75b299e32bff2eefad30b42d4abb74132da0cd4eff881d5bb8d583fb51be84928a270da3104ddf7b216f24c0a4e07a8ed4a3d5eb57fa390c3af270203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041403de503556d14cbb66f0a3e21b1bc397b23dd155301f0603551d2304183016801403de503556d14cbb66f0a3e21b1bc397b23dd155300d06092a864886f70d01010505000382010100cb9c37aa4813120afadd449c4f52b0f4dfae04f5797908a32418fc4b2b84c02db9d5c7fef4c11f58cbb86d9c7a74e79829ab11b5e370a0a1cd4c8899938c9170e2ab0f1cbe93a9ff63d5e40760d3a3bf9d5b09f1d58ee353f48e63fa3fa7dbb466df6266d6d16e418df22db5ea774a9f9d58e22b59c04023ed2d2882453e7954922698e08048a837eff0d6796016deace80ecd6eac4417382f49dae1453e2ab93653cf3a5006f72ee8c457496c612118d504ad783c2c3a806ba7ebaf1514e9d889c1b9386ce2916c8aff64b977255730c01b24a3e1dce9df477cb5b424080530ec2dbd0bbf45bf50b9a9f3eb980112adc888c698345f8d0a3cc6e9d595956dde syzs03_1000219144.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
fastpdf.exepid process 3012 fastpdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
IMediaB.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exeQMEmulatorService.exeleishenzip_247915520_tiangua_001.exeFlashZip_2710.exeSZipMd5Tool.exepid process 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1668 IMediaB.exe 1784 Tinst.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1296 QMEmulatorService.exe 1604 leishenzip_247915520_tiangua_001.exe 1780 FlashZip_2710.exe 1780 FlashZip_2710.exe 1780 FlashZip_2710.exe 1780 FlashZip_2710.exe 1780 FlashZip_2710.exe 1780 FlashZip_2710.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 308 Fastpdf_setup_ver21042017.420.1.1.1.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe 1260 SZipMd5Tool.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
IMediaB.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exeDllHost.exewmic.exedescription pid process Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1668 IMediaB.exe Token: SeDebugPrivilege 1784 Tinst.exe Token: SeDebugPrivilege 308 Fastpdf_setup_ver21042017.420.1.1.1.exe Token: SeDebugPrivilege 308 Fastpdf_setup_ver21042017.420.1.1.1.exe Token: SeIncreaseQuotaPrivilege 1132 DllHost.exe Token: SeSecurityPrivilege 1132 DllHost.exe Token: SeTakeOwnershipPrivilege 1132 DllHost.exe Token: SeLoadDriverPrivilege 1132 DllHost.exe Token: SeSystemProfilePrivilege 1132 DllHost.exe Token: SeSystemtimePrivilege 1132 DllHost.exe Token: SeProfSingleProcessPrivilege 1132 DllHost.exe Token: SeIncBasePriorityPrivilege 1132 DllHost.exe Token: SeCreatePagefilePrivilege 1132 DllHost.exe Token: SeBackupPrivilege 1132 DllHost.exe Token: SeRestorePrivilege 1132 DllHost.exe Token: SeShutdownPrivilege 1132 DllHost.exe Token: SeDebugPrivilege 1132 DllHost.exe Token: SeSystemEnvironmentPrivilege 1132 DllHost.exe Token: SeRemoteShutdownPrivilege 1132 DllHost.exe Token: SeUndockPrivilege 1132 DllHost.exe Token: SeManageVolumePrivilege 1132 DllHost.exe Token: 33 1132 DllHost.exe Token: 34 1132 DllHost.exe Token: 35 1132 DllHost.exe Token: SeIncreaseQuotaPrivilege 1132 DllHost.exe Token: SeSecurityPrivilege 1132 DllHost.exe Token: SeTakeOwnershipPrivilege 1132 DllHost.exe Token: SeLoadDriverPrivilege 1132 DllHost.exe Token: SeSystemProfilePrivilege 1132 DllHost.exe Token: SeSystemtimePrivilege 1132 DllHost.exe Token: SeProfSingleProcessPrivilege 1132 DllHost.exe Token: SeIncBasePriorityPrivilege 1132 DllHost.exe Token: SeCreatePagefilePrivilege 1132 DllHost.exe Token: SeBackupPrivilege 1132 DllHost.exe Token: SeRestorePrivilege 1132 DllHost.exe Token: SeShutdownPrivilege 1132 DllHost.exe Token: SeDebugPrivilege 1132 DllHost.exe Token: SeSystemEnvironmentPrivilege 1132 DllHost.exe Token: SeRemoteShutdownPrivilege 1132 DllHost.exe Token: SeUndockPrivilege 1132 DllHost.exe Token: SeManageVolumePrivilege 1132 DllHost.exe Token: 33 1132 DllHost.exe Token: 34 1132 DllHost.exe Token: 35 1132 DllHost.exe Token: SeIncreaseQuotaPrivilege 2936 wmic.exe Token: SeSecurityPrivilege 2936 wmic.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
fastpdf_ext_process64.exefastpdf_ext_process64.exefastpdf_ext_process64.exeSZipTray.exeAppMarket.exekzip_casual64.exepid process 868 fastpdf_ext_process64.exe 1312 fastpdf_ext_process64.exe 2164 fastpdf_ext_process64.exe 2124 SZipTray.exe 380 AppMarket.exe 2200 kzip_casual64.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
AppMarket.exepid process 380 AppMarket.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
IMedia-553.exeIMediaB.exeIMedia.exerundll32.exefastpdf.exepid process 1000 IMedia-553.exe 1000 IMedia-553.exe 1000 IMedia-553.exe 1668 IMediaB.exe 1668 IMediaB.exe 944 IMedia.exe 1344 rundll32.exe 3012 fastpdf.exe 3012 fastpdf.exe 3012 fastpdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
789543351b1c5d10216ff9319e835a3c.exeIMedia-553.exeIMediaDesk.exerundll32.exesyzs03_1000219144.exedescription pid process target process PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 1000 1996 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1996 wrote to memory of 568 1996 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1668 1000 IMedia-553.exe IMediaB.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1892 1000 IMedia-553.exe IMediaT.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 1680 1000 IMedia-553.exe IMediaDesk.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1000 wrote to memory of 944 1000 IMedia-553.exe IMedia.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 1680 wrote to memory of 864 1680 IMediaDesk.exe rundll32.exe PID 864 wrote to memory of 1344 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1344 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1344 864 rundll32.exe rundll32.exe PID 864 wrote to memory of 1344 864 rundll32.exe rundll32.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1304 568 syzs03_1000219144.exe Market.exe PID 568 wrote to memory of 1784 568 syzs03_1000219144.exe Tinst.exe PID 568 wrote to memory of 1784 568 syzs03_1000219144.exe Tinst.exe PID 568 wrote to memory of 1784 568 syzs03_1000219144.exe Tinst.exe PID 568 wrote to memory of 1784 568 syzs03_1000219144.exe Tinst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\789543351b1c5d10216ff9319e835a3c.exe"C:\Users\Admin\AppData\Local\Temp\789543351b1c5d10216ff9319e835a3c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exe"C:\Users\Admin\AppData\Local\Temp\IMedia-553.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\IMedia\IMediaB.exe"C:\Program Files (x86)\IMedia\IMediaB.exe" install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\IMedia\IMediaT.exe"C:\Program Files (x86)\IMedia\IMediaT.exe" install3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /TN _Newdd_ddddfgd_sdfqefjkjkjkj_IMedia_e3df_TEE /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn _Newdd_ddddfgd_sdfqefjkjkjkj_IMedia_e3df_TEE /tr "\"C:\Program Files (x86)\IMedia\IMediaB.exe\" taskactive" /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\IMedia\IMediaDesk.exe"C:\Program Files (x86)\IMedia\IMediaDesk.exe" install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\IMedia\IMedia64.dll" DllGetClassObjectEx4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\IMedia\IMedia64.dll" DllGetClassObjectEx5⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\IMedia\IMedia.exe"C:\Program Files (x86)\IMedia\IMedia.exe" install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exe"C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exe"C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exe"C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="AppMarket" dir=in program="c:\program files\txgameassistant\appmarket\AppMarket.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TInst" dir=in program="c:\program files\txgameassistant\appmarket\TInst.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="bugreport" dir=in program="c:\program files\txgameassistant\appmarket\bugreport.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="QQExternal" dir=in program="c:\program files\txgameassistant\appmarket\QQExternal.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="c:\program files\txgameassistant\appmarket\GameDownload.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="c:\program files\txgameassistant\appmarket\GF186\TUpdate.exe" action=allow4⤵
-
C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe"C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe" -from TGBDownloader3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.exe"C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.exe" --conf-path="C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.cfg" --daemon --log="C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.log"4⤵
- Executes dropped EXE
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=gpu-process --field-trial-handle=1544,1772521916539651268,12710239653088696950,131072 --disable-features=OutOfBlinkCors --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --gpu-preferences=KAAAAAAAAADgAAAgAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=9115796099887616284 --mojo-platform-channel-handle=1552 /prefetch:24⤵
- Executes dropped EXE
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=utility --field-trial-handle=1544,1772521916539651268,12710239653088696950,131072 --disable-features=OutOfBlinkCors --lang=en-US --service-sandbox-type=network --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=7180306919436594155 --mojo-platform-channel-handle=2192 /prefetch:84⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=renderer --no-sandbox --force-device-scale-factor=1.00 --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --field-trial-handle=1544,1772521916539651268,12710239653088696950,131072 --disable-features=OutOfBlinkCors --lang=en-US --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --disable-pdf-extension=1 --ppapi-flash-path="PepperFlash\pepflashplayer.dll" --ppapi-flash-version=18.0.0.209 --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=9243039703749771914 --renderer-client-id=3 --mojo-platform-channel-handle=2208 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
- Checks whether UAC is enabled
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=gpu-process --field-trial-handle=1544,1772521916539651268,12710239653088696950,131072 --disable-features=OutOfBlinkCors --disable-gpu-sandbox --use-gl=disabled --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --gpu-preferences=KAAAAAAAAADoAAAgAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=45190832804297831 --mojo-platform-channel-handle=2032 /prefetch:24⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Fastpdf_setup_ver21042017.420.1.1.1.exe"C:\Users\Admin\AppData\Local\Temp\Fastpdf_setup_ver21042017.420.1.1.1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -refreshdesktop=13⤵
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -associate=13⤵
-
C:\Users\Admin\AppData\Local\Temp\leishenzip_247915520_tiangua_001.exe"C:\Users\Admin\AppData\Local\Temp\leishenzip_247915520_tiangua_001.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorService.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll4⤵
- Modifies system executable filetype association
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll4⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\雷神压缩\ThorFileManager.exe"C:\Users\Admin\AppData\Roaming\雷神压缩\ThorFileManager.exe" --register_application3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\雷神压缩\ThorReport.exe"C:\Users\Admin\AppData\Roaming\雷神压缩\ThorReport.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\FlashZip_2710.exe"C:\Users\Admin\AppData\Local\Temp\FlashZip_2710.exe" -8122a41aa4ae2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCWNYmzoMeWFUU0CM2Dtga35YuzOEd3hN6CIB20FaUT10MxhIaCtAGtPOMDxEPyeMSm2ET0QMbW2FqhSNiGtFdl6IoCU0j1HZsj4ZsmYNu2YI25oZFmfYXybYnmgMH9ZNXzJgP5UNeTGQCz8MJzJU7x3YajkFNjZNLW9QuxyMbDxIHx5NRmCZDmZOTTFMnxpOsWFUG4nMyztVkhPMa29MRudZtXLholy -2596b1ef9f0a=273⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\ShiningZip\ZipCnu64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\ShiningZip\ZipCnu64.dll"5⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Aq=S -2596b1ef9f0a=274⤵
-
C:\Users\Admin\AppData\Local\Temp\OfficeDownloaderInstall_0_100016_lanshan.exe"C:\Users\Admin\AppData\Local\Temp\OfficeDownloaderInstall_0_100016_lanshan.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic bios get SerialNumber3⤵
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic bios get SerialNumber3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic bios get SerialNumber3⤵
-
C:\Users\Admin\AppData\Local\Temp\k52zip20210520-220-21.exeC:\Users\Admin\AppData\Local\Temp\k52zip20210520-220-21.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\k52zip\kzip_casual64.exe"C:\Program Files (x86)\k52zip\kzip_casual64.exe" --worker=kzip_ext --register3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\k52zip\kzip_main.exe"C:\Program Files (x86)\k52zip\kzip_main.exe" -action:assext3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\k52zip\krecommend.exe"C:\Program Files (x86)\k52zip\krecommend.exe" /product:11 /type:1 /sence:13⤵
- Executes dropped EXE
-
C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\fastpdf\fpprotect.exe"C:\Program Files (x86)\fastpdf\fpprotect.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" -action:check_plugin_register2⤵
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -sactive=12⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipService.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipService.exe -3ba07688d9f41⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipUpdate.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipUpdate.exe -e61475c863c7=27 -c9c0eef9ccd6=LCTNNmioOeDFZUkCN2jtga55YuWOJdlhM6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe -e61475c863c7=27 -c9c0eef9ccd6=LCTNEm2oNeDFFUiCN22tMa25ZuTOldjhZ6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=273⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCWNYm0oZeDFgU1CN2DtNam5Yu2OYd5hM6iIA2tFNUG1YMyhOaTtEG0PYM2xIP3eMSD2NTjQPbT2Iq3SIiCt0d36MoGUYjxHOsT4FsjYZuDYc25oOFWfIX9bMnygAHtZZXTJEP5UYejGVCj8OJTJN7i3MaTkgNwZPLT9AugyLbTxEH25MRTCkD4ZMTjFAn3pNsGFJGinYyTt0kwPIaC90RzdYtTLQowyZWDSZIhTYZjVggx9Y0zGks9nMkjWEH=z -2596b1ef9f0a=274⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe" -e61475c863c7=27 -c9c0eef9ccd6=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v -2596b1ef9f0a=274⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe" -e61475c863c7=27 -c9c0eef9ccd6=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L -2596b1ef9f0a=274⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k szpsrvrGroup1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "21057177761508207670-1544064430-524852810-405224341-371968621-1937152521-1832419601"1⤵
- Executes dropped EXE
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k thorzip_updatesvc1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k thorzip_updatesvc1⤵
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNRmjoOeDFIU5CO2Dtdam5NuGOQd0hM6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2IqgS -2596b1ef9f0a=271⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNEm2oNeDFFUiCN22tMa25ZuTOldjhZ6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Iq=S -2596b1ef9f0a=271⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Iq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Program Files (x86)\k52zip\kzipservice.exe"C:\Program Files (x86)\k52zip\kzipservice.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
C:\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
C:\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
C:\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
C:\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
C:\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
C:\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
C:\Program Files (x86)\IMedia\IMediaT.exeMD5
767d847e1d357c33940d4f714f90da96
SHA114172fd6e5e99c526478cda0b472689c900504b7
SHA256815a4e28a3d3d8b797916b9c95fb83d5d3bfc1dbee4eee9ba35466d219b30c18
SHA5125da6d3597865885e9c603f68cc7c1860b3df4fb80725592fcf702cc0c4be97cb6c44c698f267c3931c3e440af8dc7bcd9d7abc74a9e88d381c5cfb04af742c5d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\AECommonDll.dllMD5
56bf4cf65918a67a3ab14046c756b552
SHA10d3138919585bedfd5fc8eb4333beb57016ca24f
SHA256c6872ce41e31e68be9e4461243ae19e6012966ab43a0d513f775ff940ba39eae
SHA51260a7ce0a2a1043de26339eadc8b7735053e6e3dffbb462aa4cbf9a0bd782d42fafca8f0769121a57c12ed117e866db430bd4b658fd63ac07416d305bed304266
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\AowGame.xmlMD5
59cb1bafb0fe0e415f03cd9b49069164
SHA1e812c08598766acb454c5f5c76b966b6873cdc8b
SHA2560103f094c6865ef2c4c0213190a5d13f337b0a9bddf58f4a1910bf91ceadb2c9
SHA51209c019bd1bed60fc3b8d274d2f514cea240ec2d98476a8937dde20369d8472f23ad0d7a33c11b52fa28a465a3ee1ae5bda63ee5f9f76c27b0fc0e18045dd4918
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Config.iniMD5
ba50063cd1a85f562d5c6a92f28fc062
SHA141d01f5bc2c800424277dc39ddfb4a70bdbaf00e
SHA2561d02987a9b23cb3c11ad6c8123446efcd8e43c0069a616ff09dfc80426a82861
SHA5122fe0aa3e2b6dd171f25d792991328737a15905d290a3d32c4fbe6bc452976c6cd88e157b98a032f1348e53d26e4eeae9928d430e700849baa95e9c73207079b3
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\TInst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\aowgameex2.datMD5
a860fbdb56190eededbb9527abc20e32
SHA1248c422cce200525f90679f49c1f9a22133a5de5
SHA256a7f94e7cf4f162bdc89f7a191c3fd8a073a68f156ee43b13942267f62a4436e7
SHA512776336b8a2d478ce685c346634526959ee11bff8c064f0177445af096641ad2657ccde5a0da571cda98c2a33c9d25c095bdfae4cc2ac7c47d7690216c1a6c1de
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
C:\Users\Admin\AppData\Roaming\IMedia\Config\SoftInfo.iniMD5
cd738748e9ab1cf713c9e07e5fbe1dfc
SHA1d069563efb4b34cd15e2586b6df218f7036e4095
SHA256bff42cbb497bb24fafc4beb32942d000e6b32c361e5c85903fd199ff91d6c816
SHA512f0f4f5833c284eda753b575037ec41deaf6dc22ea4517515152ef586bd1467c9d68bfb4fcc523cf305dbdecb79f5fdfe15e52a2812b847f0ef26b3780865fc3f
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
\Program Files (x86)\IMedia\IMediaT.exeMD5
767d847e1d357c33940d4f714f90da96
SHA114172fd6e5e99c526478cda0b472689c900504b7
SHA256815a4e28a3d3d8b797916b9c95fb83d5d3bfc1dbee4eee9ba35466d219b30c18
SHA5125da6d3597865885e9c603f68cc7c1860b3df4fb80725592fcf702cc0c4be97cb6c44c698f267c3931c3e440af8dc7bcd9d7abc74a9e88d381c5cfb04af742c5d
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\TInst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\TInst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\TInst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Temp\nsx8872.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
\Users\Admin\AppData\Local\Tencent\TxGameAssistant\TGBDownloader\dr.dllMD5
2814acbd607ba47bdbcdf6ac3076ee95
SHA150ab892071bed2bb2365ca1d4bf5594e71c6b13b
SHA2565904a7e4d97eeac939662c3638a0e145f64ff3dd0198f895c4bf0337595c6a67
SHA51234c73014ffc8d38d6dd29f4f84c8f4f9ea971bc131f665f65b277f453504d5efc2d483a792cdea610c5e0544bf3997b132dcdbe37224912c5234c15cdb89d498
-
memory/304-248-0x0000000000000000-mapping.dmp
-
memory/308-147-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/308-145-0x0000000000000000-mapping.dmp
-
memory/380-241-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/380-234-0x0000000000000000-mapping.dmp
-
memory/520-239-0x0000000000000000-mapping.dmp
-
memory/524-245-0x0000000000000000-mapping.dmp
-
memory/568-76-0x0000000000000000-mapping.dmp
-
memory/816-158-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/816-159-0x0000000000230000-0x000000000024C000-memory.dmpFilesize
112KB
-
memory/864-107-0x0000000000000000-mapping.dmp
-
memory/868-170-0x000007FEFC051000-0x000007FEFC053000-memory.dmpFilesize
8KB
-
memory/868-169-0x0000000000000000-mapping.dmp
-
memory/868-173-0x00000000024D0000-0x00000000025E5000-memory.dmpFilesize
1.1MB
-
memory/900-243-0x0000000000000000-mapping.dmp
-
memory/944-99-0x0000000000000000-mapping.dmp
-
memory/944-180-0x0000000000000000-mapping.dmp
-
memory/1000-67-0x0000000000000000-mapping.dmp
-
memory/1064-176-0x00000000007A0000-0x00000000007F7000-memory.dmpFilesize
348KB
-
memory/1064-175-0x00000000005A0000-0x00000000005BA000-memory.dmpFilesize
104KB
-
memory/1064-160-0x0000000000000000-mapping.dmp
-
memory/1064-164-0x00000000002B0000-0x0000000000307000-memory.dmpFilesize
348KB
-
memory/1064-165-0x0000000000250000-0x000000000026A000-memory.dmpFilesize
104KB
-
memory/1064-171-0x0000000000000000-mapping.dmp
-
memory/1080-247-0x0000000000000000-mapping.dmp
-
memory/1132-178-0x0000000000000000-mapping.dmp
-
memory/1248-151-0x0000000000000000-mapping.dmp
-
memory/1260-161-0x0000000000000000-mapping.dmp
-
memory/1260-166-0x0000000010000000-0x0000000010158000-memory.dmpFilesize
1.3MB
-
memory/1304-128-0x0000000000000000-mapping.dmp
-
memory/1312-179-0x0000000000000000-mapping.dmp
-
memory/1312-183-0x0000000002610000-0x0000000002725000-memory.dmpFilesize
1.1MB
-
memory/1344-118-0x0000000000000000-mapping.dmp
-
memory/1460-244-0x0000000000000000-mapping.dmp
-
memory/1604-152-0x0000000010000000-0x00000000100E8000-memory.dmpFilesize
928KB
-
memory/1604-148-0x0000000000000000-mapping.dmp
-
memory/1664-174-0x0000000000000000-mapping.dmp
-
memory/1668-126-0x0000000004240000-0x00000000044C9000-memory.dmpFilesize
2.5MB
-
memory/1668-77-0x0000000000000000-mapping.dmp
-
memory/1672-251-0x0000000000000000-mapping.dmp
-
memory/1680-87-0x0000000000000000-mapping.dmp
-
memory/1692-249-0x0000000000000000-mapping.dmp
-
memory/1780-155-0x0000000000000000-mapping.dmp
-
memory/1784-136-0x0000000000000000-mapping.dmp
-
memory/1880-250-0x0000000000000000-mapping.dmp
-
memory/1892-82-0x0000000000000000-mapping.dmp
-
memory/1976-254-0x0000000000000000-mapping.dmp
-
memory/1996-60-0x00000000767B1000-0x00000000767B3000-memory.dmpFilesize
8KB
-
memory/2068-188-0x0000000000410000-0x0000000000467000-memory.dmpFilesize
348KB
-
memory/2068-186-0x00000000003E0000-0x00000000003FA000-memory.dmpFilesize
104KB
-
memory/2068-182-0x0000000000000000-mapping.dmp
-
memory/2124-232-0x0000000000000000-mapping.dmp
-
memory/2140-189-0x0000000000000000-mapping.dmp
-
memory/2144-229-0x0000000000000000-mapping.dmp
-
memory/2164-191-0x0000000000000000-mapping.dmp
-
memory/2196-197-0x0000000000200000-0x000000000021A000-memory.dmpFilesize
104KB
-
memory/2196-193-0x0000000000000000-mapping.dmp
-
memory/2196-199-0x0000000000800000-0x0000000000857000-memory.dmpFilesize
348KB
-
memory/2200-258-0x0000000000000000-mapping.dmp
-
memory/2216-196-0x0000000000000000-mapping.dmp
-
memory/2248-235-0x0000000000000000-mapping.dmp
-
memory/2360-214-0x000000006F410000-0x000000006F420000-memory.dmpFilesize
64KB
-
memory/2360-201-0x0000000000000000-mapping.dmp
-
memory/2360-219-0x000000006F410000-0x000000006F420000-memory.dmpFilesize
64KB
-
memory/2360-215-0x0000000000E50000-0x0000000000F61000-memory.dmpFilesize
1.1MB
-
memory/2360-217-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/2388-203-0x0000000000000000-mapping.dmp
-
memory/2388-218-0x0000000001080000-0x0000000001191000-memory.dmpFilesize
1.1MB
-
memory/2388-221-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/2424-206-0x0000000000000000-mapping.dmp
-
memory/2424-240-0x0000000000000000-mapping.dmp
-
memory/2432-204-0x0000000000000000-mapping.dmp
-
memory/2444-230-0x0000000000000000-mapping.dmp
-
memory/2460-211-0x0000000010000000-0x0000000010158000-memory.dmpFilesize
1.3MB
-
memory/2460-207-0x0000000000000000-mapping.dmp
-
memory/2480-238-0x0000000000000000-mapping.dmp
-
memory/2580-236-0x0000000000000000-mapping.dmp
-
memory/2620-231-0x0000000000000000-mapping.dmp
-
memory/2660-260-0x0000000002AC0000-0x0000000002AC1000-memory.dmpFilesize
4KB
-
memory/2660-259-0x0000000000000000-mapping.dmp
-
memory/2692-222-0x0000000000000000-mapping.dmp
-
memory/2736-253-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/2736-246-0x0000000000000000-mapping.dmp
-
memory/2736-252-0x0000000000000000-mapping.dmp
-
memory/2736-233-0x0000000000000000-mapping.dmp
-
memory/2768-224-0x0000000000000000-mapping.dmp
-
memory/2860-242-0x0000000000000000-mapping.dmp
-
memory/2936-226-0x0000000000000000-mapping.dmp
-
memory/2952-237-0x0000000000000000-mapping.dmp
-
memory/3012-255-0x0000000000000000-mapping.dmp
-
memory/3012-257-0x00000000003C0000-0x00000000003D0000-memory.dmpFilesize
64KB
-
memory/3012-256-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/3040-227-0x0000000000000000-mapping.dmp
-
memory/3064-228-0x0000000000000000-mapping.dmp