Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
24-06-2021 04:58
Static task
static1
Behavioral task
behavioral1
Sample
789543351b1c5d10216ff9319e835a3c.exe
Resource
win7v20210408
General
-
Target
789543351b1c5d10216ff9319e835a3c.exe
-
Size
83KB
-
MD5
789543351b1c5d10216ff9319e835a3c
-
SHA1
929dc87f7358e7ae0a3bebc54c42ac227a856b79
-
SHA256
9f8cd68021a1987bcb5115056f67fbdc12d24718e51c9103c696702512d78725
-
SHA512
8f8413fa6aa56bcab18ac3371dc8df14174cdde765c3e2eadf47159617aa638623413063ac39619282b56ab1fec30b6ef44bb2ea001dd81de2475fc8bb476e13
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Modifies system executable filetype association 2 TTPs 21 IoCs
Processes:
fastpdf_ext_process.exefastpdf_ext_process.exefastpdf_ext_process.exeregsvr32.exefastpdf_ext_process.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Thorzip regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Thorzip\ = "{E1E3163A-D2B0-4C20-A859-1B420ECB881A}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit\ = "{5D26A5C8-E94B-44d3-A027-9DF32468F8E7}" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit\ = "{221A55C1-C316-4b79-A259-0CED2417600D}" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_64bit fastpdf_ext_process.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ fastpdf_32bit fastpdf_ext_process.exe -
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 62 IoCs
Processes:
IMedia-553.exeIMediaB.exeIMediaT.exeIMediaDesk.exeIMedia.exesyzs03_1000219144.exeMarket.exeTinst.exeQMEmulatorService.exeAppMarket.exesyzs_dl_svr.execef_frame_render.execef_frame_render.execef_frame_render.execef_frame_render.exeFastpdf_setup_ver21042017.420.1.1.1.exeleishenzip_247915520_tiangua_001.exeFlashZip_2710.exeSZipMd5Tool.exeOfficeDownloaderInstall_0_100016_lanshan.exefpprotect.exeSZipService.exefastpdf_ext_process.exeSZipUpdate.exeSZipMd5Tool.exefastpdf_ext_process64.exefastpdf_ext_process.exefastpdf_ext_process64.exefastpdf_ext_process.exeThorFileManager.exeThorReport.exeSZipMd5Tool.exefastpdf_ext_process64.exefastpdf_ext_process.exeSZipMd5Tool.exek52zip20210520-220-21.exefastpdf.exefastpdf.exekzipservice.exeSZipTray.exeSZipMd5Tool.exeSZipMd5Tool.exeSZipMd5Tool.exeSZipTray.exekzip_casual64.exekzip_main.exekrecommend.exepic_soft45181.exeInstall.exeupdate.exeabckantu_2722097895_shouheng_001.exekzip_main.exePhotoViewer.exePhotoViewer.exeLanShanOffice_1_000000_lanshan64.exefastpdf.exeSZipConfig.exePhotoViewer.exePdfReader.exePhotoViewer.exekzip_main.exepid process 2452 IMedia-553.exe 3172 IMediaB.exe 2848 IMediaT.exe 992 IMediaDesk.exe 3708 IMedia.exe 2472 3724 syzs03_1000219144.exe 2320 Market.exe 2216 Tinst.exe 500 QMEmulatorService.exe 1276 AppMarket.exe 2176 syzs_dl_svr.exe 3988 cef_frame_render.exe 3120 cef_frame_render.exe 2792 cef_frame_render.exe 4540 cef_frame_render.exe 4588 Fastpdf_setup_ver21042017.420.1.1.1.exe 4636 leishenzip_247915520_tiangua_001.exe 4696 FlashZip_2710.exe 4764 SZipMd5Tool.exe 4860 OfficeDownloaderInstall_0_100016_lanshan.exe 4488 fpprotect.exe 2984 SZipService.exe 200 fastpdf_ext_process.exe 584 SZipUpdate.exe 1056 SZipMd5Tool.exe 1460 fastpdf_ext_process64.exe 4092 fastpdf_ext_process.exe 4960 fastpdf_ext_process64.exe 4280 fastpdf_ext_process.exe 4228 ThorFileManager.exe 196 ThorReport.exe 5092 SZipMd5Tool.exe 2248 fastpdf_ext_process64.exe 3340 fastpdf_ext_process.exe 4672 SZipMd5Tool.exe 4968 k52zip20210520-220-21.exe 4100 fastpdf.exe 4832 fastpdf.exe 2376 kzipservice.exe 4996 SZipTray.exe 1004 SZipMd5Tool.exe 4656 SZipMd5Tool.exe 4196 SZipMd5Tool.exe 3568 SZipTray.exe 5084 kzip_casual64.exe 4732 kzip_main.exe 4012 krecommend.exe 4848 pic_soft45181.exe 4008 Install.exe 4556 update.exe 4216 abckantu_2722097895_shouheng_001.exe 992 kzip_main.exe 4228 PhotoViewer.exe 4548 PhotoViewer.exe 2532 LanShanOffice_1_000000_lanshan64.exe 4592 fastpdf.exe 4356 SZipConfig.exe 4604 PhotoViewer.exe 3508 PdfReader.exe 4224 PhotoViewer.exe 3952 kzip_main.exe -
Modifies Installed Components in the registry 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cef_frame_render.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation cef_frame_render.exe -
Loads dropped DLL 64 IoCs
Processes:
789543351b1c5d10216ff9319e835a3c.exerundll32.exerundll32.exesyzs03_1000219144.exeQMEmulatorService.exeAppMarket.execef_frame_render.exepid process 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 1052 rundll32.exe 1400 rundll32.exe 2716 2716 3152 789543351b1c5d10216ff9319e835a3c.exe 3152 789543351b1c5d10216ff9319e835a3c.exe 3724 syzs03_1000219144.exe 500 QMEmulatorService.exe 500 QMEmulatorService.exe 500 QMEmulatorService.exe 500 QMEmulatorService.exe 500 QMEmulatorService.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 1276 AppMarket.exe 3988 cef_frame_render.exe 3988 cef_frame_render.exe 3988 cef_frame_render.exe 3988 cef_frame_render.exe 3988 cef_frame_render.exe 3988 cef_frame_render.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
IMedia-553.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IMedia-553.exe -
Drops Chrome extension 1 IoCs
Processes:
update.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dknlfmhongfkfakmhhnmgfgnhhcbmldm\3.6.21_0\manifest.json update.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
SZipTray.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\ SZipTray.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 SZipTray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 6 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
leishenzip_247915520_tiangua_001.exeThorReport.exeabckantu_2722097895_shouheng_001.exesyzs03_1000219144.exeQMEmulatorService.exeAppMarket.exedescription ioc process File opened for modification \??\PhysicalDrive0 leishenzip_247915520_tiangua_001.exe File opened for modification \??\PhysicalDrive0 ThorReport.exe File opened for modification \??\PhysicalDrive0 abckantu_2722097895_shouheng_001.exe File opened for modification \??\PhysicalDrive0 syzs03_1000219144.exe File opened for modification \??\PhysicalDrive0 QMEmulatorService.exe File opened for modification \??\PhysicalDrive0 AppMarket.exe -
Drops file in System32 directory 4 IoCs
Processes:
QMEmulatorService.exeSZipMd5Tool.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.db QMEmulatorService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Tencent\DeskUpdate\GlobalMgr.db QMEmulatorService.exe File created C:\Windows\system32\SZipOverlayIcon.dll SZipMd5Tool.exe File created C:\Windows\system32\SZipOverlayIcon64.dll SZipMd5Tool.exe -
Drops file in Program Files directory 64 IoCs
Processes:
LanShanOffice_1_000000_lanshan64.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exedescription ioc process File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\webcast\savepic.asp LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\wizards\common\HelpIds.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\version.ini LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\fingerprint\kng.lm LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\pages\webapp\images\info_pic.9217cd3.png Tinst.exe File created C:\Program Files (x86)\fastpdf\fastpdf_ext64.dll Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\theme_definitions\ios\combobox.svg LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\toolbar\graffilterbar.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\dbaccess\ui\textpage.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\xslt\common\measure_conversion.xsl LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\h5\template\static\js\5.cc34e630.chunk.js.LICENSE.txt LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\sfx\ui\emojicontrol.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\ui\pageheaderpanel.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\formula\ui\structpage.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\ui\notebookbar_groupedbar_full.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\svx\ui\textcontrolchardialog.ui LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\webctrl\loading\12.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\window\web_load_error.png Tinst.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\template\wizard\bitmap\ftpunknown.gif LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\reprlib.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\setup.ini LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\palette\hatching.soh LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\tvoice_entry\hover\31.png Tinst.exe File created C:\Program Files (x86)\fastpdf\translations\qt_ja.qm Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\lib2to3\fixes\fix_isinstance.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\opengl\staticFragmentShader.glsl LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\BasicIDE\toolbar\translationbar.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\lib2to3\fixer_base.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\encodings\zlib_codec.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\fingerprint\fy.lm LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\svx\ui\floatingundoredo.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\ui\textgridpage.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\dbaccess\ui\sqlexception.ui LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\window\tab\new_game_hover.png Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\static\media\search_normal.38fc3c82.png Tinst.exe File created C:\Program Files (x86)\fastpdf\data\cacert.pem Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\wizard\web\buttons\simple.zip LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\sweb\toolbar\graffilterbar.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\importlib\_bootstrap.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\54.png Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\gallery\bullets\ylwsqare.gif LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\cui\ui\acoroptionspage.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\dbreport\ui\floatingsort.ui LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\api-ms-win-crt-environment-l1-1-0.dll Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\AppMarket\Res\webctrl\loading\23.png Tinst.exe File created C:\Program Files (x86)\fastpdf\res\uninstall\45.png Fastpdf_setup_ver21042017.420.1.1.1.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\email\mime\base.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\ui\splittable.ui LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\template\common\wizard\report\stl-07.ott LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\fingerprint\yo.lm LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\TGVoiceBuddy\I18N\1049\StringBundle.xml Tinst.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\module\page-test.6fe69994.js Tinst.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\gallery\bullets\grnpearl.gif LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\sglobal\toolbar\frameobjectbar.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\toolbar\symbolshapes.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\contextvars.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\swriter\ui\createautomarkdialog.ui LanShanOffice_1_000000_lanshan64.exe File created \??\c:\program files\txgameassistant\appmarket\pages\syzsweb\static\media\default-icon.d631fb1f.png Tinst.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\config\soffice.cfg\modules\sweb\toolbar\standardbar.xml LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\python-core-3.7.7\lib\encodings\utf_32_le.py LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\fonts\truetype\SourceSerifPro-Black.ttf LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\autocorr\acor_cs-CZ.dat LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\program\resource\zh_CN\LC_MESSAGES\svl.mo LanShanOffice_1_000000_lanshan64.exe File created C:\Program Files (x86)\LanShanOffice\1.2.2.10617\share\fonts\truetype\LinLibertine_RZI_G.ttf LanShanOffice_1_000000_lanshan64.exe -
Drops file in Windows directory 3 IoCs
Processes:
leishenzip_247915520_tiangua_001.exeabckantu_2722097895_shouheng_001.exedescription ioc process File created C:\Windows\Tasks\ThorUpdate.job leishenzip_247915520_tiangua_001.exe File created C:\Windows\Tasks\PV_UPDATE.job abckantu_2722097895_shouheng_001.exe File created C:\Windows\Tasks\PV_UPDATE2.job abckantu_2722097895_shouheng_001.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4684 196 WerFault.exe ThorReport.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
k52zip20210520-220-21.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 k52zip20210520-220-21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString k52zip20210520-220-21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
k52zip20210520-220-21.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS k52zip20210520-220-21.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName k52zip20210520-220-21.exe -
Processes:
SZipTray.exeSZipTray.exeie4uinit.exeie4uinit.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\SZipTray.exe = "11000" SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBSOCKET\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI \SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DOMSTORAGE\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_XMLHTTP\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_XMLHTTP SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_LEGACY_COMPRESSION SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_POPUPMANAGEMENT\SZipTray.exe = "0" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_DOCUMENT_ZOOM\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_CLIPCHILDREN_OPTIMIZATION SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_STATUS_BAR_THROTTLING SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_TABBED_BROWSING\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_MANAGE_SCRIPT_CIRCULAR_REFS\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DOMSTORAGE\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SPELLCHECKING SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_IVIEWOBJECTDRAW_DMLT9_WITH_GDI SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_VALIDATE_NAVIGATE_URL\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT\SZipTray.exe = "0" SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SCRIPTURL_MITIGATION\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS SZipTray.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WEBOC_MOVESIZECHILD\SZipTray.exe = "1" SZipTray.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_AJAX_CONNECTIONEVENTS\SZipTray.exe = "1" SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DOMSTORAGE SZipTray.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING SZipTray.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
SZipService.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache SZipService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Modifies registry class 64 IoCs
Processes:
PhotoViewer.exefastpdf_ext_process.exekzip_main.exeie4uinit.exeie4uinit.exeThorFileManager.exefastpdf_ext_process64.exeregsvr32.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exekzip_casual64.exefastpdf.exeregsvr32.exefastpdf_ext_process.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.mng\DefaultIcon PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.jng PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.tbi\Shell\Open PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.doc\Shell\ kother_to_pdf\command\ = "\"C:\\Program Files (x86)\\fastpdf\\pdfconverter.exe\" /from:14 /type:21 /kpath:\"%1\"" fastpdf_ext_process.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\k52zip.hfs kzip_main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\open\CommandId = "IE.File" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\k52zip.ntfs\DefaultIcon kzip_main.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.pct PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.taz\Shell\Open\Command ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\ = "mhtmlfile" ie4uinit.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.cr2\Shell\Open\Command PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.dcr\ = "图片格式" PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.tpz\DefaultIcon ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.xar\Shell\Open\Command ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.bzip2\ = "thorzip.bzip2" ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\Content Type = "text/html" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.koa\Shell\Open\Command PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.pef\ = "图片格式" PhotoViewer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.wap\ = "PhotoViewer.wap" PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.xlsx fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{60D7BB01-CD27-4D13-AE76-17BD82A461E5}\ = "FastPdfExt" fastpdf_ext_process64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.dmg ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.iff\Shell PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.docx\Shell\ kother_to_pdf fastpdf_ext_process.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.ace\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\",0" ThorFileManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.fat\OpenWithProgids\k52zip.fat kzip_main.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tif\ShellEx regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.pnm\Shell\Open\Command PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.pbm\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\PhotoViewer\\PhotoViewer.exe\",1" PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.7z\Shell ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.cab\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorFileManager.exe\" \"%1\"" ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\thorzip.gz ThorFileManager.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" %1" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.tiff\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\PhotoViewer\\PhotoViewer.exe\" \"%1\"" PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TencentMobileGameAssistant\shell\open\command\ = "\"C:\\Program Files\\TxGameAssistant\\AppMarket\\AppMarket.exe\" \"%1\"" Tinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.png\Shell\ qimage_extract_text\Icon = "C:\\Program Files (x86)\\fastpdf\\fastpdf.exe,0" fastpdf_ext_process.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.docx\Shell\ kother_to_pdf\Icon = "C:\\Program Files (x86)\\fastpdf\\pdfconverter.exe,0" fastpdf_ext_process.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{387A0E1A-EB04-49D6-ADE2-A6C57F6D2736}\Implemented Categories\{AD5C5A19-F6F1-4B2F-B80E-AD28204A75E9}\user_type = "0" Fastpdf_setup_ver21042017.420.1.1.1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tbi PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.lzma\DefaultIcon ThorFileManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B1832224-9F22-4965-A6E8-E6A6E3C4FDF7}\InprocServer32\ = "C:\\Program Files (x86)\\k52zip\\kzip_ext64.dll" kzip_casual64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.mng\Shell\Open PhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.wdp\DefaultIcon PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.cab\Shell ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\fastpdf.exe.pdf\Shell fastpdf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jfif\ShellEx regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.j2c PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.pic\DefaultIcon PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jpg\Shell\ print\ = "打印(&P)" fastpdf_ext_process.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.lzma\Shell\Open\Command ThorFileManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.pic\Shell\Open\Command PhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\PhotoViewer.orf\Shell\Open\Command PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C1005413-92D1-4B52-811C-37C5554BC0D2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\雷神压缩\\ThorHelp64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shellex\ContextMenuHandlers\{FBF23B40-E3F0-101B-8488-00AA003E56F8} ie4uinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\k52zip.dmg\shell\open\command\ = "C:\\Program Files (x86)\\k52zip\\kzip_main.exe -from:extension_association -action:open -in=\"%1\"" kzip_main.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PhotoViewer.mng\ = "图片格式" PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mef\ = "PhotoViewer.mef" PhotoViewer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KisOfficeAddin.Component\CurVer\ = "KisOfficeAddin.Component.1" fastpdf_ext_process.exe Set value (str) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\thorzip.lha\ = "压缩文件" ThorFileManager.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\.rar\OpenWithProgids kzip_main.exe -
Processes:
cef_frame_render.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 cef_frame_render.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD cef_frame_render.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 cef_frame_render.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba9531400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b0b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f cef_frame_render.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C cef_frame_render.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 cef_frame_render.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
fastpdf.exepid process 4592 fastpdf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
IMediaB.exepid process 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe 3172 IMediaB.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 616 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
IMediaB.exeTinst.exeFastpdf_setup_ver21042017.420.1.1.1.exewmic.exedescription pid process Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 3172 IMediaB.exe Token: SeDebugPrivilege 2216 Tinst.exe Token: SeDebugPrivilege 4588 Fastpdf_setup_ver21042017.420.1.1.1.exe Token: SeDebugPrivilege 4588 Fastpdf_setup_ver21042017.420.1.1.1.exe Token: SeIncreaseQuotaPrivilege 4892 wmic.exe Token: SeSecurityPrivilege 4892 wmic.exe Token: SeTakeOwnershipPrivilege 4892 wmic.exe Token: SeLoadDriverPrivilege 4892 wmic.exe Token: SeSystemProfilePrivilege 4892 wmic.exe Token: SeSystemtimePrivilege 4892 wmic.exe Token: SeProfSingleProcessPrivilege 4892 wmic.exe Token: SeIncBasePriorityPrivilege 4892 wmic.exe Token: SeCreatePagefilePrivilege 4892 wmic.exe Token: SeBackupPrivilege 4892 wmic.exe Token: SeRestorePrivilege 4892 wmic.exe Token: SeShutdownPrivilege 4892 wmic.exe Token: SeDebugPrivilege 4892 wmic.exe Token: SeSystemEnvironmentPrivilege 4892 wmic.exe Token: SeRemoteShutdownPrivilege 4892 wmic.exe Token: SeUndockPrivilege 4892 wmic.exe Token: SeManageVolumePrivilege 4892 wmic.exe Token: 33 4892 wmic.exe Token: 34 4892 wmic.exe Token: 35 4892 wmic.exe Token: 36 4892 wmic.exe Token: SeIncreaseQuotaPrivilege 4892 wmic.exe Token: SeSecurityPrivilege 4892 wmic.exe Token: SeTakeOwnershipPrivilege 4892 wmic.exe Token: SeLoadDriverPrivilege 4892 wmic.exe Token: SeSystemProfilePrivilege 4892 wmic.exe Token: SeSystemtimePrivilege 4892 wmic.exe Token: SeProfSingleProcessPrivilege 4892 wmic.exe Token: SeIncBasePriorityPrivilege 4892 wmic.exe Token: SeCreatePagefilePrivilege 4892 wmic.exe Token: SeBackupPrivilege 4892 wmic.exe Token: SeRestorePrivilege 4892 wmic.exe Token: SeShutdownPrivilege 4892 wmic.exe Token: SeDebugPrivilege 4892 wmic.exe Token: SeSystemEnvironmentPrivilege 4892 wmic.exe Token: SeRemoteShutdownPrivilege 4892 wmic.exe Token: SeUndockPrivilege 4892 wmic.exe Token: SeManageVolumePrivilege 4892 wmic.exe Token: 33 4892 wmic.exe Token: 34 4892 wmic.exe Token: 35 4892 wmic.exe Token: 36 4892 wmic.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
AppMarket.exefastpdf_ext_process64.exefastpdf_ext_process64.exefastpdf_ext_process64.exeSZipTray.exekzip_casual64.exepid process 1276 AppMarket.exe 1460 fastpdf_ext_process64.exe 4960 fastpdf_ext_process64.exe 2248 fastpdf_ext_process64.exe 3568 SZipTray.exe 5084 kzip_casual64.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
AppMarket.exepid process 1276 AppMarket.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
IMedia-553.exeIMediaB.exeIMedia.exerundll32.exefastpdf.exepid process 2452 IMedia-553.exe 2452 IMedia-553.exe 2452 IMedia-553.exe 3172 IMediaB.exe 3172 IMediaB.exe 3708 IMedia.exe 1400 rundll32.exe 4592 fastpdf.exe 4592 fastpdf.exe 4592 fastpdf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
789543351b1c5d10216ff9319e835a3c.exeIMedia-553.exeIMediaT.exeIMediaDesk.exerundll32.exesyzs03_1000219144.exeTinst.exeAppMarket.exedescription pid process target process PID 3152 wrote to memory of 2452 3152 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 3152 wrote to memory of 2452 3152 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 3152 wrote to memory of 2452 3152 789543351b1c5d10216ff9319e835a3c.exe IMedia-553.exe PID 2452 wrote to memory of 3172 2452 IMedia-553.exe IMediaB.exe PID 2452 wrote to memory of 3172 2452 IMedia-553.exe IMediaB.exe PID 2452 wrote to memory of 3172 2452 IMedia-553.exe IMediaB.exe PID 2452 wrote to memory of 2848 2452 IMedia-553.exe IMediaT.exe PID 2452 wrote to memory of 2848 2452 IMedia-553.exe IMediaT.exe PID 2452 wrote to memory of 2848 2452 IMedia-553.exe IMediaT.exe PID 2452 wrote to memory of 992 2452 IMedia-553.exe IMediaDesk.exe PID 2452 wrote to memory of 992 2452 IMedia-553.exe IMediaDesk.exe PID 2452 wrote to memory of 992 2452 IMedia-553.exe IMediaDesk.exe PID 2848 wrote to memory of 3404 2848 IMediaT.exe schtasks.exe PID 2848 wrote to memory of 3404 2848 IMediaT.exe schtasks.exe PID 2848 wrote to memory of 3404 2848 IMediaT.exe schtasks.exe PID 2452 wrote to memory of 3708 2452 IMedia-553.exe IMedia.exe PID 2452 wrote to memory of 3708 2452 IMedia-553.exe IMedia.exe PID 2452 wrote to memory of 3708 2452 IMedia-553.exe IMedia.exe PID 992 wrote to memory of 1052 992 IMediaDesk.exe rundll32.exe PID 992 wrote to memory of 1052 992 IMediaDesk.exe rundll32.exe PID 992 wrote to memory of 1052 992 IMediaDesk.exe rundll32.exe PID 1052 wrote to memory of 1400 1052 rundll32.exe rundll32.exe PID 1052 wrote to memory of 1400 1052 rundll32.exe rundll32.exe PID 2848 wrote to memory of 2532 2848 IMediaT.exe schtasks.exe PID 2848 wrote to memory of 2532 2848 IMediaT.exe schtasks.exe PID 2848 wrote to memory of 2532 2848 IMediaT.exe schtasks.exe PID 3152 wrote to memory of 3724 3152 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 3152 wrote to memory of 3724 3152 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 3152 wrote to memory of 3724 3152 789543351b1c5d10216ff9319e835a3c.exe syzs03_1000219144.exe PID 3724 wrote to memory of 2320 3724 syzs03_1000219144.exe Market.exe PID 3724 wrote to memory of 2320 3724 syzs03_1000219144.exe Market.exe PID 3724 wrote to memory of 2320 3724 syzs03_1000219144.exe Market.exe PID 3724 wrote to memory of 2216 3724 syzs03_1000219144.exe Tinst.exe PID 3724 wrote to memory of 2216 3724 syzs03_1000219144.exe Tinst.exe PID 3724 wrote to memory of 2216 3724 syzs03_1000219144.exe Tinst.exe PID 2216 wrote to memory of 2832 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2832 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2832 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3928 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3928 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3928 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3156 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3156 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 3156 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2848 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2848 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2848 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2180 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2180 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2180 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2284 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2284 2216 Tinst.exe Netsh.exe PID 2216 wrote to memory of 2284 2216 Tinst.exe Netsh.exe PID 3724 wrote to memory of 1276 3724 syzs03_1000219144.exe AppMarket.exe PID 3724 wrote to memory of 1276 3724 syzs03_1000219144.exe AppMarket.exe PID 3724 wrote to memory of 1276 3724 syzs03_1000219144.exe AppMarket.exe PID 1276 wrote to memory of 2176 1276 AppMarket.exe syzs_dl_svr.exe PID 1276 wrote to memory of 2176 1276 AppMarket.exe syzs_dl_svr.exe PID 1276 wrote to memory of 2176 1276 AppMarket.exe syzs_dl_svr.exe PID 1276 wrote to memory of 3988 1276 AppMarket.exe cef_frame_render.exe PID 1276 wrote to memory of 3988 1276 AppMarket.exe cef_frame_render.exe PID 1276 wrote to memory of 3988 1276 AppMarket.exe cef_frame_render.exe PID 1276 wrote to memory of 3120 1276 AppMarket.exe cef_frame_render.exe PID 1276 wrote to memory of 3120 1276 AppMarket.exe cef_frame_render.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\789543351b1c5d10216ff9319e835a3c.exe"C:\Users\Admin\AppData\Local\Temp\789543351b1c5d10216ff9319e835a3c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exe"C:\Users\Admin\AppData\Local\Temp\IMedia-553.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\IMedia\IMediaB.exe"C:\Program Files (x86)\IMedia\IMediaB.exe" install3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\IMedia\IMediaT.exe"C:\Program Files (x86)\IMedia\IMediaT.exe" install3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /TN _Newdd_ddddfgd_sdfqefjkjkjkj_IMedia_e3df_TEE /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc ONLOGON /tn _Newdd_ddddfgd_sdfqefjkjkjkj_IMedia_e3df_TEE /tr "\"C:\Program Files (x86)\IMedia\IMediaB.exe\" taskactive" /rl HIGHEST4⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\IMedia\IMediaDesk.exe"C:\Program Files (x86)\IMedia\IMediaDesk.exe" install3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\IMedia\IMedia64.dll" DllGetClassObjectEx4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" /s "C:\Program Files (x86)\IMedia\IMedia64.dll" DllGetClassObjectEx5⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\IMedia\IMedia.exe"C:\Program Files (x86)\IMedia\IMedia.exe" install3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exe"C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exe"C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exe"3⤵
- Executes dropped EXE
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exe"C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="AppMarket" dir=in program="c:\program files\txgameassistant\appmarket\AppMarket.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TInst" dir=in program="c:\program files\txgameassistant\appmarket\TInst.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="bugreport" dir=in program="c:\program files\txgameassistant\appmarket\bugreport.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="QQExternal" dir=in program="c:\program files\txgameassistant\appmarket\QQExternal.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="GameDownload" dir=in program="c:\program files\txgameassistant\appmarket\GameDownload.exe" action=allow4⤵
-
C:\Windows\SysWOW64\Netsh.exe"C:\Windows\system32\Netsh.exe" advfirewall firewall add rule name="TUpdate" dir=in program="c:\program files\txgameassistant\appmarket\GF186\TUpdate.exe" action=allow4⤵
-
C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe"C:\Program Files\TxGameAssistant\AppMarket\AppMarket.exe" -from TGBDownloader3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.exe"C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.exe" --conf-path="C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.cfg" --daemon --log="C:\Program Files\TxGameAssistant\AppMarket\DL\syzs_dl_svr.log"4⤵
- Executes dropped EXE
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=gpu-process --field-trial-handle=2368,18052736311222120022,12913811502584897603,131072 --disable-features=OutOfBlinkCors --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --gpu-preferences=KAAAAAAAAADgAAAgAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=6510007798590649164 --mojo-platform-channel-handle=2460 /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=utility --field-trial-handle=2368,18052736311222120022,12913811502584897603,131072 --disable-features=OutOfBlinkCors --lang=en-US --service-sandbox-type=network --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=14422246541074373669 --mojo-platform-channel-handle=3152 /prefetch:84⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=renderer --no-sandbox --force-device-scale-factor=1.00 --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --field-trial-handle=2368,18052736311222120022,12913811502584897603,131072 --disable-features=OutOfBlinkCors --lang=en-US --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --disable-pdf-extension=1 --ppapi-flash-path="PepperFlash\pepflashplayer.dll" --ppapi-flash-version=18.0.0.209 --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=11061101416229369007 --renderer-client-id=3 --mojo-platform-channel-handle=3212 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe"C:\Program Files\TxGameAssistant\AppMarket\cef_frame_render.exe" --type=gpu-process --field-trial-handle=2368,18052736311222120022,12913811502584897603,131072 --disable-features=OutOfBlinkCors --disable-gpu-sandbox --use-gl=disabled --no-sandbox --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --log-severity=disable --user-agent="Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Tencent AppMarket/3.10.1683.80" --lang=en-US --gpu-preferences=KAAAAAAAAADoAAAgAAAAAAAAYAAAAAAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --log-file="C:\Program Files\TxGameAssistant\AppMarket\debug.log" --service-request-channel-token=3042554983926852001 --mojo-platform-channel-handle=3600 /prefetch:24⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Fastpdf_setup_ver21042017.420.1.1.1.exe"C:\Users\Admin\AppData\Local\Temp\Fastpdf_setup_ver21042017.420.1.1.1.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process64.exe" /ext:13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" /action:install4⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -refreshdesktop=13⤵
- Executes dropped EXE
-
C:\Windows\system32\ie4uinit.exe"C:\Windows\system32\ie4uinit.exe" -show4⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -associate=13⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\system32\ie4uinit.exe"C:\Windows\system32\ie4uinit.exe" -show4⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\leishenzip_247915520_tiangua_001.exe"C:\Users\Admin\AppData\Local\Temp\leishenzip_247915520_tiangua_001.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\雷神压缩\ThorService.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorShell64.dll4⤵
- Modifies system executable filetype association
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\雷神压缩\ThorHelp64.dll4⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\雷神压缩\ThorFileManager.exe"C:\Users\Admin\AppData\Roaming\雷神压缩\ThorFileManager.exe" --register_application3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\雷神压缩\ThorReport.exe"C:\Users\Admin\AppData\Roaming\雷神压缩\ThorReport.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 196 -s 3764⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\FlashZip_2710.exe"C:\Users\Admin\AppData\Local\Temp\FlashZip_2710.exe" -8122a41aa4ae2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCWNYmzoMeWFUU0CM2Dtga35YuzOEd3hN6CIB20FaUT10MxhIaCtAGtPOMDxEPyeMSm2ET0QMbW2FqhSNiGtFdl6IoCU0j1HZsj4ZsmYNu2YI25oZFmfYXybYnmgMH9ZNXzJgP5UNeTGQCz8MJzJU7x3YajkFNjZNLW9QuxyMbDxIHx5NRmCZDmZOTTFMnxpOsWFUG4nMyztVkhPMa29MRudZtXLholy -2596b1ef9f0a=273⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\ShiningZip\ZipCnu64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Local\ShiningZip\ZipCnu64.dll"5⤵
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Aq=S -2596b1ef9f0a=274⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNMmyoOeTFNUkCO2WtUay5MuGOEdyhN6yIA2tFNUG1YMyhOaTtEG0PYM2xIP3eMSD2NTjQPbX2sqiSaiWtQdi6OojUEj2HNsy4wsiYdujYE2ioOFjfEXsbInngVHyZbXCJIP6UIemGhC08dJHJA763Layk9NkZbLC95uiyabWx5Hn5aRHCVDvZaT2FVnqpasSF5Gjnbyit9kGPbaG9FRzdatFLpopycWCS9I0TcZ2Vtgf9Y0mGpsynakiWIHszIJmO1vkNNgSpI46vIgjYY11TZdjqd5ihNkGTMSyjY0znMzyZM3GzITybNT2QUiw6N1jyciwUNWmPRrmEYv2mUP29MfGLFxlkZnjnAyzgI6imwCiDYh2U9QufZnmjlXndI2jypS79IAmYxDhTb8mXQWi7OkjdEWshI4mGlLuHdoGXVmyRdzCHIg6PMzSHwiiZctGrFpyMYpWD03i8OyirJETaa5GFFsuKWFm1lCwMITi1wEiiZuGTxksob3WjFXp6bPi4IX6NIaljJZ1AbDkB1ihmapWS4MiLfaXl04=v -2596b1ef9f0a=275⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipTray.exe" -e61475c863c7=27 -c9c0eef9ccd6=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L -2596b1ef9f0a=275⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\OfficeDownloaderInstall_0_100016_lanshan.exe"C:\Users\Admin\AppData\Local\Temp\OfficeDownloaderInstall_0_100016_lanshan.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic bios get SerialNumber3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic bios get SerialNumber3⤵
-
C:\Users\Admin\AppData\Local\Temp\4_4_5\LanShanOffice_1_000000_lanshan64.exeC:\Users\Admin\AppData\Local\Temp\4_4_5\LanShanOffice_1_000000_lanshan64.exe --s -shortcut=1 -fileacc=1 -channel=1000163⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\k52zip20210520-220-21.exeC:\Users\Admin\AppData\Local\Temp\k52zip20210520-220-21.exe2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
-
C:\Program Files (x86)\k52zip\kzip_casual64.exe"C:\Program Files (x86)\k52zip\kzip_casual64.exe" --worker=kzip_ext --register3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\k52zip\kzip_main.exe"C:\Program Files (x86)\k52zip\kzip_main.exe" -action=rptinject -res:1 -hres:"Invalid window handle"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\k52zip\kzip_main.exe"C:\Program Files (x86)\k52zip\kzip_main.exe" -action:assext3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\k52zip\krecommend.exe"C:\Program Files (x86)\k52zip\krecommend.exe" /product:11 /type:1 /sence:13⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\pic_soft45181.exeC:\Users\Admin\AppData\Local\Temp\pic_soft45181.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Mtkantu\Install.exe"C:\Users\Admin\AppData\Local\Temp\Mtkantu\Install.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Mtkantu\update.exeC:\Users\Admin\AppData\Local\Mtkantu\update.exe4⤵
- Executes dropped EXE
- Drops Chrome extension
-
C:\Users\Admin\AppData\Local\Temp\abckantu_2722097895_shouheng_001.exeC:\Users\Admin\AppData\Local\Temp\abckantu_2722097895_shouheng_001.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\ShellExt64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\PVShellExt64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\PhotoViewer\Checker.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\PhotoViewer\PreviewExt64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\PhotoViewer\PreviewExt64.dll4⤵
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\PhotoViewer\PVShellExt64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\PhotoViewer\PVShellExt64.dll4⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\PhotoViewer\Checker.dll3⤵
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe" -unregdigitext3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe" -regall3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe" -deloldshellext3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\PdfReader.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\PdfReader.exe" -regall3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\Report.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\Report.exe"3⤵
-
C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"C:\Program Files\TxGameAssistant\AppMarket\QMEmulatorService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
-
C:\Program Files (x86)\fastpdf\fpprotect.exe"C:\Program Files (x86)\fastpdf\fpprotect.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe"C:\Program Files (x86)\fastpdf\fastpdf_ext_process.exe" -action:check_plugin_register2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" -sactive=12⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipService.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipService.exe -3ba07688d9f41⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipUpdate.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipUpdate.exe -e61475c863c7=27 -c9c0eef9ccd6=LCTNNmioOeDFZUkCN2jtga55YuWOJdlhM6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exeC:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe -e61475c863c7=27 -c9c0eef9ccd6=LCTNEm2oNeDFFUiCN22tMa25ZuTOldjhZ6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Qq=S -2596b1ef9f0a=273⤵
- Executes dropped EXE
-
\??\c:\windows\syswow64\svchost.exec:\windows\syswow64\svchost.exe -k szpsrvrgroup -s szpsrvr1⤵
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Local\Zipdktp\SZipConfig.exeC:\Users\Admin\AppData\Local\Zipdktp\SZipConfig.exe -e61475c863c7=27 -c9c0eef9ccd6=LCTNImwoZeDFgUwCY2ztVal5NuDOMdwhO6CIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Yq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k thorzip_updatesvc1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k thorzip_updatesvc1⤵
-
C:\Program Files (x86)\k52zip\kzipservice.exe"C:\Program Files (x86)\k52zip\kzipservice.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNRmjoOeDFIU5CO2Dtdam5NuGOQd0hM6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2IqgS -2596b1ef9f0a=271⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNEm2oNeDFFUiCN22tMa25ZuTOldjhZ6SIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Iq=S -2596b1ef9f0a=271⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe"C:\Users\Admin\AppData\Local\ShiningZip\SZipMd5Tool.exe" -e61475c863c7=27 -c9c0eef9ccd6=LCTNgm1oYejFcU4CZ2Dthaj5ZujOZdmhN6yIA2tFMUj1IMyhYaTtQG4PNMmxNPkeMSz2NTkQPbT2Iq=S -2596b1ef9f0a=272⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k PhotoviewerService1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k PhotoviewerService1⤵
-
C:\Program Files (x86)\k52zip\kzip_main.exe"C:\Program Files (x86)\k52zip\kzip_main.exe" -from:shell_ext -menu_item:0 -action:showmenu1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\kfastpic\11\kfpnewupdate.exe"C:\Users\Admin\AppData\Local\kfastpic\11\kfpnewupdate.exe" /from:171⤵
-
C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe"C:\Users\Admin\AppData\Roaming\PhotoViewer\PhotoViewer.exe" -regcapturehotkey1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\fastpdf\fastpdf.exe"C:\Program Files (x86)\fastpdf\fastpdf.exe" /setdefault:11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
C:\Program Files (x86)\IMedia\IMedia.exeMD5
903c1b83b7b9106440dda28aa3698a6a
SHA1625b83e7f3f784e024685b1b61846e633a40425d
SHA256eba964b6534b490cd29bef1bdba67cfd748bbfdf32b8aa81fb68f2fda2d498b4
SHA512d9fe1fbdd39d22d064661b698c0d896186637765a6e005788f7508f57e2ee38d488e5eccd56450be7d3ec95d5b955de9aa6ba03b41b542b2b118835be508c0c2
-
C:\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
C:\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
C:\Program Files (x86)\IMedia\IMediaB.exeMD5
1c1a7e640e4c5bc026f4d4be3e027160
SHA1e597a0bbb3509755ed4734d7bb690811ef83cee1
SHA256e25c758f34ee0ddae57f999f4fb8aae8dba138554978a803c3abaff5f014e44b
SHA51276fbf0dbe42521e0a2cdcc283073fecf47efec3350b88267900fac65a09ac30854f74c9837960594a6d0bebf73460e7c9fc090f2db99c3f4103d318f5eb6eedb
-
C:\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
C:\Program Files (x86)\IMedia\IMediaDesk.exeMD5
dde40d98050d34f343fe04d899c3be81
SHA105a3d59b179cf41ae25bc9d0d00db9ac3715a097
SHA256449a1f593cb542a546a393d2d12eec23fc9b5a84462edb9c0ad1f4f943e1431f
SHA512542b708eab706734eccbc581ee7636354d6aa1d3b202d709832d998c53cce543b591922638af0109a4afbbe1f01e2789690f7ba802f2ef724dde85bb1bf98fbe
-
C:\Program Files (x86)\IMedia\IMediaT.exeMD5
767d847e1d357c33940d4f714f90da96
SHA114172fd6e5e99c526478cda0b472689c900504b7
SHA256815a4e28a3d3d8b797916b9c95fb83d5d3bfc1dbee4eee9ba35466d219b30c18
SHA5125da6d3597865885e9c603f68cc7c1860b3df4fb80725592fcf702cc0c4be97cb6c44c698f267c3931c3e440af8dc7bcd9d7abc74a9e88d381c5cfb04af742c5d
-
C:\Program Files (x86)\IMedia\IMediaT.exeMD5
767d847e1d357c33940d4f714f90da96
SHA114172fd6e5e99c526478cda0b472689c900504b7
SHA256815a4e28a3d3d8b797916b9c95fb83d5d3bfc1dbee4eee9ba35466d219b30c18
SHA5125da6d3597865885e9c603f68cc7c1860b3df4fb80725592fcf702cc0c4be97cb6c44c698f267c3931c3e440af8dc7bcd9d7abc74a9e88d381c5cfb04af742c5d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Market.exeMD5
da12dfb041b409e76d6661e7ad02eb9b
SHA1598694fb09f1ba710610cbe18e0887a4dca37943
SHA2563934a331888c62d6efd436e71f335849ca401cd4aea2edab8f563cb04edd132f
SHA51222fecd0ce6587f12c83ee702547c448d1ea958ba1e3c90786f6edbd7c544bf9cb2324120f8aac6c59e7036297542e41686a60f04e603a5bd9de7371730661c0d
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\AECommonDll.dllMD5
56bf4cf65918a67a3ab14046c756b552
SHA10d3138919585bedfd5fc8eb4333beb57016ca24f
SHA256c6872ce41e31e68be9e4461243ae19e6012966ab43a0d513f775ff940ba39eae
SHA51260a7ce0a2a1043de26339eadc8b7735053e6e3dffbb462aa4cbf9a0bd782d42fafca8f0769121a57c12ed117e866db430bd4b658fd63ac07416d305bed304266
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\AowGame.xmlMD5
59cb1bafb0fe0e415f03cd9b49069164
SHA1e812c08598766acb454c5f5c76b966b6873cdc8b
SHA2560103f094c6865ef2c4c0213190a5d13f337b0a9bddf58f4a1910bf91ceadb2c9
SHA51209c019bd1bed60fc3b8d274d2f514cea240ec2d98476a8937dde20369d8472f23ad0d7a33c11b52fa28a465a3ee1ae5bda63ee5f9f76c27b0fc0e18045dd4918
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Config.iniMD5
ba50063cd1a85f562d5c6a92f28fc062
SHA141d01f5bc2c800424277dc39ddfb4a70bdbaf00e
SHA2561d02987a9b23cb3c11ad6c8123446efcd8e43c0069a616ff09dfc80426a82861
SHA5122fe0aa3e2b6dd171f25d792991328737a15905d290a3d32c4fbe6bc452976c6cd88e157b98a032f1348e53d26e4eeae9928d430e700849baa95e9c73207079b3
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\TInst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\Tinst.exeMD5
67def83aee9714097ae67fa55a757383
SHA1bede677829357926277f7d4b45de84e22c432a4b
SHA25657de79e660ba1484f506a8aa90cfdb087aa7db99737d488efc74363c4d78882d
SHA512bc4cc54cc33c4cb043925aa5b3e5cb090acaa86ce5a0b844982a2569ada69993d6e58c72b029e39d1165b965a10871b82b3bb22a6ddf21c1811f28ad9cb672ac
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\aowgameex2.datMD5
a860fbdb56190eededbb9527abc20e32
SHA1248c422cce200525f90679f49c1f9a22133a5de5
SHA256a7f94e7cf4f162bdc89f7a191c3fd8a073a68f156ee43b13942267f62a4436e7
SHA512776336b8a2d478ce685c346634526959ee11bff8c064f0177445af096641ad2657ccde5a0da571cda98c2a33c9d25c095bdfae4cc2ac7c47d7690216c1a6c1de
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-console-l1-1-0.dllMD5
11e55839fcb3a53bdfed2a27fb7d5e80
SHA1e585a1ed88696cd310c12f91ffa27f17f354b4f4
SHA256f6bdc8ffd172b44f4d169707d9a457aeef619872661229b8629ee4f15eefff0d
SHA512bec9419e35de03cc145b3c974833f73f1a5082d886de4739351b93bb4cc6c0234efd0e35ad845faba83fa600c4a7d5343eaae949a837d00d5528e6db79438ee4
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-datetime-l1-1-0.dllMD5
9f3cf9f22836c32d988d7c7e0a977e1b
SHA11e7bbd6175bdb04826e60de07aa496493c9b3a3b
SHA2567d588a5a958e32875d7bd346d1371e6ebfd9d5d2ede47755942badfc9c74e207
SHA51216c98e6aec67ffe4558c6d3f881301490be5d8a714c1adc6735005613251adb8e1c2cb9b1c0d2504a9a99c61a06b0e30c944ca603fc00fbb18cd20ba1c9bd697
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-debug-l1-1-0.dllMD5
64978e199a7239d2c911876447a7f05b
SHA10048ce6724db08c64441ce6e573676bc8ae94bf9
SHA25692b947f1d6236f86ed7e105cff19e23c13d1968861426511b775905e1d26b47a
SHA5129c64211895473ffc7162b56b0b8e732dec54cf03ea9b9b36fe3cc3339c35fc71fc7173d4e146989db399cb1bcb063079378bb6f778f7d2591cd545550038397c
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-errorhandling-l1-1-0.dllMD5
9d74d89f2679c0c5ddb35a1ef30bd182
SHA122eaed07a6e477a4001f9467b5462cf4cc15cc16
SHA256e207ffc6fef144e5d393e79de75f8f20d223f1ac33a011eeb822d30fa2031046
SHA512725626e961d32398ea5aa120ac0339deeb493fc02ee7ef4d8e586173fdbf768b5cbb1f16f093ae4ecfee87e661170f8f832777640a353df5d651af4a62a2d819
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-file-l1-1-0.dllMD5
d826d27c73d9f2420fb39fbe0745c7f0
SHA16e68e239f1a58185c7dad0fcfaac9ecfd2e5726c
SHA256c0e5d482bd93bf71a73c01d0c1ec0722ea3260eba1f4c87e797bae334b5e9870
SHA512c49843eb10e4e54c66e0e194dbd29ceab9094bdfe745b6a858cb03e34d73a6326f54804e5e5505deacc87146cbdfba17a0f02e62e76c685bce0cd1ff41962ff4
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-file-l1-2-0.dllMD5
ec4f2cb68dcf7e96516eb284003be8bb
SHA1fb9237719b5e21b9db176e41bdf125e6e7c01b11
SHA2563816bbb7dd76d8fc6a7b83a0ed2f61b23dd5fc0843d3308ee077cb725d5c9088
SHA5126cbda80c476a9fcf46458cac45229c96dc9df251230531e25088e834cd954db9ff4561e744f76495f9c57a4068b7635c72c6f9ff838436c54142297ee310b236
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-file-l1-2-1.dllMD5
a32230b9bfdb8813e94d095222aafa11
SHA104b9d7d2a3f92a0054af2547fb6176385cc9738b
SHA2567068d2b8aea252294e6b5c3bf3630475d0a91e11877f11a04e8ed1f91196410f
SHA5126484c7c7fe574d797c74c285353040dfa364b9a9425cbfa4a4c8bba698176656c78e228a33c9eeae39a97caf2ab192f1f02dba472824f8a5757db5f14c76e2b0
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-file-l2-1-0.dllMD5
b9287eb7bcbfdcec2e8d4198fd266509
SHA11375b6ff6121ec140668881f4a0b02f0c517f6c7
SHA256096409422ecd1894e4d6289fd2d1c7490bd83daff0c1e3d16c36c78bd477b895
SHA512b86348d3f42d0ff465066a14c281088c73ec5e03efacdaabe27a410b054a8a81b438d7e5d030b0d95f53b07783911b8b8200581d4e0b6f1b3cc79f4aae1d67df
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-handle-l1-1-0.dllMD5
6a35a52d536e34ba060a19d06b1dac80
SHA10494a9cbf898e5babb6e697fc2de04a128d2fc35
SHA256a369ef130749bf8cd9f67055179e6f537f200c060af47493d49473912a95021e
SHA512a8aeb58bcf4b314212c2ab5a8fd3c2edeb97e680f774171d4a79390aa23bb62a414aef0ecd5286ffb68b7ed8f6e713ff1892d6d4cc2cbb67de916c6062e762d9
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-heap-l1-1-0.dllMD5
ee5c2fb7bc23bfd06ff32556cc7c3b4d
SHA15d60ebf016219bbec340d353a4fa541fff596d3f
SHA256efc9f0e32bce971900ddf66a1a9e68daa3bfb2099a1ba9f24c6ee82da2cbd6e8
SHA5125d1b8a130c27d8eb63ca0c836bdf63e76afb311de26ed4f25b073bda843ebfa25e136849e3882822257e3783058f30af818a96764d60821a40329cff4e1badac
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-interlocked-l1-1-0.dllMD5
48a5e206d92f3102256ec65e8d570ee0
SHA176024fad398dfa4734afce0cc2e5ac117f090ba6
SHA256a272ae4fc60e511f48950b08f106fcdd3bc86831df908ee78d630f1ae921880c
SHA51265407da566b571e050c25448be6042e84b0c1c7248422cba00b543af9de425a723b0c7c54c4eb6f534e42b1679a058562d500875ddc4f2b52e6b8e6107b1b575
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-libraryloader-l1-1-0.dllMD5
e33f52e89dfc376eaf7aa655f260ca76
SHA1b66e1f934f491544190714966031b6dfd2e349ec
SHA2560bd03e89a539aaa3100e2f7d9a058964730320e55aee1f85be8fd243eea7017a
SHA51295cb889599801ba7fa225b633d0fe25fdcc8b495dee5eba05b15a6e53a8a3643b5defe1a881236c40f4fa4365d6775ece067dbb526afdf2015f4d1355c9dfc57
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-localization-l1-2-0.dllMD5
dbb81fcc74c59490008ee59bffff5a6d
SHA1edbb465ab3bea3a4df3f05e5a4e816edbe195c3b
SHA256f33e6ac5d3e1c4f1d89564fb6aeeac170486c073b67694380755049dbc48eec1
SHA5122847a73e952bd5f2448264e0bfc8dc1dcd37f8b02d6d6f525ef0cb69c8e634fdcc4637876361b22c53244659039ed305c015435834b61eea15015fed45e9c374
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-memory-l1-1-0.dllMD5
0ee9e0c830a7534dcfc9be72146796f9
SHA1cecc860b494135482ae693f8e252301073a98578
SHA2568f3f0fd765a37f48162f0bd00c3047e79b4eda355223bfcbed4d35b51349cfcc
SHA51247161e02f4478464ab45c1e3bf9d244d34613e0e68ebe48511a9a0c4e7f8ddb0c1dfd59707c6968c5d76d5027cd19ef748d1235bf74b976410ea6672a6a4bcaf
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-namedpipe-l1-1-0.dllMD5
1557093add722d1c5a97c359bfcd0d77
SHA1a8ce995f00a12a81a13d3ef47ce0834178ed69a4
SHA2563a20635a223e68418c22858413e8c603aac25723de1cb0f54dd675349ec3213d
SHA512b7acd6882b4d36b52f1e49e4b61ddd025de8503f765b72c94ec5a0d85b6ced513c348f7c4898675728c851a2632ad71c78937cdec9dff994b7b27ed2d85cdddd
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-processenvironment-l1-1-0.dllMD5
2a61e4e21bf255107884b6520af5bbcc
SHA1884eb1a835bcde4e7fd98134f0be797229f4239a
SHA25664742ee0729cbe72555247b0165fae03bea7a6b0147869253dae3bb0072173e8
SHA512d0ca104904352586bbd3da654125b3df9355fe250938a465e8e900d135cec397f1118fdf54829b076df82b8e45fcd7656c2c7aa33ad3c0af5189f7a55e43f498
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-processthreads-l1-1-0.dllMD5
d5c4b8f7260563f72150a84fe884ee31
SHA1dae1185359ed25a4974504cd1ceaacde28d4318e
SHA25602839f3b2bdf6adfc89d2f800cc8acda59a40c3e7ce14ef3026f4c72e202297d
SHA51209ca23413eecf1df94aa36e53fc6fff0f402f21eda2ef79be6aa087818a5bb82ed98db790a2b5cf4ef91a8f70d8e27f56313bc2054a26872d2cad611c472f0b7
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-processthreads-l1-1-1.dllMD5
f61b9ecb79cd20fc2e8fce87286cfe43
SHA17a48accbe43e156f886f1f2836f74e1043feec59
SHA256bfa24f94ba095174b82d3657f8ecc689eab8ff380c69b1c9a7e311eb70d66386
SHA51242ab62087bbc9fc9c9003ae96ebb9e9bbfa3db4eb74bd6746da035d53d1002015d8482ecb92620ec65c42b8b2b41d9b0a7793e105b0cf8cb6f713a2bc03241db
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-profile-l1-1-0.dllMD5
a472bd416bdc12668523670360650910
SHA1831d930ef9917e0dccacd8e7f7fd6f3d90082441
SHA25648dceeea29558966c391cda34e5755386c2e7e252ea0a03d8d1f21e3cb370c5b
SHA512166134e6c3403f4437e10afb514a55677481d3b03f7cfdf17917a0bb6fa1f387feae58d7dd5dfbc375eae66d24f10c3163ba5958c22beb6978c0b778c2883b6f
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-rtlsupport-l1-1-0.dllMD5
525a156e0ff61306fd44bf7937cacfae
SHA16a9a88317a55c939c0cb9f77256f5c3f961d0562
SHA25641c69b545d931045a280f83b2f5fbe0ea18c35ac42dfca54b661b42fe8e4f982
SHA512c99147eba45e9561b7a2802b0c15a2df2ac886ce95a95f2980f8bf4d1dff92a69b94f11cd17383b577303f24295b1b7e52b8c80ad26c0bb08862c726b9cd8841
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-string-l1-1-0.dllMD5
e57ec98e69961e45cc7a4e0666d26b7d
SHA170462a1d68bf49908fcb7186743a47a1affc5d7d
SHA25652c9b061c4c74eeb70019edde2b690c7e9d9744979a3b718d6687b3a83f00def
SHA5124a450bcbce0eb3f98f78af07673227a55cdf8e7840fa892196cbb8d0f90551b32731f70f171644f8097fda97d57caa4b7430023671b19881764613231a20cdc9
-
C:\Temp\TxGameDownload\Component\AppMarket\da12dfb041b409e76d6661e7ad02eb9b\Setup\api-ms-win-core-synch-l1-1-0.dllMD5
99572ae21d1c8afe3d02f1124979e911
SHA15b17addc80b1406a3eaa615f5e37d92e953a0bb7
SHA256e7d39dcb79d739ec030e9a4e2165b264a24c400566056e1fda267fdd1a8b36bd
SHA51227ca8149d1f0c625de90a3f4cd4a4930ab0c1362ee10a7131ebfd2a88065c2a34c8ad7fb6d95ce33072146b9309488cbfe122984606d631b99d925e3fc42fcff
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
C:\Users\Admin\AppData\Local\Temp\IMedia-553.exeMD5
78b3398cb13acd149db2a5c1c356fbc4
SHA1f5746e719ff984ab9176250903a674e538665835
SHA25653580dbf677b57a87a0850e0901a1efd6b64ef712938454462fad12ab2568ed3
SHA512507c2b129563714a470ee08b9279d50e899e234ba3b2ef52d7874df42756e745ad9afa39c54d61f7aab97f7fb14f2e7570666208363dc6341c96778f2032a166
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
C:\Users\Admin\AppData\Local\Temp\syzs03_1000219144.exeMD5
978f6dedc60783400095644b456890e9
SHA16c4436ab56188ac5ba8786cd76f0de15996f6fe8
SHA256f2d4cc7e40d526ad84229d06e4ffd05d68c22359e6c4b5695087a7d8b735aeab
SHA5120ce5c41bae0988e8e82f5c1723a907e8de99c951ca93f990ea3bc02d14d3d8ce4616622a6323f7ae41fc29773368488729ee281bee1f95f9d1f0a31034df5e3d
-
C:\Users\Admin\AppData\Roaming\IMedia\Config\SoftInfo.iniMD5
cd738748e9ab1cf713c9e07e5fbe1dfc
SHA1d069563efb4b34cd15e2586b6df218f7036e4095
SHA256bff42cbb497bb24fafc4beb32942d000e6b32c361e5c85903fd199ff91d6c816
SHA512f0f4f5833c284eda753b575037ec41deaf6dc22ea4517515152ef586bd1467c9d68bfb4fcc523cf305dbdecb79f5fdfe15e52a2812b847f0ef26b3780865fc3f
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
C:\Users\Admin\AppData\Roaming\IMedia\SoftInfoConfig.cfgMD5
86303559a33932e1a9dbc9c95e0f2a6f
SHA17c8c7ef982f6ae627850b961db751c87c266fe53
SHA2568886067d7f8bb36f1c065fa47423961b425b807f91b0248eaa869983b9841ba2
SHA512c1e3709315185425536b55e698fc9908ecc6de1f7e0f1c4b18426b4b1b15fd6b9b1877f1f49463c0fc0d0cda5195c407224d8d116768177234d037c141b22990
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Program Files (x86)\IMedia\IMedia64.dllMD5
48f1abb480690cea0992905cdcbb131c
SHA1744ee09ea4094622ebc7374ead52370939a10f39
SHA25632835910ecf2df98d5973991ecf3676752d7dc67728f4adc1def50609c7b7c8b
SHA512709b714bc2129709b613737c3c0f7ca72244f43f7a433ce64441d7f4a9a072a6eb85f4a9bddf9f7a7f5cc24c18eea677e8194938e75e40289a73b122a5e6ebe3
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\NSISdl.dllMD5
254f13dfd61c5b7d2119eb2550491e1d
SHA15083f6804ee3475f3698ab9e68611b0128e22fd6
SHA256fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28
SHA512fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Temp\nsl2254.tmp\System.dllMD5
00a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
\Users\Admin\AppData\Local\Tencent\TxGameAssistant\TGBDownloader\dr.dllMD5
2814acbd607ba47bdbcdf6ac3076ee95
SHA150ab892071bed2bb2365ca1d4bf5594e71c6b13b
SHA2565904a7e4d97eeac939662c3638a0e145f64ff3dd0198f895c4bf0337595c6a67
SHA51234c73014ffc8d38d6dd29f4f84c8f4f9ea971bc131f665f65b277f453504d5efc2d483a792cdea610c5e0544bf3997b132dcdbe37224912c5234c15cdb89d498
-
memory/196-245-0x0000000000000000-mapping.dmp
-
memory/200-224-0x00000000007A0000-0x00000000007BA000-memory.dmpFilesize
104KB
-
memory/200-223-0x0000000001F90000-0x0000000001FE7000-memory.dmpFilesize
348KB
-
memory/200-222-0x0000000000000000-mapping.dmp
-
memory/584-225-0x0000000000000000-mapping.dmp
-
memory/992-131-0x0000000000000000-mapping.dmp
-
memory/992-299-0x0000000002DE0000-0x0000000002DE1000-memory.dmpFilesize
4KB
-
memory/1052-142-0x0000000000000000-mapping.dmp
-
memory/1056-226-0x0000000000000000-mapping.dmp
-
memory/1056-228-0x0000000010000000-0x0000000010158000-memory.dmpFilesize
1.3MB
-
memory/1276-197-0x0000000000000000-mapping.dmp
-
memory/1400-145-0x0000000000000000-mapping.dmp
-
memory/1460-234-0x0000000002C80000-0x0000000002D95000-memory.dmpFilesize
1.1MB
-
memory/1460-227-0x0000000000000000-mapping.dmp
-
memory/1588-216-0x0000000000000000-mapping.dmp
-
memory/2176-198-0x0000000000000000-mapping.dmp
-
memory/2180-195-0x0000000000000000-mapping.dmp
-
memory/2216-163-0x0000000000000000-mapping.dmp
-
memory/2248-247-0x0000000000000000-mapping.dmp
-
memory/2248-252-0x0000000002BA0000-0x0000000002CB5000-memory.dmpFilesize
1.1MB
-
memory/2284-196-0x0000000000000000-mapping.dmp
-
memory/2320-159-0x0000000000000000-mapping.dmp
-
memory/2376-273-0x0000000034630000-0x0000000034640000-memory.dmpFilesize
64KB
-
memory/2452-120-0x0000000000000000-mapping.dmp
-
memory/2532-148-0x0000000000000000-mapping.dmp
-
memory/2792-201-0x0000000000000000-mapping.dmp
-
memory/2832-191-0x0000000000000000-mapping.dmp
-
memory/2848-194-0x0000000000000000-mapping.dmp
-
memory/2848-127-0x0000000000000000-mapping.dmp
-
memory/3120-200-0x0000000000000000-mapping.dmp
-
memory/3156-193-0x0000000000000000-mapping.dmp
-
memory/3172-158-0x0000000003550000-0x00000000037D9000-memory.dmpFilesize
2.5MB
-
memory/3172-125-0x0000000000000000-mapping.dmp
-
memory/3340-254-0x00000000007B0000-0x0000000000807000-memory.dmpFilesize
348KB
-
memory/3340-251-0x0000000000000000-mapping.dmp
-
memory/3404-134-0x0000000000000000-mapping.dmp
-
memory/3568-286-0x0000000010000000-0x00000000101BA000-memory.dmpFilesize
1.7MB
-
memory/3568-285-0x0000000000000000-mapping.dmp
-
memory/3708-135-0x0000000000000000-mapping.dmp
-
memory/3724-152-0x0000000000000000-mapping.dmp
-
memory/3892-309-0x0000000004390000-0x00000000044A1000-memory.dmpFilesize
1.1MB
-
memory/3892-311-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/3928-192-0x0000000000000000-mapping.dmp
-
memory/3952-307-0x0000000002D50000-0x0000000002D51000-memory.dmpFilesize
4KB
-
memory/3988-199-0x0000000000000000-mapping.dmp
-
memory/4012-292-0x0000000000000000-mapping.dmp
-
memory/4092-232-0x0000000000690000-0x00000000006AA000-memory.dmpFilesize
104KB
-
memory/4092-231-0x0000000000000000-mapping.dmp
-
memory/4092-233-0x0000000000690000-0x00000000006E7000-memory.dmpFilesize
348KB
-
memory/4100-265-0x0000000003F60000-0x0000000004071000-memory.dmpFilesize
1.1MB
-
memory/4100-267-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/4100-257-0x0000000000000000-mapping.dmp
-
memory/4188-218-0x0000000000000000-mapping.dmp
-
memory/4196-281-0x0000000000000000-mapping.dmp
-
memory/4212-217-0x0000000000000000-mapping.dmp
-
memory/4216-294-0x0000000010000000-0x00000000100E0000-memory.dmpFilesize
896KB
-
memory/4228-243-0x0000000000000000-mapping.dmp
-
memory/4276-219-0x0000000000000000-mapping.dmp
-
memory/4280-244-0x00000000020B0000-0x0000000002107000-memory.dmpFilesize
348KB
-
memory/4280-240-0x0000000000000000-mapping.dmp
-
memory/4280-242-0x0000000000460000-0x000000000047A000-memory.dmpFilesize
104KB
-
memory/4396-269-0x0000000000000000-mapping.dmp
-
memory/4488-220-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/4488-221-0x0000000000680000-0x000000000069C000-memory.dmpFilesize
112KB
-
memory/4540-202-0x0000000000000000-mapping.dmp
-
memory/4568-306-0x0000000002190000-0x0000000002191000-memory.dmpFilesize
4KB
-
memory/4588-204-0x00000000007C0000-0x00000000007C1000-memory.dmpFilesize
4KB
-
memory/4588-203-0x0000000000000000-mapping.dmp
-
memory/4592-302-0x0000000004090000-0x0000000004091000-memory.dmpFilesize
4KB
-
memory/4592-303-0x00000000040B0000-0x00000000040C0000-memory.dmpFilesize
64KB
-
memory/4592-301-0x0000000004210000-0x0000000004321000-memory.dmpFilesize
1.1MB
-
memory/4636-205-0x0000000000000000-mapping.dmp
-
memory/4636-206-0x0000000010000000-0x00000000100E8000-memory.dmpFilesize
928KB
-
memory/4644-271-0x0000000000000000-mapping.dmp
-
memory/4668-236-0x0000000000000000-mapping.dmp
-
memory/4672-255-0x0000000000000000-mapping.dmp
-
memory/4680-235-0x0000000000000000-mapping.dmp
-
memory/4696-210-0x0000000000000000-mapping.dmp
-
memory/4732-290-0x0000000000000000-mapping.dmp
-
memory/4732-293-0x0000000003730000-0x0000000003731000-memory.dmpFilesize
4KB
-
memory/4764-211-0x0000000000000000-mapping.dmp
-
memory/4832-268-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/4832-264-0x0000000003D10000-0x0000000003E21000-memory.dmpFilesize
1.1MB
-
memory/4832-259-0x0000000000000000-mapping.dmp
-
memory/4832-270-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/4860-212-0x0000000000000000-mapping.dmp
-
memory/4892-213-0x0000000000000000-mapping.dmp
-
memory/4908-237-0x0000000000000000-mapping.dmp
-
memory/4960-239-0x0000000000000000-mapping.dmp
-
memory/4960-241-0x0000000002C20000-0x0000000002D35000-memory.dmpFilesize
1.1MB
-
memory/4964-238-0x0000000000000000-mapping.dmp
-
memory/4968-256-0x0000000000000000-mapping.dmp
-
memory/4968-266-0x0000000000670000-0x00000000007BA000-memory.dmpFilesize
1.3MB
-
memory/4996-274-0x0000000000000000-mapping.dmp
-
memory/5056-214-0x0000000000000000-mapping.dmp
-
memory/5084-289-0x0000000000000000-mapping.dmp
-
memory/5092-246-0x0000000000000000-mapping.dmp
-
memory/5100-215-0x0000000000000000-mapping.dmp