Analysis
-
max time kernel
585s -
max time network
382s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
25-06-2021 19:57
Static task
static1
Behavioral task
behavioral1
Sample
pdf-xchange_viewer_XV-78H1.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
pdf-xchange_viewer_XV-78H1.exe
Resource
win10v20210410
General
-
Target
pdf-xchange_viewer_XV-78H1.exe
-
Size
2.3MB
-
MD5
642fa01134fc21a4faa5595d45e3f554
-
SHA1
53bc8673fcbb4c2e748684c2462d3f01483d8dfe
-
SHA256
a1ac1de4af2199117a8218947092bd9e0e1c90f30b734dd35a92a18af6be36d6
-
SHA512
c255c73abd76c9e453f8f7fe6971ca36d1a9b52494ce8c587a4210336f631967af7d048402455362121ec9d1f9fbada89c1a129bef7a592d65d4462de32bbda3
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\String1033.txt
Signatures
-
Modifies system executable filetype association 2 TTPs 12 IoCs
Processes:
msiexec.exewinzip64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" winzip64.exe Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip\ = "{E0D79305-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\lnkfile\shellex\DragDropHandlers\WinZip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers msiexec.exe -
Registers COM server for autorun 1 TTPs
-
Blocklisted process makes network request 6 IoCs
Processes:
msiexec.exeflow pid process 31 368 msiexec.exe 33 368 msiexec.exe 35 368 msiexec.exe 31 368 msiexec.exe 33 368 msiexec.exe 35 368 msiexec.exe -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 37 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpsaBSI.exeinstaller.exeinstaller.exeServiceHost.exeUIHost.exeCloseFAH.exeupdater.exeISBEW64.exeISBEW64.exeMicrosoftEdgeCP.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeISBEW64.exeWzPreviewer64.exeWzPreloader.exewinzip64.exeWzCABCacheSyncHelper64.exeadxregistrator.exeadxregistrator.exeWZUpdateNotifier.exeWzBGTComServer64.exeWzBGTools64.exepid process 1516 pdf-xchange_viewer_XV-78H1.tmp 508 saBSI.exe 3976 installer.exe 1208 installer.exe 2240 ServiceHost.exe 4356 UIHost.exe 4860 CloseFAH.exe 508 updater.exe 3960 ISBEW64.exe 1832 ISBEW64.exe 2780 MicrosoftEdgeCP.exe 3932 ISBEW64.exe 2684 ISBEW64.exe 3920 ISBEW64.exe 5004 ISBEW64.exe 5036 ISBEW64.exe 4688 ISBEW64.exe 2720 ISBEW64.exe 1736 ISBEW64.exe 4084 ISBEW64.exe 4792 ISBEW64.exe 4068 ISBEW64.exe 4776 ISBEW64.exe 1300 ISBEW64.exe 2256 ISBEW64.exe 4844 ISBEW64.exe 4892 ISBEW64.exe 3736 ISBEW64.exe 3736 WzPreviewer64.exe 3744 WzPreloader.exe 724 winzip64.exe 4084 WzCABCacheSyncHelper64.exe 5092 adxregistrator.exe 5056 adxregistrator.exe 4776 WZUpdateNotifier.exe 2236 WzBGTComServer64.exe 5096 WzBGTools64.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UIHost.exepdf-xchange_viewer_XV-78H1.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation UIHost.exe Key value queried \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Control Panel\International\Geo\Nation pdf-xchange_viewer_XV-78H1.tmp -
Loads dropped DLL 64 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpregsvr32.exeregsvr32.exeMsiExec.exeregsvr32.exeServiceHost.exeregsvr32.exeMsiExec.exeUIHost.exeregsvr32.exeregsvr32.exeMsiExec.exepid process 1516 pdf-xchange_viewer_XV-78H1.tmp 1516 pdf-xchange_viewer_XV-78H1.tmp 1516 pdf-xchange_viewer_XV-78H1.tmp 3608 regsvr32.exe 588 regsvr32.exe 2808 MsiExec.exe 3672 regsvr32.exe 2240 ServiceHost.exe 3748 regsvr32.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 4004 MsiExec.exe 2240 ServiceHost.exe 4004 MsiExec.exe 4356 UIHost.exe 4356 UIHost.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 2240 ServiceHost.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4708 regsvr32.exe 4004 MsiExec.exe 4756 regsvr32.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 2808 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe 4964 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinZip UN = "\"C:\\Program Files\\WinZip\\WZUpdateNotifier.exe\" -show" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
winzip64.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winzip64.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in Program Files directory 64 IoCs
Processes:
installer.exemsiexec.exeMsiExec.exeinstaller.exedescription ioc process File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-it-IT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-blast-search-toast-ja-JP.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\blastoise.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-amazon-upsell.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-checklist.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-pt-PT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-fi-FI.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-tr-TR.js installer.exe File created C:\Program Files\WinZip\WzMsg.exe msiexec.exe File created C:\Program Files\WinZip\en-US\WzWXFrmpd64.dll.mui msiexec.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\uiarbitratorhelper.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wacsecuresearchl10n.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\updatependingversion.luc installer.exe File created C:\Program Files\WinZip\VisualElements_70.png msiexec.exe File opened for modification C:\Program Files\WinZip\wzshlstb.dll MsiExec.exe File opened for modification C:\Program Files\McAfee\Temp1433196233\jslang\wa-res-install-da-DK.js installer.exe File created C:\Program Files\WinZip\WzWXFgtalk64.dll msiexec.exe File created C:\Program Files\McAfee\Temp1433196233\resource.dll installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-es-MX.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-shared-ja-JP.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-el-GR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\welcomesson.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\sendimmediately.luc installer.exe File opened for modification C:\Program Files\WinZip\wzshls64.dll MsiExec.exe File created C:\Program Files\McAfee\Temp1433196233\downloadscan.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-blast-search-toast-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\atp_upsell_toast_handler.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-upsell-toast-nb-NO.js installer.exe File created C:\Program Files\WinZip\en-US\LIBALL.WJF msiexec.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-ja-JP.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\Temp1433196233\mfw-nps.cab installer.exe File created C:\Program Files\McAfee\Temp1433196233\jslang\wa-res-shared-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-blast-search-toast-nb-NO.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-freemium-exp-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-es-MX.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-zh-TW.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-winback-toast-de-DE.js installer.exe File opened for modification C:\Program Files\McAfee\Temp1433196233\lookupmanager.cab installer.exe File created C:\Program Files\WinZip\WzWXFll64.dll msiexec.exe File created C:\Program Files\WinZip\WzBanner.dll msiexec.exe File created C:\Program Files\WinZip\en-US\WzWXFivrs64.dll.mui msiexec.exe File created C:\Program Files\McAfee\Temp1433196233\jslang\wa-res-shared-hr-HR.js installer.exe File created C:\Program Files\McAfee\Temp1433196233\jslang\wa-res-shared-zh-CN.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\winback\styles\wa-winback-accepted.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-uninstall-hu-HU.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\adblockcounter.luc installer.exe File created C:\Program Files\WinZip\WzAddrocts64.dll msiexec.exe File opened for modification C:\Program Files\McAfee\Temp1433196233\wa-common.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\jquery-1.9.0.min.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\balloon-arrow-right.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-av-report-warning.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-winback-toast-pl-PL.js installer.exe File opened for modification C:\Program Files\McAfee\Temp1433196233\installer.exe installer.exe File opened for modification C:\Program Files\McAfee\Temp1433196233\jslang\eula-pl-PL.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\percentagehandler.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\wssversion.luc installer.exe File created C:\Program Files\McAfee\Temp1433196233\mfw-webadvisor.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\new-tab-res-toast-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\onesearch_overlay.css installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-av-report.html installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-fi-FI.js installer.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeMicrosoftEdge.exewinzip64.exedescription ioc process File opened for modification C:\Windows\Installer\MSIDFAE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2BF1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI60F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6CD5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID274.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID66F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDF3F.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C2412D}\WinZip64_Shortcut_StartMenu.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI7C40.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICB85.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICDE9.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSIF638.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4DC6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI67E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6A9F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC6EF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICF22.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID6BF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6CC4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C9F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6AEE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7AD3.tmp msiexec.exe File opened for modification C:\Windows\Installer\f74b924.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI60CF.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C2412D}\WinZip64_Shortcut_Desktop.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIF5F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI60E1.tmp msiexec.exe File opened for modification C:\Windows\WIN.INI winzip64.exe File opened for modification C:\Windows\Installer\MSI7B22.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICDB9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID244.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID2B3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI67F9.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C2412D}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C2412D}\WinZip64_Shortcut_Preloader.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI731F.tmp msiexec.exe File created C:\Windows\Installer\f74b924.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID03F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5DBA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5DA9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI60BE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICFD0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI31EF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5C20.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIDE43.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6060.tmp msiexec.exe File created C:\Windows\Installer\f74b927.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID2E3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE09B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI600F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7BF0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7C20.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID70F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5E09.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI680A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7AC2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDE54.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE01D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI604F.tmp msiexec.exe File created C:\Windows\Installer\{CD95F661-A5C4-44F5-A6AA-ECDD91C2412D}\ARPPRODUCTICON.exe msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1832 schtasks.exe 516 schtasks.exe 1344 schtasks.exe -
Processes:
regsvr32.exeregsvr32.exeMicrosoftEdge.exebrowser_broker.exemsiexec.exeMsiExec.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\winzip64.exe = "8000" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\WebAuthBroker.exe = "10000" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
winzip64.exeupdater.exeServiceHost.exeWzCABCacheSyncHelper64.exeadxregistrator.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\DropDialogExplorer = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache updater.exe Key created \REGISTRY\USER\.DEFAULT\Software winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFzshare\Default\WritableRootFolder = "\\" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Update Notifier\Share winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WinIni\win32_version = "6.3-25.0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\DialogSplitFactor = "2" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\GridLines = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFmfire\Default winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Update Notifier winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs updater.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\Common\Update Notifier\UpdtMgr000\ProductState = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFphrs WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFxmpp WzCABCacheSyncHelper64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Excel\AddIns\WinZipExpressForOffice.AddinModule adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.VMDK = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Uninstall\ClassName.ZIP = "CompressedFolder" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs updater.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzWXFssync\Default winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft adxregistrator.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WinIni\Setup = "0" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\CommentCheckRemovable = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\mru\jobs winzip64.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\CheckOutIconOnly = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Word\AddIns\WinZipExpressForOffice.AddinModule adxregistrator.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFssync\Default\WritableRootFolder = "\\" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\CommentCheckFixed = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.TXZ = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\ListView\Col_Attrib = "9,L,-2,F" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.CAB = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\DefaultTypeZipX = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.B64 = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Statistics\Collect = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Splitter\FilesPaneTreeView = "1" winzip64.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 winzip64.exe Key created \REGISTRY\USER\.DEFAULT\software\Nico Mak Computing\WinZip\wzshlext winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Excel\AddIns\WinZipExpressForOffice.AddinModule\Description = "AddinModule" adxregistrator.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs updater.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.BHX = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\Uninstall winzip64.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\Word\AddIns\WinZipExpressForOffice.AddinModule\LoadBehavior = "3" adxregistrator.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\winzip\Wizard = "0" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\WXF\WzAddropocts WzCABCacheSyncHelper64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\fm\.LHA = "1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Nico Mak Computing\WinZip\UpdateCheck winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\WXF\WzWXFoned winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\ShellExtensionSubMenu = "1" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\wzshlext\MenuCfgTable = "2222222222222222222222222" winzip64.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Nico Mak Computing\WinZip\Splitter\FilesPane = "1,1,1,1" winzip64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople updater.exe -
Modifies registry class 64 IoCs
Processes:
WzPreviewer64.exewinzip64.exemsiexec.exeMicrosoftEdge.exeadxregistrator.exeregsvr32.exeMsiExec.exeadxregistrator.exeMicrosoftEdgeCP.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.BZ\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZipX\shell\print\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" /print /ni \"%1\"" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\open\ = "Run with &WinZip" winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\InstantMsgChineseFiles = "InstantMsg" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\License = "WinZip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\ZipShareCloudCzechFiles = "ZipShareCloud" msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.tbz msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wjf msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\WOW6432Node\CLSID\{CB2B673F-D441-4CD4-AFBE-DC4037CA4220} adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\BGToolsFrenchFiles = "BGTools" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\ConvertersFiles = "Converters" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\GoogleDriveCloudMexicanFiles = "GoogleDriveCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\MainGUISpanishFiles = "MainGUI" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{784C04A3-2E5A-4E7C-A7F7-7D97E27859AD}\ProgID winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\IEPlugin.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.XZ WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\GoogleDriveCloudDanishFiles = "GoogleDriveCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\PreviewerSwedishFiles = "Previewer" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\S4DELFinnishFiles = "S4DELALLFiles" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\166F59DC4C5A5F446AAACEDD192C14D2\ProductName = "WinZip 25.0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\WinZip MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\Implemented Categories regsvr32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\EnterpriseCloudDanish = "EnterpriseCloudFeature" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\FTPCloudTaiwanFiles = "FTPCloud" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionIn MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZipX\shell\print\command\ = "\"C:\\Program Files\\WinZip\\winzip64.exe\" /print /ni \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ZIPX WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0D7930A-84BE-11CE-9641-444553540002}\ = "WinZip Preview Handler" WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.JobFile\shell\edit winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\DragDropHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\ShellExt32NorwegianFiles = "ShellExt32" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wzmul\AppUserModelID = "WinZipComputing.WinZip64" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.HQX\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinZip winzip64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\WinZip\ = "{E0D79304-84BE-11CE-9641-444553540000}" winzip64.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\ = "McAfee WebAdvisor Extension" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZipX\shell\open\command\command = 35002100480029006b0078004a00750031003d004400320067004300700040003d004700560032004d00610069006e004700550049003c002000220025003100220000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\WinZipExpressForOffice.AddinModule adxregistrator.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\CloudSvcCzechFiles = "CloudSvc" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\CloudSvcJapaneseFiles = "CloudSvc" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\DesktopIcon = "WinZip" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\FTPCloudSwedishFiles = "FTPCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\SugarSyncCloudDutchFiles = "SugarSyncCloud" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.XX\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F}\ = "{E0D7930A-84BE-11CE-9641-444553540002}" WzPreviewer64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wzmul\ = "WinZip.RegFile" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\SocialMediaKoreanFiles = "SocialMedia" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinZip.ZipX\ShellEx winzip64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.LHA\ShellEx\{8895B1C6-B41F-4C1C-A562-0D564250836F} WzPreviewer64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wzconfig msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\CloudSvcDutchFiles = "CloudSvc" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\166F59DC4C5A5F446AAACEDD192C14D2\ExpressNorwegianFiles = "ExpressAllFiles" msiexec.exe -
Processes:
saBSI.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 5c000000010000000400000000080000190000000100000010000000a823b4a20180beb460cab955c24d7e21030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0280f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f saBSI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
saBSI.exeServiceHost.exeUIHost.exeMsiExec.exepid process 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 508 saBSI.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 4356 UIHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 2240 ServiceHost.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe 4004 MsiExec.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 2700 MicrosoftEdgeCP.exe 2700 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 804 msiexec.exe Token: SeIncreaseQuotaPrivilege 804 msiexec.exe Token: SeSecurityPrivilege 368 msiexec.exe Token: SeCreateTokenPrivilege 804 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 804 msiexec.exe Token: SeLockMemoryPrivilege 804 msiexec.exe Token: SeIncreaseQuotaPrivilege 804 msiexec.exe Token: SeMachineAccountPrivilege 804 msiexec.exe Token: SeTcbPrivilege 804 msiexec.exe Token: SeSecurityPrivilege 804 msiexec.exe Token: SeTakeOwnershipPrivilege 804 msiexec.exe Token: SeLoadDriverPrivilege 804 msiexec.exe Token: SeSystemProfilePrivilege 804 msiexec.exe Token: SeSystemtimePrivilege 804 msiexec.exe Token: SeProfSingleProcessPrivilege 804 msiexec.exe Token: SeIncBasePriorityPrivilege 804 msiexec.exe Token: SeCreatePagefilePrivilege 804 msiexec.exe Token: SeCreatePermanentPrivilege 804 msiexec.exe Token: SeBackupPrivilege 804 msiexec.exe Token: SeRestorePrivilege 804 msiexec.exe Token: SeShutdownPrivilege 804 msiexec.exe Token: SeDebugPrivilege 804 msiexec.exe Token: SeAuditPrivilege 804 msiexec.exe Token: SeSystemEnvironmentPrivilege 804 msiexec.exe Token: SeChangeNotifyPrivilege 804 msiexec.exe Token: SeRemoteShutdownPrivilege 804 msiexec.exe Token: SeUndockPrivilege 804 msiexec.exe Token: SeSyncAgentPrivilege 804 msiexec.exe Token: SeEnableDelegationPrivilege 804 msiexec.exe Token: SeManageVolumePrivilege 804 msiexec.exe Token: SeImpersonatePrivilege 804 msiexec.exe Token: SeCreateGlobalPrivilege 804 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe Token: SeRestorePrivilege 368 msiexec.exe Token: SeTakeOwnershipPrivilege 368 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpwinzip64.exepid process 1516 pdf-xchange_viewer_XV-78H1.tmp 724 winzip64.exe -
Suspicious use of SetWindowsHookAW 1 IoCs
Processes:
winzip64.exepid process 724 winzip64.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.tmpMicrosoftEdge.exeMicrosoftEdgeCP.exewinzip64.exepid process 1516 pdf-xchange_viewer_XV-78H1.tmp 5092 MicrosoftEdge.exe 2700 MicrosoftEdgeCP.exe 2700 MicrosoftEdgeCP.exe 724 winzip64.exe 724 winzip64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
pdf-xchange_viewer_XV-78H1.exepdf-xchange_viewer_XV-78H1.tmpsaBSI.exeinstaller.exeinstaller.exeregsvr32.exemsiexec.exeregsvr32.exeServiceHost.exeISBEW64.exeMsiExec.exeMicrosoftEdgeCP.exeupdater.exedescription pid process target process PID 3172 wrote to memory of 1516 3172 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 3172 wrote to memory of 1516 3172 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 3172 wrote to memory of 1516 3172 pdf-xchange_viewer_XV-78H1.exe pdf-xchange_viewer_XV-78H1.tmp PID 1516 wrote to memory of 508 1516 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 1516 wrote to memory of 508 1516 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 1516 wrote to memory of 508 1516 pdf-xchange_viewer_XV-78H1.tmp saBSI.exe PID 508 wrote to memory of 3976 508 saBSI.exe installer.exe PID 508 wrote to memory of 3976 508 saBSI.exe installer.exe PID 3976 wrote to memory of 1208 3976 installer.exe installer.exe PID 3976 wrote to memory of 1208 3976 installer.exe installer.exe PID 1516 wrote to memory of 804 1516 pdf-xchange_viewer_XV-78H1.tmp msiexec.exe PID 1516 wrote to memory of 804 1516 pdf-xchange_viewer_XV-78H1.tmp msiexec.exe PID 1516 wrote to memory of 804 1516 pdf-xchange_viewer_XV-78H1.tmp msiexec.exe PID 1208 wrote to memory of 2632 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 2632 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 584 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 584 1208 installer.exe regsvr32.exe PID 584 wrote to memory of 3608 584 regsvr32.exe regsvr32.exe PID 584 wrote to memory of 3608 584 regsvr32.exe regsvr32.exe PID 584 wrote to memory of 3608 584 regsvr32.exe regsvr32.exe PID 1208 wrote to memory of 1976 1208 installer.exe sc.exe PID 1208 wrote to memory of 1976 1208 installer.exe sc.exe PID 1208 wrote to memory of 588 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 588 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 4080 1208 installer.exe sc.exe PID 1208 wrote to memory of 4080 1208 installer.exe sc.exe PID 368 wrote to memory of 2808 368 msiexec.exe MsiExec.exe PID 368 wrote to memory of 2808 368 msiexec.exe MsiExec.exe PID 368 wrote to memory of 2808 368 msiexec.exe MsiExec.exe PID 1208 wrote to memory of 2632 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 2632 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 3628 1208 installer.exe sc.exe PID 1208 wrote to memory of 3628 1208 installer.exe sc.exe PID 2632 wrote to memory of 3672 2632 regsvr32.exe regsvr32.exe PID 2632 wrote to memory of 3672 2632 regsvr32.exe regsvr32.exe PID 2632 wrote to memory of 3672 2632 regsvr32.exe regsvr32.exe PID 1208 wrote to memory of 3748 1208 installer.exe regsvr32.exe PID 1208 wrote to memory of 3748 1208 installer.exe regsvr32.exe PID 368 wrote to memory of 4004 368 msiexec.exe MsiExec.exe PID 368 wrote to memory of 4004 368 msiexec.exe MsiExec.exe PID 2240 wrote to memory of 4356 2240 ServiceHost.exe UIHost.exe PID 2240 wrote to memory of 4356 2240 ServiceHost.exe UIHost.exe PID 2240 wrote to memory of 4688 2240 ServiceHost.exe ISBEW64.exe PID 2240 wrote to memory of 4688 2240 ServiceHost.exe ISBEW64.exe PID 4688 wrote to memory of 4708 4688 ISBEW64.exe regsvr32.exe PID 4688 wrote to memory of 4708 4688 ISBEW64.exe regsvr32.exe PID 4688 wrote to memory of 4708 4688 ISBEW64.exe regsvr32.exe PID 2240 wrote to memory of 4756 2240 ServiceHost.exe regsvr32.exe PID 2240 wrote to memory of 4756 2240 ServiceHost.exe regsvr32.exe PID 4004 wrote to memory of 4860 4004 MsiExec.exe CloseFAH.exe PID 4004 wrote to memory of 4860 4004 MsiExec.exe CloseFAH.exe PID 4004 wrote to memory of 4860 4004 MsiExec.exe CloseFAH.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2240 wrote to memory of 508 2240 ServiceHost.exe updater.exe PID 2240 wrote to memory of 508 2240 ServiceHost.exe updater.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 2700 wrote to memory of 2156 2700 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 508 wrote to memory of 4068 508 updater.exe ISBEW64.exe PID 508 wrote to memory of 4068 508 updater.exe ISBEW64.exe PID 508 wrote to memory of 2832 508 updater.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmp"C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmp" /SL5="$40050,1569491,780800,C:\Users\Admin\AppData\Local\Temp\pdf-xchange_viewer_XV-78H1.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exe" /affid 91088 PaidDistribution=true3⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\installer.exe"C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\Temp1433196233\installer.exe"C:\Program Files\McAfee\Temp1433196233\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"7⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"6⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//06⤵
-
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"6⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"7⤵
- Loads dropped DLL
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"6⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod1_extract\winzip_mul_64.msi" /qn XAT=dci53⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies system executable filetype association
- Blocklisted process makes network request
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C3476AB5C466449F1A055B37EC9B1F972⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3E1ED143-F25C-43C5-A2C8-B146C8BAAD9E}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0715E107-9826-423E-BBC9-4EB1A3EA96B0}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{BF2B1F68-4A1C-47F8-BE0E-BE847B7E2372}3⤵
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3F939B62-FE32-48DA-9511-2086C82BA685}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{C764189E-7261-4284-927D-2DDA4FF2B87F}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3D915DD8-084B-4E23-8FC0-094AEF0F8536}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{618EC6AD-9F65-4237-97D8-7CB9E01B4FFB}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0291A01F-92A7-404D-8D67-4CA17A422C16}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{038B9B6D-437E-4107-A7C1-737591376B75}3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{03D12845-990C-4884-9F37-4DA410CEABCD}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7672C35F-2597-45F8-B98A-DA1D01B99584}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{80FE9B8F-7EF2-442B-BC64-EBB061FEE202}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E4193060-B137-4796-96B4-D73D6AA62092}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{38795865-A37B-418E-A440-DD025A0E84A5}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{59F57033-C1BC-4ABF-8447-5837725D5BC6}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A6E55644-C2D7-424E-9BE1-9FD60B5B9F74}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D1F46427-C060-42F5-AC58-C97F6F4EAABA}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8BB9FEA2-C6F9-40A3-BECB-A22296A38134}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7D8B8B24-E3D5-4993-A7F4-70AF426FF347}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{379B0824-FCC1-4211-92BC-11E4681DB77E}3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exeC:\Users\Admin\AppData\Local\Temp\{A729279D-F0C1-48D2-8BD3-3CBC522942F6}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6D3B44EA-F06B-4272-9B63-0CF9005D284C}3⤵
- Executes dropped EXE
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding C763DCDADA037DD504DFC13B4B7A24AD2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"C:\Users\Admin\AppData\Local\Temp\CloseFAH.exe"3⤵
- Executes dropped EXE
-
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=user /GenerateLogFile=false3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 1" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_9AM\" -show" /ST 09:31 /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 2" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_12PM\" -show" /ST 12:31 /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks /Create /SC DAILY /TN "WinZip Update Notifier 3" /TR "\"C:\Program Files\WinZip\WZUpdateNotifier.exe\" -checkType=\"scheduled_3PM\" -show" /ST 15:31 /F3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 6183ECBCBD2FBFF32EF86E5949024D6D E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\WinZip\adxregistrator.exe"C:\Program Files\WinZip\adxregistrator.exe" /install="C:\Program Files\WinZip\WinZipExpressForOffice.dll" /privileges=admin /GenerateLogFile=false3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Program Files\WinZip\WzPreviewer64.exe"C:\Program Files\WinZip\WzPreviewer64.exe" -regserver winzip642⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files\WinZip\WzPreloader.exe"C:\Program Files\WinZip\WzPreloader.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\WinZip\winzip64.exe"C:\Program Files\WinZip\winzip64.exe" /noqp /nodesktop /nostartmenu /nomenugroup /autoinstall /lang 10332⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"C:\Program Files\WinZip\WzCABCacheSyncHelper64.exe"3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Program Files\WinZip\WZUpdateNotifier.exe"C:\Program Files\WinZip\WZUpdateNotifier.exe"2⤵
- Executes dropped EXE
-
C:\Program Files\WinZip\WzBGTComServer64.exe"C:\Program Files\WinZip\WzBGTComServer64.exe" /REGSERVER2⤵
- Executes dropped EXE
-
C:\Program Files\WinZip\WzBGTools64.exe"C:\Program Files\WinZip\WzBGTools64.exe" /s2⤵
- Executes dropped EXE
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"2⤵
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\McAfee\Temp1433196233\browserhost.cabMD5
23082d82a631bbbbac8869ea72628211
SHA1dce167ab01dc4a86c6e5f047d07a648c0990ac54
SHA2563071081631b31b8d48a8dc76fb739fd28f4cad28c1eeb451e0172ba4e4fb79a0
SHA512a1bb496a6875550a7fbaa782f68939befdae1edf5398952d639c09118d66bd9c7665b38bba199192e62168bc2365f79b14d2b79a5dc7d93a0813084a131265f2
-
C:\Program Files\McAfee\Temp1433196233\browserplugin.cabMD5
5a865b9f5d8a5d0afac937a1115abf15
SHA1f87ce56345a43d837efcdb1e9c154258c96860d7
SHA2568fb7273f818e2ab79353f5238d4e1b3d658c850923617b4dc68a9437356a259c
SHA512aeb015dbf3b6feeaebbfa93775582c0646abea7d608193c323b0bb4fac3e8b0fd3b7aaf9d86eac075b064c2caf0c3044bee4bf21132497df02d1438a209d3573
-
C:\Program Files\McAfee\Temp1433196233\downloadscan.cabMD5
8bafa09c3fbc88cc192eea066ff51d60
SHA18ea1c3932016c182817461f22b5c9f5e9c6b7363
SHA25654e83dfe9619a2c861777f18ea715f07479c64007f2ca1becb9c33d9f912e305
SHA5120d3e00f8df34dcc184ec11a2a8b3c0c523cca96c8ef06ca0cecc2200bb20ba517afc7d40828565cf890ee5a8c2d529eaa19e058deaf0c6bdd092dc08cda61014
-
C:\Program Files\McAfee\Temp1433196233\eventmanager.cabMD5
e85e202b61f68821561986efc21c3314
SHA16aae4ec5eb81fe3b65809822b22dd652fb7d154e
SHA2566392db15cb765cc62cf0cbfe2cc0b5462fbad7b7c2d651fcfeefa88e00950653
SHA5128b10c2556c58e9812d7f0f754fed24666722350de5bbd1c89aec01d84111a38fecbf9235e5ee5596db8b233d75ce80c5f6cdd2fa8be28282f3280cda871135ab
-
C:\Program Files\McAfee\Temp1433196233\ieplugin.cabMD5
3d073baff1f834b8adb2d9d447fdcc41
SHA18afa88703133ada19c9fcc6a0f8c55f1edaa043b
SHA25620bcdef47c2724e857821c468569aeae5d3b19460134400ae2353052002aaf12
SHA512cd79f90aa80a25ea00f611f7d5adb345bd419b235673a2bae54d9acf7070c8b6620bae686d27b4a4774691832fa166c5d815313041f8c24439a3f8ea6e4de3d3
-
C:\Program Files\McAfee\Temp1433196233\installer.exeMD5
37284aafdb81d0344740c1f7a86856f2
SHA18e193589932e8ecf763e1a00f389f03979c4e075
SHA256e6d1a7b0373a768a208e94868ea2c6405954b3a8ac78fcd6d1bf268f6ce0138f
SHA5125743cc7d7c1903079ad9973484e005450c2af68bb2a9604ff078aedbe011caf2f031ddfd5b9863bb07bea97d87e2220759b5d27a9953a049c774b90c1f3d8ea4
-
C:\Program Files\McAfee\Temp1433196233\installer.exeMD5
37284aafdb81d0344740c1f7a86856f2
SHA18e193589932e8ecf763e1a00f389f03979c4e075
SHA256e6d1a7b0373a768a208e94868ea2c6405954b3a8ac78fcd6d1bf268f6ce0138f
SHA5125743cc7d7c1903079ad9973484e005450c2af68bb2a9604ff078aedbe011caf2f031ddfd5b9863bb07bea97d87e2220759b5d27a9953a049c774b90c1f3d8ea4
-
C:\Program Files\McAfee\Temp1433196233\l10n.cabMD5
f5ad9fcffcbb4d75353988984f29e52a
SHA1715952f3c141681a988a6e42f34c3bcb34cf1341
SHA256c1444bd3f5b430ee71480071b99c9fff83ab3cf12c3ce2003fdb68b8f55785dc
SHA512f96e1cf6c0f9e4120ecb8c1dd64f558ca1e2d99738a0c4cee4b354dd11acb6e47c237f32b870822cb283bd97104aa749563fb46a3bbac2f17a73151454de599a
-
C:\Program Files\McAfee\Temp1433196233\logicmodule.cabMD5
f516abb9caf1e304aef64dc0c4289a36
SHA1b216313c368c95b017860f7ad86c04b472b94550
SHA25610cb07c32f80f7f93c277cf4bf3c5f5f17b9cf0e5234703eba0c9021a49bab60
SHA512f6def8b40951411c09250ec46918cf4b179fcefa52fa13031b66514985e2b583b8484e457edd366288884712254253824a564b53c6a2a4fb3358f8f796ab6be8
-
C:\Program Files\McAfee\Temp1433196233\logicscripts.cabMD5
74b625b15b434c2dcad79ef8734bf664
SHA105b283685306c0a6aa4988735a077df63cf2e5e4
SHA256ca75fdc5d662d57e1f0f55abb6a35c0b572feb8b8bfd3d657ff9e03a689dbab9
SHA5123f7cbf39f14347291bc78e96181aa74885bf13009055d853141928cdbe757f7d30753ca1acec24102c02927c98ca22a319bef3eeeba0d62890c016770366e0f8
-
C:\Program Files\McAfee\Temp1433196233\lookupmanager.cabMD5
34c34c684bfd093ba04c0fe0c7c50663
SHA13531db5e432bef539647ee92fbf362f16f0ddf04
SHA2563f848dae31c2992deaccc520316d76ec2f243bdbc7b011b089e21d2e34842969
SHA512d0ab4194da0c80a6c1c70bae7143c127c67d18600ad3827e576e68e25067b00c212e9e4e20f8253d0569e4a44206a1a332c1fd226c882018f0c170a62ff68c76
-
C:\Program Files\McAfee\Temp1433196233\mfw-mwb.cabMD5
e7051f492e45285770316d7cdd6ad76f
SHA11f2177d6af4e7409b41526efaf54b75f5d3990fa
SHA256d7a67bc4338998d614491b80f1fb647a4ac258476f567aad292d02e0adbf4c0c
SHA512efcb8b6fae48f69d687d02469c71dd5627dbfdf24112ec2639c6654b736d1cd0e9d245842fd3430e7e1156c555ace624d05ef80ea6a5708ce8625e785641e699
-
C:\Program Files\McAfee\Temp1433196233\mfw-nps.cabMD5
15e2d12c50dafc262591ba7241ccae26
SHA19c08ef71b7f8d1669ce51785b9131b256c817a19
SHA2564f45bcbefdec601c69721933bd7809e3888c5e2170329aae07551c8f12472721
SHA51242f004c7d6d5758b71b222969593476df3e390df0276094695a287b91a145a8b2bb6a9dd0121a85c311545b42307ce4b669fb8d62497c8a67a8f8a9e14c58be0
-
C:\Program Files\McAfee\Temp1433196233\mfw-webadvisor.cabMD5
3ff57f2ebf96b8912826a762e94936f4
SHA197526d33bcd5a6e508e064cb1e5c611e82c0e4a2
SHA2564e1180b48b2e944c1b93ca7f64f25c0bbcf822ab883912549c40942965a9d548
SHA51234438146f6f1f33eca908b6df9387fe688bb8998ae7449c995d65aa14ff5ff28233e41da38b15635b49809fc3310dc17f3cb6ff7a7ccda7fd193163b767f65bc
-
C:\Program Files\McAfee\Temp1433196233\mfw.cabMD5
f1987cc41c144c2736b0728e1d2e50fd
SHA14bd093635fea012d8fc17c0e621180f5f0ef43ee
SHA256a2f75a2ab1053491934d791720a0a18c231394f354853eaa4f6354fa793f4e09
SHA5121f7c90c58281a72e667216515a7ab0ebedec8e66a63c7efeb3436c1168cd5c74f5f8f7ec0bce2c3b6b02c1026a231a6a4f813bc055c2fa6bcbc36d5aae371579
-
C:\Program Files\McAfee\Temp1433196233\resourcedll.cabMD5
72501aede996d6da9cb76975a29715e8
SHA1f1a0d11cf4aa0811495c6fb7bd000ba979c90aec
SHA2563234d758ec825185e26c7f63e4826b09b130abdb2e06081e2ef7ed4566739217
SHA5125f68b87f365b206a59ab951dabd84df53b26a1ea59a8586a852d9865ba835f82e733386f1c480a21652cdb3289997a30d7a2ab1c50f5cf8f2bd48265313c5881
-
C:\Program Files\McAfee\Temp1433196233\servicehost.cabMD5
d1c16b4506540d7bc138563e9d061848
SHA124f5cc45bd7d04e6ff89eb1009778f183d39a7b1
SHA256317c7d35800f4eafba7030db5245b821f4837e795c4bfe272d80a4cdfee81fe1
SHA512ca08f4f84f5564adcaf86e7b3a2691999a63e8c1ba903110bd939d6f49d8f3c9af05f1b4a6490f53e3987e577a54dd92413ab91dccd29b0f85cf12da6b17f562
-
C:\Program Files\McAfee\Temp1433196233\settingmanager.cabMD5
8b50e76d2b230aa9212a9ae2003373a1
SHA148ab4257012200fa9ff5539a8c10208fa5ece465
SHA256beecc7e20b95a05b458a28d966af60a5328f24de5730adeea5a22e244df8c1df
SHA512434a9c2a2056431ff3db42d58df9da54cbe048fd30cd24663d1854c8f0424064c1c0b2822c5b8d2144d624c63a385f607f9572913eba6f2d792240d5dd164f83
-
C:\Program Files\McAfee\Temp1433196233\taskmanager.cabMD5
6dc7dc06db6308932b726986c091b003
SHA130421ecd96e643361457a69a5a23e63317903b1f
SHA25672f75ed31221a9ccd8ec4ddac0f84b8d466c0224485de765c7d5e53ee3420dac
SHA5127e125b38f5c8c2bee0c768c25ed14cd5dc77bc8362d8ecf510704f1651500ddd84e9eb3938dfe37ba7c70ecbda9ba28b5a25a1a9996cd70ef19a592ee82b1cda
-
C:\Program Files\McAfee\Temp1433196233\telemetry.cabMD5
ded62ffcb868f8a20665a22e517839d0
SHA126c20d321871edf75a63a3fc84375634f39c77d3
SHA256581104a80e1efc5592dab9a0ea1dbc9161b477df9d1c80ed2b30443b4f37f6fb
SHA5120b18c3eddd8d9add5dc1aa2476898979061ec604d38dc7e60a90cd1e379edd70869cd66941c65b8804fc9dc8b622b98e7817b1f104a7fc938ee58dedbdc934f5
-
C:\Program Files\McAfee\Temp1433196233\uihost.cabMD5
06ebaf5ce9a95cb16943f1a15a6f2a38
SHA1a60feee38381f2f38ad550ce84c5b330b1420933
SHA256cf5512c4259187a802afea53aa81edb3c52f48fd7cce305c79400537fc871b3d
SHA512584be2a0b4906a40245ae18d055b189beed794fe2e04bb06fdca52f7943a29c3565c29939e0cd3d04d93f5ac1ec43431fd18b6bd5cb490569e63cdb013a65610
-
C:\Program Files\McAfee\Temp1433196233\uimanager.cabMD5
0293a495295efd284925d9c0c227cf02
SHA11e4a491fc781680a76fe8f69235c3241884db504
SHA2564594100f2a9bda2dd4c8498a90648b443b9fa43d064b1639121760718463ba02
SHA512166f0bf01435d2a077c6787135bb988f09332842536af2459a7e8280cd15c33a2e8fd49839cefddb13911c555e8d19f1cf97a4bc084aaa0615fd6113709bcd38
-
C:\Program Files\McAfee\Temp1433196233\uninstaller.cabMD5
c2aff4c1b50b3e1895112d1eca5ad9b9
SHA12746e23d30e799d4494e80ac5b7fbff391827ef7
SHA256832b7f9c3c07e67c58991e787fab824b4c2dcc7419c0ab5796fd0d82b569a9b8
SHA5129d2ef7d3c2c7423d37804060d6dff3deec75b5828d565b7ad9128860e6c6702a3ca9c7fc1aa2d20d195a623195ef31d68e34c8a420b182ca13a2bfe1e6634ef7
-
C:\Program Files\McAfee\Temp1433196233\updater.cabMD5
d522a22d07f3f9e803955b457e125796
SHA1bebfc834168eb0a579f3dbfb25a5766b1d40ab06
SHA2569ea1655197786b72f860fe3a15d00fe535653010407ee0b577e9cdf5e98f8e4f
SHA512dd0ab120757a5516ed150c71901626d0dbd3427178e985459864aa92b62e85e23d10aa11ea800e950e7972449cb9418207e10f257452ba56808efe330d989f2e
-
C:\Program Files\McAfee\Temp1433196233\wataskmanager.cabMD5
1298bd77c859794e02a138a038d846af
SHA11470e44572df89f1d11ba4b0ecb789c387bb01ad
SHA256b4b1435f081f675a05328b522d878d164262280ea97a2ad1ec5223a819b808af
SHA5127756105beca9d2a44f3664c797ca00395ab18a334bf17f59bc1eea2c62c2dbd8ce94b6de65941189a446f4e782f85a94791dbb0ef96fcf4bbd13f194e804915d
-
C:\Program Files\McAfee\Temp1433196233\webadvisor.cabMD5
116cac18b4a276de51730c25a10cb3a6
SHA16dab71bd48f6f74f6a75a99f2db529a102f9155a
SHA256ca2b088150bdb893020d5bb4f1a365334981635e4356d88ee04521bf855e89f4
SHA5120828d98e5b917dd6e10673fd7076fecd64b7daf009564d29def0afd66b8e17ae02caef62f9cf9640c626589e08f619aff153f0797e565755def48e3e323423b2
-
C:\Program Files\McAfee\Temp1433196233\wssdep.cabMD5
08878314ea8a1a42f1ddb100a22b0531
SHA1fa78da86a460894a21ef101d93f25f5a0e47d7bc
SHA2564c802c9532946c84d0f3c55bb0995c0059bcca37183873ea8f0fb1b1ced8f60a
SHA5122eb26ded5ee3ebf67a3e674f492210564a9be18877ce50dc3fd5739fb09510fc0cde67c75e27eec87d27f42cab63b3932457e56afa2b0623ef282f54b171a891
-
C:\Program Files\McAfee\WebAdvisor\EventManager.dllMD5
7fabf6673861b194fb74cfa56405a05d
SHA173ee821f7eff15a9909e99053590790ad8efef22
SHA256d891f77c3f2d9266654cbba2192b190c64fa9f8be12fcfe9ecaec108e7936efe
SHA51273d0a91d1a67bf1c4d0c89da9e63e8fdcd31cbe2eca26831acdb7f4189c823055885abd7c2fbcf586ffdc3908989943abd2760b676e970218e95c9afadd6352f
-
C:\Program Files\McAfee\WebAdvisor\LookupManager.dllMD5
bd7bb741f0b67b4874eadb685283e230
SHA1409d86d9e8fb192e5cb38632742e89071dda0f18
SHA256c09c3e639b3cbf891dd8a8df0001de2541601b4d272eec0941fa10ab9ab22e20
SHA5129a8369dedf30b06b7dc008bf3417d7ed70a1267939ea8f7bfe9e3b8442081371bfa00c957f9ce1a088c9308cec983c2eb7b88fee473ad118db7f16fc54afd3ff
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exeMD5
9c1c02d5247139cf58e0c05d869b78d2
SHA1374397b16fe22a03eb9f0887ca3750bf2ebeb9ae
SHA256ca0244aa3ebb3520d9e682e3ab8ad5186786540c342971ee2c35afa8bdf7a289
SHA5123e92bfbabfd322420b6e6757b29bb4bd33fd854c594a17c1d7d4d6990a3c2824f8e1b4c0ab51619d7d317109488c4cdb53b067e3235a0e84b0bd09debd2c2a2e
-
C:\Program Files\McAfee\WebAdvisor\SettingManager.dllMD5
dca2e2268e01d111660e11b45fd62ca2
SHA130a3125c6452dc9aea6aad943a2bc545215dd664
SHA2563947877592dd9e6f6ec900bd2287bbecf3533f3491e728a875fe9c726374ab69
SHA5126bc5315a48d4d4dbfa7537b5b612ab27bd0029b57274c5dee01643d7de86078b28215e25a80235d80e860738e094efd313b5d4fb87ed6c0602d0a090c92ee81e
-
C:\Program Files\McAfee\WebAdvisor\TaskManager.dllMD5
77984e74f29aa26c84ecf57a26591a7f
SHA13e7ab536b5b9ae411803d75690b5fb586b006f06
SHA256985019df73b3c8483faba01968aea2e68f75bd6f748b72e1790c9ef5d52b5b49
SHA512ab324d6ecbed91eaf9e0b9c2e01c972097362c83b3a7710c56c02f94349201448eafbec092b2348888f94dbbbe29db15211835c8c351f293697712a8443bb582
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\class.lucMD5
8e7b66f17bde1dc1c06dca6104e7f480
SHA11dc71e1c9fa656fb02b715a03b2ec6ad972243e4
SHA256156d69852bbb0aaf3ab2b106f764b186241824ec796f06e0751577a81b0216be
SHA512fbee964fe399b3107c8d4f84fb33793d5642b760474ccb0557004a87857592f563a327afaa21a55bf55c7f7606dbaf78101cdb25411cfe0c6aa10467486d0018
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\dkjson.lucMD5
83235a426aa44d23731ffdbe76b2f01a
SHA15dc348407f37963f3e09599e9bbe2ded2a346125
SHA256cc63ad6adf453c0e2b06c1d0860c7538c601d7b4add31319c0843b6b09e956a4
SHA5123e2c2d7165b4e82dca3a20ce4eb1208d192cc118e3b63c7dfac8f0257ab4324b15884d77076ccfefda1ce752fb4b715eb574214deb3e48652802dde52d5ef268
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\logger.lucMD5
ce0b0ec6e446e738b6e6a1fff5919a1d
SHA1ac284eb831d1bc1eb9f9624cffb4e3bb4e15e013
SHA2562018a369edb4a9ef0d5341b44d6d613885316128592d16794c246a6bffc60c14
SHA51212ac72f8f1c3ff4c9073a60a8e996de90bd9976f459b15eb9654e780a932f1a47e20942dadcb1fcc805b78a5ae6da1d403b39a5f6db992b523df6a3b7b3bd709
-
C:\Program Files\McAfee\WebAdvisor\servicehost.exeMD5
9c1c02d5247139cf58e0c05d869b78d2
SHA1374397b16fe22a03eb9f0887ca3750bf2ebeb9ae
SHA256ca0244aa3ebb3520d9e682e3ab8ad5186786540c342971ee2c35afa8bdf7a289
SHA5123e92bfbabfd322420b6e6757b29bb4bd33fd854c594a17c1d7d4d6990a3c2824f8e1b4c0ab51619d7d317109488c4cdb53b067e3235a0e84b0bd09debd2c2a2e
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryConfig.lucMD5
57c4fe0457c550aaa7c35a48b979d433
SHA16400f9c457e906a3a38d935bc424a22445722e12
SHA25675e3d869cc62ff8d2c0137985385f119b372d2443581586a1d4b2c38e59dc1db
SHA512e53499874d3ce8b28e80286bed811416df7d744491c9c919cd7b235284db02823b2322e6b1dfd8f292c93919a5f13a06a68f83a17e4bb6d078173a15499812ad
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryHandler.lucMD5
6c6ad8068e81e9dd39285a9311475c70
SHA10f2e1d07cad0d3fd75072541a2d990e126fc69e4
SHA25670415e7589378283a6fb242db17286882dcf3af796b885bad3fd98668b33e8a3
SHA512b625934d0679745909a1dfc6ed08ee0f9ad4292654b07efb59db59c5a66c31f422fa6e4cd505a1a2d86750286d93897b52f695fa078a4590c55f61aed985ccaf
-
C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dllMD5
2ae6e93d352bb3064a4f13adfa717821
SHA174ab77903e4b81fec7a2d04a55efc9460789c3f9
SHA25631ed165aa5dc3c074fb285e99a446bcf1107ed0550d79cded3daa8af1f26aec2
SHA5125807e0391545c157bd8dc26f39a28fd0cd300c2538d0b835d533a921023ffce14778881f46c91560836f2d59e54a6d8d5539a49b1800d62b32ed85db8c061eda
-
C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dllMD5
2bcc8b19399d239791f3f1fa1c10db58
SHA1fd1d784f46f6bdaf2d133a7330ffffc62bc64bf5
SHA2561ac0076b14551f9c3c510215a495a8bf8f53706ea22659211a37c30c0f0aa9f9
SHA512af307a3257b086c6f8101c048b55c33185aa1440c4d405f84ce0b868f5bba62c1b12c60eb4a85ac629a9c88bf16fc3a8d20948f57dc9d01ded3439614ddc8108
-
C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dllMD5
50d59fd9a7771aadcf9ae3c75a382774
SHA1b3c8b4ee3b47d222e681bdd9285089b9798d5614
SHA256f5ae2b83c42d0c93b853e4315d35fe1a02ca24c18c8174a1b5029574d2355278
SHA512ea5dfb70450fc4d366b78fe90bf86c400dc0c40b0fbc921a21dbfcc2c4fcc82d017ba78763a757a15315b1a315d8d48f15e582696cf876025492239c27cacf2a
-
C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dllMD5
6c0e4143cb5140e093b70c1d0c6ed325
SHA1defabffad832df333969f31656f0a33d8246fa81
SHA256ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755
SHA51296c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83
-
C:\Users\Admin\AppData\Local\Temp\MSI4b338.LOGMD5
c85d0bacf059f831758d9355f855db8f
SHA1df595362ed814b55300ee0f1c5e0d53e9812fb32
SHA2560bec29537bc71959e02f2ed8ab6d3b575e545fba62e1b5ed15caaf3d5dd7b16e
SHA512183e370fa8adfa30e6098aee9485fa042e5071771d0c27c4aff6ff51e2c85134b80678252c216a1dfef19551b2f0e8b3c0c185c0d2e70dc25c4afaff88b01898
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\installer.exeMD5
196b1b7dfbedc8167618371593cf5767
SHA18bc876ffc756f349a1919a3c6086499e964db9a1
SHA2565e5fe698ce7f998cbbef3223ff5773dcc19623b78d5fc250ad5c04bc81346258
SHA51258d98a2c29734768bd513c586a4cf07d8c8404cbe6d6f088c46855fc8b07de5f225143633c87d0d11e312e186005088a8e3f3e905e5c26550d3b77be18a9e3b0
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod0_extract\saBSI.exeMD5
211f842d6081bba42c3e7fdd372e0986
SHA1fa96b4b66bf3f37b3bf6ba322213003dc0198d9e
SHA256d5be427d9f42ecf0a37f1c7ed4cb75499f3f61e9a4e67d6b5d0a0b759436f8c5
SHA512bb742a89a7d4204b71c40e15488024da26a6a3dfd665e19a2b8dae940f587eee09de20e12f5adfbf39e896dd7e62025944bc0bf4c443f6aec372a096353b41e0
-
C:\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\prod1_extract\winzip_mul_64.msiMD5
4bb4e7a963bf8ee519e6d67c6b5c616d
SHA13fc5790a746d34930084672924a5853e9f56c07d
SHA256800b8e0414441f26cb383b38711ee1ffee55d02a07819a76b9cf3c0518124f50
SHA512a76c3a51d1e1f48cbf96806167c2a2dc0949b1444a08811e6e28dc7cbc3c90339ade8aa18dd799dcb853c5cf20a66cd6a54776e5770d1e81a6fb068ab48b3886
-
C:\Users\Admin\AppData\Local\Temp\is-2SBBD.tmp\pdf-xchange_viewer_XV-78H1.tmpMD5
47fe613751fef2c83fda48877d90300f
SHA1d950ebcbf8621baef45f21198ccc72c59a524e53
SHA256e227f95b36462ac67f0241770d360c87669bd95777ef3bbc02ce0c48409da1a1
SHA512c96e8c65808cb351308e9b2821108026dbd726637b0964c9f683c712d4b2be45526354adfb6c2de4c3dc019e9e2fbc3f0b57efe083d945900f67433956685f92
-
C:\Windows\Installer\MSIC6EF.tmpMD5
a1b7850763af9593b66ee459a081bddf
SHA16e45955fae2b2494902a1b55a3873e542f0f5ce4
SHA25641b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af
SHA512a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1
-
C:\Windows\Installer\MSIC9BF.tmpMD5
14e63c3425987b4e9a0409b7d4e59010
SHA1c89eedb1e195b285a875710c9851bde696e29b6e
SHA256e264441c9b49c5c73c6e4882e978bf233af915a636132a25554ff8ae924f5b89
SHA512d46235629bed45157d510485e3255f38e98b948697178d1092d646c3ccd63b1a9d49df27db255198ac0679f69979712ec6fcfaa2cc1066ef41016ca20434f093
-
\Program Files\McAfee\WebAdvisor\eventmanager.dllMD5
7fabf6673861b194fb74cfa56405a05d
SHA173ee821f7eff15a9909e99053590790ad8efef22
SHA256d891f77c3f2d9266654cbba2192b190c64fa9f8be12fcfe9ecaec108e7936efe
SHA51273d0a91d1a67bf1c4d0c89da9e63e8fdcd31cbe2eca26831acdb7f4189c823055885abd7c2fbcf586ffdc3908989943abd2760b676e970218e95c9afadd6352f
-
\Program Files\McAfee\WebAdvisor\lookupmanager.dllMD5
bd7bb741f0b67b4874eadb685283e230
SHA1409d86d9e8fb192e5cb38632742e89071dda0f18
SHA256c09c3e639b3cbf891dd8a8df0001de2541601b4d272eec0941fa10ab9ab22e20
SHA5129a8369dedf30b06b7dc008bf3417d7ed70a1267939ea8f7bfe9e3b8442081371bfa00c957f9ce1a088c9308cec983c2eb7b88fee473ad118db7f16fc54afd3ff
-
\Program Files\McAfee\WebAdvisor\settingmanager.dllMD5
dca2e2268e01d111660e11b45fd62ca2
SHA130a3125c6452dc9aea6aad943a2bc545215dd664
SHA2563947877592dd9e6f6ec900bd2287bbecf3533f3491e728a875fe9c726374ab69
SHA5126bc5315a48d4d4dbfa7537b5b612ab27bd0029b57274c5dee01643d7de86078b28215e25a80235d80e860738e094efd313b5d4fb87ed6c0602d0a090c92ee81e
-
\Program Files\McAfee\WebAdvisor\taskmanager.dllMD5
77984e74f29aa26c84ecf57a26591a7f
SHA13e7ab536b5b9ae411803d75690b5fb586b006f06
SHA256985019df73b3c8483faba01968aea2e68f75bd6f748b72e1790c9ef5d52b5b49
SHA512ab324d6ecbed91eaf9e0b9c2e01c972097362c83b3a7710c56c02f94349201448eafbec092b2348888f94dbbbe29db15211835c8c351f293697712a8443bb582
-
\Program Files\McAfee\WebAdvisor\win32\downloadscan.dllMD5
2ae6e93d352bb3064a4f13adfa717821
SHA174ab77903e4b81fec7a2d04a55efc9460789c3f9
SHA25631ed165aa5dc3c074fb285e99a446bcf1107ed0550d79cded3daa8af1f26aec2
SHA5125807e0391545c157bd8dc26f39a28fd0cd300c2538d0b835d533a921023ffce14778881f46c91560836f2d59e54a6d8d5539a49b1800d62b32ed85db8c061eda
-
\Program Files\McAfee\WebAdvisor\win32\wssdep.dllMD5
2bcc8b19399d239791f3f1fa1c10db58
SHA1fd1d784f46f6bdaf2d133a7330ffffc62bc64bf5
SHA2561ac0076b14551f9c3c510215a495a8bf8f53706ea22659211a37c30c0f0aa9f9
SHA512af307a3257b086c6f8101c048b55c33185aa1440c4d405f84ce0b868f5bba62c1b12c60eb4a85ac629a9c88bf16fc3a8d20948f57dc9d01ded3439614ddc8108
-
\Program Files\McAfee\WebAdvisor\x64\downloadscan.dllMD5
50d59fd9a7771aadcf9ae3c75a382774
SHA1b3c8b4ee3b47d222e681bdd9285089b9798d5614
SHA256f5ae2b83c42d0c93b853e4315d35fe1a02ca24c18c8174a1b5029574d2355278
SHA512ea5dfb70450fc4d366b78fe90bf86c400dc0c40b0fbc921a21dbfcc2c4fcc82d017ba78763a757a15315b1a315d8d48f15e582696cf876025492239c27cacf2a
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dllMD5
6c0e4143cb5140e093b70c1d0c6ed325
SHA1defabffad832df333969f31656f0a33d8246fa81
SHA256ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755
SHA51296c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dllMD5
6c0e4143cb5140e093b70c1d0c6ed325
SHA1defabffad832df333969f31656f0a33d8246fa81
SHA256ac7d446a4bd05c1a1de0f23f13b63a79b9dd6bfc353614fd97819c42c3f4a755
SHA51296c5bcae117ccf3265ddf77a72959fa969c683fc9e1e1aeebac9c495a755ddcb19e2365cc03469c0eda21d41d50a43636794a8209cdf4d70c747b46022aecf83
-
\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\botva2.dllMD5
67965a5957a61867d661f05ae1f4773e
SHA1f14c0a4f154dc685bb7c65b2d804a02a0fb2360d
SHA256450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105
SHA512c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b
-
\Users\Admin\AppData\Local\Temp\is-0E4R0.tmp\zbShieldUtils.dllMD5
8b03d5f13240d4395654ac0074a95728
SHA189d0f5039379fdda7719fa8b5ab3a46a92e3a064
SHA256f88d2226bbac1b61dbc22c968721f4b9f961c0a6aa75d88f303649bc930007d6
SHA512bb8e2d2c34e8c2d84c1c9579130b8dcded2fa90dbc6d2dc6f54c9114f13a32941571c57a25e16e42e4652eda52201ceb560ba5a726fce1f053613e51752d52a3
-
\Windows\Installer\MSIC6EF.tmpMD5
a1b7850763af9593b66ee459a081bddf
SHA16e45955fae2b2494902a1b55a3873e542f0f5ce4
SHA25641b8e92deba5206c78817236ed7f44df95636ca748d95fab05f032f5aec186af
SHA512a87a302a9a0d19d7ce293b42f5e7bc09664b21307a5321f226157fcc57eb2df2b59c6651878cb23969a182c82b55e8671ff00f8462194b81a907974a49cb25b1
-
\Windows\Installer\MSIC9BF.tmpMD5
14e63c3425987b4e9a0409b7d4e59010
SHA1c89eedb1e195b285a875710c9851bde696e29b6e
SHA256e264441c9b49c5c73c6e4882e978bf233af915a636132a25554ff8ae924f5b89
SHA512d46235629bed45157d510485e3255f38e98b948697178d1092d646c3ccd63b1a9d49df27db255198ac0679f69979712ec6fcfaa2cc1066ef41016ca20434f093
-
memory/508-213-0x0000000000000000-mapping.dmp
-
memory/508-123-0x0000000000000000-mapping.dmp
-
memory/516-329-0x0000000000000000-mapping.dmp
-
memory/584-164-0x0000000000000000-mapping.dmp
-
memory/588-169-0x0000000000000000-mapping.dmp
-
memory/724-247-0x0000000000000000-mapping.dmp
-
memory/804-129-0x0000000000000000-mapping.dmp
-
memory/1208-128-0x0000000000000000-mapping.dmp
-
memory/1300-235-0x0000000000000000-mapping.dmp
-
memory/1344-330-0x0000000000000000-mapping.dmp
-
memory/1516-115-0x0000000000000000-mapping.dmp
-
memory/1516-118-0x0000000000700000-0x0000000000701000-memory.dmpFilesize
4KB
-
memory/1516-122-0x0000000000D20000-0x0000000000D2F000-memory.dmpFilesize
60KB
-
memory/1736-229-0x0000000000000000-mapping.dmp
-
memory/1832-217-0x0000000000000000-mapping.dmp
-
memory/1832-328-0x0000000000000000-mapping.dmp
-
memory/1976-168-0x0000000000000000-mapping.dmp
-
memory/2236-332-0x0000000000000000-mapping.dmp
-
memory/2256-236-0x0000000000000000-mapping.dmp
-
memory/2632-163-0x0000000000000000-mapping.dmp
-
memory/2632-176-0x0000000000000000-mapping.dmp
-
memory/2684-220-0x0000000000000000-mapping.dmp
-
memory/2720-226-0x0000000000000000-mapping.dmp
-
memory/2780-218-0x0000000000000000-mapping.dmp
-
memory/2808-234-0x0000000005790000-0x0000000005957000-memory.dmpFilesize
1.8MB
-
memory/2808-228-0x0000000005200000-0x0000000005202000-memory.dmpFilesize
8KB
-
memory/2808-227-0x0000000010000000-0x0000000010112000-memory.dmpFilesize
1.1MB
-
memory/2808-173-0x0000000000000000-mapping.dmp
-
memory/2808-221-0x0000000005690000-0x0000000005857000-memory.dmpFilesize
1.8MB
-
memory/2832-215-0x0000000000000000-mapping.dmp
-
memory/3172-114-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3608-166-0x0000000000000000-mapping.dmp
-
memory/3628-177-0x0000000000000000-mapping.dmp
-
memory/3672-181-0x0000000000000000-mapping.dmp
-
memory/3736-245-0x0000000000000000-mapping.dmp
-
memory/3736-241-0x0000000000000000-mapping.dmp
-
memory/3744-246-0x0000000000000000-mapping.dmp
-
memory/3744-250-0x000000001B800000-0x000000001B802000-memory.dmpFilesize
8KB
-
memory/3744-248-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/3748-186-0x0000000000000000-mapping.dmp
-
memory/3920-222-0x0000000000000000-mapping.dmp
-
memory/3932-219-0x0000000000000000-mapping.dmp
-
memory/3960-216-0x0000000000000000-mapping.dmp
-
memory/3976-126-0x0000000000000000-mapping.dmp
-
memory/4004-191-0x0000000000000000-mapping.dmp
-
memory/4068-232-0x0000000000000000-mapping.dmp
-
memory/4068-214-0x0000000000000000-mapping.dmp
-
memory/4080-172-0x0000000000000000-mapping.dmp
-
memory/4084-276-0x00000272CFE0B000-0x00000272CFE0F000-memory.dmpFilesize
16KB
-
memory/4084-293-0x00000272E8A80000-0x00000272E8A81000-memory.dmpFilesize
4KB
-
memory/4084-319-0x00000272EB8E0000-0x00000272EB8F3000-memory.dmpFilesize
76KB
-
memory/4084-318-0x00000272E8878000-0x00000272E887A000-memory.dmpFilesize
8KB
-
memory/4084-316-0x00000272E8856000-0x00000272E8867000-memory.dmpFilesize
68KB
-
memory/4084-317-0x00000272E8867000-0x00000272E8878000-memory.dmpFilesize
68KB
-
memory/4084-315-0x00000272E8845000-0x00000272E8856000-memory.dmpFilesize
68KB
-
memory/4084-230-0x0000000000000000-mapping.dmp
-
memory/4084-313-0x00000272E8823000-0x00000272E8834000-memory.dmpFilesize
68KB
-
memory/4084-314-0x00000272E8834000-0x00000272E8845000-memory.dmpFilesize
68KB
-
memory/4084-251-0x0000000000000000-mapping.dmp
-
memory/4084-252-0x00000272CE140000-0x00000272CE141000-memory.dmpFilesize
4KB
-
memory/4084-255-0x0000000000D40000-0x0000000000D41000-memory.dmpFilesize
4KB
-
memory/4084-256-0x00000272CFE10000-0x00000272CFE11000-memory.dmpFilesize
4KB
-
memory/4084-257-0x00000272CFC90000-0x00000272CFC91000-memory.dmpFilesize
4KB
-
memory/4084-258-0x00000272CFF00000-0x00000272CFF01000-memory.dmpFilesize
4KB
-
memory/4084-259-0x00000272CFC20000-0x00000272CFC21000-memory.dmpFilesize
4KB
-
memory/4084-262-0x00000272E8880000-0x00000272E8881000-memory.dmpFilesize
4KB
-
memory/4084-265-0x00000272E88D0000-0x00000272E88D1000-memory.dmpFilesize
4KB
-
memory/4084-268-0x00000272E8AE0000-0x00000272E8AE1000-memory.dmpFilesize
4KB
-
memory/4084-269-0x00000272E8CB0000-0x00000272E8CB1000-memory.dmpFilesize
4KB
-
memory/4084-271-0x00000272EA2C0000-0x00000272EA2C1000-memory.dmpFilesize
4KB
-
memory/4084-272-0x00000272CFE07000-0x00000272CFE0B000-memory.dmpFilesize
16KB
-
memory/4084-273-0x00000272E8D60000-0x00000272E8D61000-memory.dmpFilesize
4KB
-
memory/4084-274-0x00000272CFE00000-0x00000272CFE02000-memory.dmpFilesize
8KB
-
memory/4084-278-0x00000272E879B000-0x00000272E87AC000-memory.dmpFilesize
68KB
-
memory/4084-312-0x00000272E8812000-0x00000272E8823000-memory.dmpFilesize
68KB
-
memory/4084-281-0x00000272E8EC0000-0x00000272E8EC1000-memory.dmpFilesize
4KB
-
memory/4084-277-0x00000272E8E10000-0x00000272E8E11000-memory.dmpFilesize
4KB
-
memory/4084-282-0x00000272E87AC000-0x00000272E87BD000-memory.dmpFilesize
68KB
-
memory/4084-284-0x00000272E8786000-0x00000272E878A000-memory.dmpFilesize
16KB
-
memory/4084-280-0x00000272E8780000-0x00000272E8786000-memory.dmpFilesize
24KB
-
memory/4084-285-0x00000272E878A000-0x00000272E879B000-memory.dmpFilesize
68KB
-
memory/4084-286-0x00000272E8F70000-0x00000272E8F71000-memory.dmpFilesize
4KB
-
memory/4084-288-0x00000272E9020000-0x00000272E9021000-memory.dmpFilesize
4KB
-
memory/4084-291-0x00000272E9450000-0x00000272E9451000-memory.dmpFilesize
4KB
-
memory/4084-292-0x00000272E90E0000-0x00000272E90E1000-memory.dmpFilesize
4KB
-
memory/4084-311-0x00000272E8801000-0x00000272E8812000-memory.dmpFilesize
68KB
-
memory/4084-294-0x00000272E9160000-0x00000272E9161000-memory.dmpFilesize
4KB
-
memory/4084-295-0x00000272E8A40000-0x00000272E8A41000-memory.dmpFilesize
4KB
-
memory/4084-296-0x00000272E9260000-0x00000272E9261000-memory.dmpFilesize
4KB
-
memory/4084-298-0x00000272E9310000-0x00000272E9311000-memory.dmpFilesize
4KB
-
memory/4084-300-0x00000272E97C0000-0x00000272E97C1000-memory.dmpFilesize
4KB
-
memory/4084-302-0x00000272E9920000-0x00000272E9921000-memory.dmpFilesize
4KB
-
memory/4084-304-0x00000272E99D0000-0x00000272E99D1000-memory.dmpFilesize
4KB
-
memory/4084-306-0x00000272E9A80000-0x00000272E9A81000-memory.dmpFilesize
4KB
-
memory/4084-307-0x00000272E87CE000-0x00000272E87DF000-memory.dmpFilesize
68KB
-
memory/4084-308-0x00000272CFE06000-0x00000272CFE07000-memory.dmpFilesize
4KB
-
memory/4084-309-0x00000272E87DF000-0x00000272E87F0000-memory.dmpFilesize
68KB
-
memory/4084-310-0x00000272E87F0000-0x00000272E8801000-memory.dmpFilesize
68KB
-
memory/4356-207-0x0000000000000000-mapping.dmp
-
memory/4688-225-0x0000000000000000-mapping.dmp
-
memory/4688-208-0x0000000000000000-mapping.dmp
-
memory/4708-209-0x0000000000000000-mapping.dmp
-
memory/4756-210-0x0000000000000000-mapping.dmp
-
memory/4776-233-0x0000000000000000-mapping.dmp
-
memory/4776-331-0x0000000000000000-mapping.dmp
-
memory/4792-231-0x0000000000000000-mapping.dmp
-
memory/4844-239-0x0000000000000000-mapping.dmp
-
memory/4860-211-0x0000000000000000-mapping.dmp
-
memory/4892-240-0x0000000000000000-mapping.dmp
-
memory/4964-242-0x0000000000000000-mapping.dmp
-
memory/5004-223-0x0000000000000000-mapping.dmp
-
memory/5036-224-0x0000000000000000-mapping.dmp
-
memory/5056-326-0x0000000004C51000-0x0000000004C52000-memory.dmpFilesize
4KB
-
memory/5056-325-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/5056-327-0x0000000004C53000-0x0000000004C54000-memory.dmpFilesize
4KB
-
memory/5056-324-0x0000000000000000-mapping.dmp
-
memory/5092-323-0x0000000004E23000-0x0000000004E24000-memory.dmpFilesize
4KB
-
memory/5092-322-0x0000000004E21000-0x0000000004E22000-memory.dmpFilesize
4KB
-
memory/5092-321-0x0000000004E20000-0x0000000004E21000-memory.dmpFilesize
4KB
-
memory/5092-320-0x0000000000000000-mapping.dmp
-
memory/5096-333-0x0000000000000000-mapping.dmp