Analysis
-
max time kernel
1985s -
max time network
2703s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
23-04-2022 14:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://amigo-light.mail.ru/
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
http://amigo-light.mail.ru/
Resource
win10-20220414-en
General
-
Target
http://amigo-light.mail.ru/
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
2345MPCSafe.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules 2345MPCSafe.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
WscReg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "2" WscReg.exe -
Modifies system executable filetype association 2 TTPs 21 IoCs
Processes:
regsvr32.exe2345SoftMgrShell64.exesetupbeta.exeregsvr32.exe2345SoftMgrShell64.exe2345SoftMgrShell64.exeregsvr32.exeregsvr32.exe2345ExtShell64.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ContextMenuExt regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext setupbeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\SoftMgrExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr\ = "{6B3BA4A8-EC7E-4714-9ECF-EB33995B3384}" 2345SoftMgrShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr\ = "{6B3BA4A8-EC7E-4714-9ECF-EB33995B3384}" 2345SoftMgrShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext\ = "{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ContextMenuPropExt\ = "{903D855A-D671-4A8E-A592-9168755917DB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr\ = "{6B3BA4A8-EC7E-4714-9ECF-EB33995B3384}" 2345SoftMgrShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ContextMenuExt\ = "{6ADF19E3-77A3-4395-ADB4-9FD7D351EB3E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345PCSafe\ = "{C4F75DB1-B9F4-425A-9F5B-778911BCF176}" 2345ExtShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345PCSafe 2345ExtShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\ContextMenuPropExt regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345SoftMgr 2345SoftMgrShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext\ = "{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}" setupbeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\2345PCSafe 2345ExtShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\SoftMgrExt\ = "{5E19C0CE-C02C-46c2-98C3-A2E12EDE0E17}" regsvr32.exe -
Registers COM server for autorun 1 TTPs
-
Checks for common network interception software 1 TTPs
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Enumerates VirtualBox registry keys 2 TTPs
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 24468 bcdedit.exe 24460 bcdedit.exe -
Blocklisted process makes network request 5 IoCs
Processes:
rundll32.exeflow pid process 1379 17184 rundll32.exe 1593 17184 rundll32.exe 1598 17184 rundll32.exe 1605 17184 rundll32.exe 1606 17184 rundll32.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 14 IoCs
Processes:
2345SafeCenterInstaller.exesetupbeta.exe360tray.exe2345explorer_100350.exedescription ioc process File created C:\Windows\system32\drivers\ttmtor.sys 2345SafeCenterInstaller.exe File created C:\Windows\system32\drivers\360Box64.sys setupbeta.exe File created C:\Windows\System32\drivers\360AntiHijack64.sys setupbeta.exe File created C:\Windows\system32\drivers\BAPIDRV64.sys setupbeta.exe File created C:\Windows\system32\drivers\360FsFlt.sys setupbeta.exe File created C:\Windows\system32\drivers\360Sensor64.sys 360tray.exe File opened for modification C:\Windows\system32\drivers\ttmtor.sys 2345explorer_100350.exe File created C:\Windows\System32\drivers\360Camera64.sys setupbeta.exe File created C:\Windows\System32\drivers\360AntiHacker64.sys setupbeta.exe File created C:\Windows\System32\drivers\360LanProtect.sys setupbeta.exe File created C:\Windows\System32\drivers\360AntiSteal64.sys setupbeta.exe File created C:\Windows\System32\drivers\360netmon.sys setupbeta.exe File created C:\Windows\system32\drivers\360reskit64.sys 360tray.exe File opened for modification C:\Windows\system32\drivers\360reskit64.sys 360tray.exe -
Executes dropped EXE 64 IoCs
Processes:
amigo_setup.exeamigo_setup.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exeMJImageConverter_106401.exevrgikx.exevrgikx.exe2345pcsafe_100107_duotes.exe70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043.exe2345ShellPro.exe2345SafeCenterInstaller.exe2345SafeCenterSvc.exe2345RTProtect.exe2345SafeCenterCrashReport.exe2345SafeCenterInstaller.exe2345SoftMgr.exe2345SafeSvc.exe2345ExtShell64.exe2345ShellPro.exe2345RTProtect.exe2345SafeTray.exe2345ShellPro.exe2345ManuUpdate.exe2345RTProtect.exe2345NightMode.exe2345SafeUpdate.exe2345SoftMgrShell64.exewEBWekbEJkyzip282561115scuix001.exeKuaiZip.exeKuaiZip.exe2345Setting.exeKZReport.exe09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe2345SoftMgr.exe2345SoftMgrShell64.exe2345SafeCenterUpdate.exe2345ProtectManager.exeKuaiZip.exe83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.exe9F8F.tmp.exe2345SoftMgr.exe2345SoftMgr.exe2345SoftMgrShell64.exe2345explorer_100350.exe2345explorer_100350.exe2345Explorer.exe2345explorer_100350.exeHelperTool64.exeHelperTool64.exeServiceManager.exepid process 5008 amigo_setup.exe 4772 amigo_setup.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2168 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 1128 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2308 576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2992 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4296 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 1364 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2248 633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 5004 7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe 952 96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 5044 MJImageConverter_106401.exe 784 vrgikx.exe 820 vrgikx.exe 5184 2345pcsafe_100107_duotes.exe 5376 70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043.exe 5864 2345ShellPro.exe 5928 2345SafeCenterInstaller.exe 5348 2345SafeCenterSvc.exe 6148 2345RTProtect.exe 6228 2345SafeCenterCrashReport.exe 6324 2345SafeCenterInstaller.exe 7092 2345SoftMgr.exe 7108 2345SafeSvc.exe 6168 2345ExtShell64.exe 6320 2345ShellPro.exe 6680 2345RTProtect.exe 6988 2345SafeTray.exe 5876 2345ShellPro.exe 6828 2345ManuUpdate.exe 5932 2345RTProtect.exe 5524 2345NightMode.exe 6828 2345ManuUpdate.exe 7452 2345SafeUpdate.exe 8096 2345SoftMgrShell64.exe 7396 wEBWekbEJkyzip282561115scuix001.exe 6440 KuaiZip.exe 8112 KuaiZip.exe 8092 2345Setting.exe 7380 KZReport.exe 7544 09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe 5072 2345SoftMgr.exe 9244 2345SoftMgrShell64.exe 9560 2345SafeCenterUpdate.exe 10040 2345ProtectManager.exe 8340 KuaiZip.exe 9572 83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.exe 6960 9F8F.tmp.exe 9044 2345SoftMgr.exe 8604 2345SoftMgr.exe 8656 2345SoftMgrShell64.exe 10320 2345explorer_100350.exe 10260 2345explorer_100350.exe 11688 2345Explorer.exe 11804 2345explorer_100350.exe 11844 HelperTool64.exe 12060 HelperTool64.exe 12248 ServiceManager.exe -
Modifies Windows Firewall 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule behavioral2/memory/760-196-0x0000000002850000-0x00000000029F6000-memory.dmp upx behavioral2/memory/760-201-0x0000000002850000-0x00000000029F6000-memory.dmp upx behavioral2/memory/760-200-0x0000000002850000-0x00000000029F6000-memory.dmp upx behavioral2/memory/2992-212-0x00000000028B0000-0x0000000002A56000-memory.dmp upx behavioral2/memory/2992-215-0x00000000028B0000-0x0000000002A56000-memory.dmp upx behavioral2/memory/2992-216-0x00000000028B0000-0x0000000002A56000-memory.dmp upx behavioral2/memory/4296-232-0x0000000002840000-0x00000000029E6000-memory.dmp upx behavioral2/memory/4296-233-0x0000000002840000-0x00000000029E6000-memory.dmp upx behavioral2/memory/4296-234-0x0000000002840000-0x00000000029E6000-memory.dmp upx behavioral2/memory/4296-235-0x0000000002760000-0x0000000002910000-memory.dmp upx behavioral2/memory/4296-236-0x0000000002760000-0x0000000002910000-memory.dmp upx behavioral2/memory/4776-245-0x00000000028F0000-0x0000000002A96000-memory.dmp upx behavioral2/memory/4776-248-0x00000000028F0000-0x0000000002A96000-memory.dmp upx behavioral2/memory/4776-249-0x00000000028F0000-0x0000000002A96000-memory.dmp upx behavioral2/memory/1364-261-0x0000000002880000-0x0000000002A26000-memory.dmp upx behavioral2/memory/1364-264-0x0000000002880000-0x0000000002A26000-memory.dmp upx behavioral2/memory/1364-265-0x0000000002880000-0x0000000002A26000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe360tray.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 360tray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 360tray.exe -
Checks computer location settings 2 TTPs 20 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2345Explorer.exe2345Explorer.exe2345Explorer.exe360tray.exeHelperTool64.exe2345Explorer.exe2345Explorer.exe2345Explorer.exe2345Explorer.exeHelperTool64.exe2345Explorer.exe2345Explorer.exe2345Explorer.exe2345Explorer.exe2345Explorer.exe09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe2345Explorer.exe2345Explorer.exe2345Explorer.exe2345Explorer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 360tray.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation HelperTool64.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation HelperTool64.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe Key value queried \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Control Panel\International\Geo\Nation 2345Explorer.exe -
Drops startup file 2 IoCs
Processes:
HuyaClientInstall260.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\虎牙直播.lnk HuyaClientInstall260.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\虎牙直播加速.lnk HuyaClientInstall260.exe -
Loads dropped DLL 64 IoCs
Processes:
dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exerundll32.exerundll32.exe2345pcsafe_100107_duotes.exepid process 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 3908 rundll32.exe 2316 rundll32.exe 1924 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe 5184 2345pcsafe_100107_duotes.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 25 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 104.192.108.153 Destination IP 104.192.108.157 Destination IP 104.192.108.154 Destination IP 36.99.30.100 Destination IP 1.192.193.147 Destination IP 104.192.108.157 Destination IP 36.99.30.100 Destination IP 36.99.30.100 Destination IP 104.192.108.153 Destination IP 36.99.30.113 Destination IP 36.99.170.74 Destination IP 36.99.170.74 Destination IP 104.192.108.154 Destination IP 1.192.193.95 Destination IP 180.163.231.221 Destination IP 36.99.30.110 Destination IP 36.99.170.74 Destination IP 1.192.193.146 Destination IP 1.192.193.95 Destination IP 104.192.108.157 Destination IP 36.99.170.74 Destination IP 36.99.170.74 Destination IP 36.99.30.100 Destination IP 36.99.30.113 Destination IP 36.99.30.113 -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
kuwo_jm882.exesetupbeta.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run kuwo_jm882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kwmusic = "\"C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.5.0_P2T1\\Kwmusic.exe\" /autorun" kuwo_jm882.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\360Safetray = "\"C:\\Program Files (x86)\\360\\360Safe\\safemon\\360Tray.exe\" /start" setupbeta.exe -
Checks for any installed AV software in registry 1 TTPs 4 IoCs
Processes:
setupbeta.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AhnLab\V3IS80 setupbeta.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Avira\Launcher setupbeta.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Avira\Launcher setupbeta.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AhnLab\V3IS80 setupbeta.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exeKwMusic.exerundll32.exesetupbeta.exe360tray.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA KwMusic.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setupbeta.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 360tray.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ldsgamemaster.exe360tray.exedescription ioc process File opened (read-only) \??\E: ldsgamemaster.exe File opened (read-only) \??\X: ldsgamemaster.exe File opened (read-only) \??\e: 360tray.exe File opened (read-only) \??\g: 360tray.exe File opened (read-only) \??\l: 360tray.exe File opened (read-only) \??\q: 360tray.exe File opened (read-only) \??\H: ldsgamemaster.exe File opened (read-only) \??\R: ldsgamemaster.exe File opened (read-only) \??\V: ldsgamemaster.exe File opened (read-only) \??\y: 360tray.exe File opened (read-only) \??\P: ldsgamemaster.exe File opened (read-only) \??\S: ldsgamemaster.exe File opened (read-only) \??\W: ldsgamemaster.exe File opened (read-only) \??\p: 360tray.exe File opened (read-only) \??\f: 360tray.exe File opened (read-only) \??\u: 360tray.exe File opened (read-only) \??\I: ldsgamemaster.exe File opened (read-only) \??\N: ldsgamemaster.exe File opened (read-only) \??\O: ldsgamemaster.exe File opened (read-only) \??\Z: ldsgamemaster.exe File opened (read-only) \??\m: 360tray.exe File opened (read-only) \??\o: 360tray.exe File opened (read-only) \??\z: 360tray.exe File opened (read-only) \??\K: ldsgamemaster.exe File opened (read-only) \??\U: ldsgamemaster.exe File opened (read-only) \??\j: 360tray.exe File opened (read-only) \??\t: 360tray.exe File opened (read-only) \??\F: ldsgamemaster.exe File opened (read-only) \??\G: ldsgamemaster.exe File opened (read-only) \??\J: ldsgamemaster.exe File opened (read-only) \??\M: ldsgamemaster.exe File opened (read-only) \??\T: ldsgamemaster.exe File opened (read-only) \??\Y: ldsgamemaster.exe File opened (read-only) \??\i: 360tray.exe File opened (read-only) \??\s: 360tray.exe File opened (read-only) \??\w: 360tray.exe File opened (read-only) \??\x: 360tray.exe File opened (read-only) \??\L: ldsgamemaster.exe File opened (read-only) \??\Q: ldsgamemaster.exe File opened (read-only) \??\h: 360tray.exe File opened (read-only) \??\k: 360tray.exe File opened (read-only) \??\n: 360tray.exe File opened (read-only) \??\r: 360tray.exe File opened (read-only) \??\v: 360tray.exe -
Maps connected drives based on registry 3 TTPs 3 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
360tray.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 360tray.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 360tray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 360tray.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 30 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
update.exeReport.exeReport.exeldsgamemaster.exe360leakfixer.exeKZReport.exeReport.exeKwMusic.exeLDSGameHall.exeLDSGameRun.exewEBWekbEJkyzip282561115scuix001.exe360Safe.exe360tray.exeHuyaClient.exesetupbeta.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exeLDSGameMasterInstRoad_210901.exeLdsHelper.exeHaloHelper.exeSoftMgrLite.exe633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exepeBpAkmaZheinote3549984242345x001.exeReport.exeMobileEmuHelper.exe360SecLogonHelper.exehuyaplayerModule.exeReport.exeBirdHelper.exedescription ioc process File opened for modification \??\PhysicalDrive0 update.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 ldsgamemaster.exe File opened for modification \??\PhysicalDrive0 360leakfixer.exe File opened for modification \??\PhysicalDrive0 KZReport.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 KwMusic.exe File opened for modification \??\PhysicalDrive0 LDSGameHall.exe File opened for modification \??\PhysicalDrive0 LDSGameRun.exe File opened for modification \??\PhysicalDrive0 wEBWekbEJkyzip282561115scuix001.exe File opened for modification \??\PhysicalDrive0 360Safe.exe File opened for modification \??\PHYSICALDRIVE0 360tray.exe File opened for modification \??\PHYSICALDRIVE0 HuyaClient.exe File opened for modification \??\PHYSICALDRIVE0 setupbeta.exe File opened for modification \??\PhysicalDrive0 360tray.exe File opened for modification \??\PhysicalDrive0 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe File opened for modification \??\PhysicalDrive0 LDSGameMasterInstRoad_210901.exe File opened for modification \??\PhysicalDrive0 LdsHelper.exe File opened for modification \??\PhysicalDrive0 HaloHelper.exe File opened for modification \??\PhysicalDrive0 setupbeta.exe File opened for modification \??\PhysicalDrive0 SoftMgrLite.exe File opened for modification \??\PhysicalDrive0 633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe File opened for modification \??\PhysicalDrive0 peBpAkmaZheinote3549984242345x001.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 MobileEmuHelper.exe File opened for modification \??\PhysicalDrive0 360SecLogonHelper.exe File opened for modification \??\PhysicalDrive0 huyaplayerModule.exe File opened for modification \??\PhysicalDrive0 Report.exe File opened for modification \??\PhysicalDrive0 BirdHelper.exe -
Drops file in System32 directory 44 IoCs
Processes:
2345MPCSafe.exeProtect_2345Explorer.exesvchost.exesetupbeta.exedescription ioc process File opened for modification C:\Windows\system32\LogFiles\Scm\SCM.EVM.2 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\SpoolerLogger.etl.002 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\WMI\LwtNetLog.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CA4458E7366E94A3C3A9C1FE548B6D21_9DADEACF81A7074D1BA8E5E86B35A81B svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_CE18D35E70C72FBD424F3A4C77930458 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_5B48365B6FB1D99E89490669A75EB20F Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8DFDF057024880D7A081AFBF6D26B92F svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8DFDF057024880D7A081AFBF6D26B92F svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9A19ADAD9D098E039450ABBEDD5616EB_BF3C396B99A52B1CFA1CE8F3E6C2A5B9 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_CE18D35E70C72FBD424F3A4C77930458 svchost.exe File created C:\Windows\SysWOW64\360SoftMgr.cpl setupbeta.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\WMI\FaceRecoTel.etl.001 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTUBPM.etl 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE Protect_2345Explorer.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\WMI\Wifi.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\SpoolerLogger.etl.001 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9A19ADAD9D098E039450ABBEDD5616EB_BF3C396B99A52B1CFA1CE8F3E6C2A5B9 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CA4458E7366E94A3C3A9C1FE548B6D21_9DADEACF81A7074D1BA8E5E86B35A81B svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\Scm\SCM.EVM 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTDefenderAuditLogger.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\FaceUnlock.etl.001 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\NtfsLog.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\LogFiles\WMI\RtBackup\EtwRTWFP-IPsec Diagnostics.etl 2345MPCSafe.exe File opened for modification C:\Windows\system32\CatRoot2\dberr.txt 2345MPCSafe.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D266D9E1E69FA1EEFB9699B009B34C8_0A9BFDD75B598C2110CBF610C078E6E6 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_5B48365B6FB1D99E89490669A75EB20F Protect_2345Explorer.exe File opened for modification C:\Windows\system32\LogFiles\Scm\SCM.EVM.1 2345MPCSafe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe2345RTProtect.exepid process 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 6148 2345RTProtect.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedescription pid process target process PID 2464 set thread context of 2168 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe PID 4364 set thread context of 1128 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe -
Drops file in Program Files directory 64 IoCs
Processes:
KwUACSet.exesetupbeta.exeldsgamemaster.exeHuyaClientInstall260.exekuwo_jm882.exe2345pcsafe_100107_duotes.exeKwMusic.exe360tray.exe2345SafeCenterUpdate.exe2345explorer_100350.exedescription ioc process File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\img\cdpack\nodata.png KwUACSet.exe File opened for modification C:\Program Files (x86)\360\360Safe\SoftMgr\SoftExamConfig_UpdateSoft.xml setupbeta.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\360safe.setup setupbeta.exe File opened for modification C:\Program Files (x86)\BirdWallpaper\Utils\cef\locales\ro.pak ldsgamemaster.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\360UDiskPro setupbeta.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\x86\plugins\sse2\libi422_yuy2_sse2_plugin.dll HuyaClientInstall260.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\promote\home_shouji.png setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\OKClean\OKCleanNew13_theme.ui setupbeta.exe File created C:\Program Files (x86)\360\360Safe\deepscan\CheckSM.dll setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\netmon\Config\CircleDock\v1\tips.png setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\advtools\360DataProt.xml setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\endata\aw_1045.dat setupbeta.exe File created C:\Program Files (x86)\360\360Safe\safemon\360AntiHijack64.sys setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\SoftMgr\MiniAppdata.xdb setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong\static\music_wp.css kuwo_jm882.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\360Feedback12\360Feedback12_theme.ui setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\content_gedan.html KwUACSet.exe File created C:\Program Files (x86)\360\360Safe\SoftMgr\SML\SMLCoreProcSpecial.dat setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\Skin\base\PlaySwitchTip.xml kuwo_jm882.exe File opened for modification C:\Program Files (x86)\360\360Safe\SoftMgr\360zpth.ini setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\Utils\360UHelper.exe setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\endata\aw_1043.dat setupbeta.exe File created C:\Program Files (x86)\360\360Safe\ipc\filemon.dat setupbeta.exe File created C:\Program Files (x86)\360\360Safe\ipc\360hvm64_win10.sys setupbeta.exe File created C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\api-ms-win-core-debug-l1-1-0.dll 2345pcsafe_100107_duotes.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\Player\pthreadVSE2.dll HuyaClientInstall260.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\img\comment\face\emoji_34.png KwUACSet.exe File opened for modification C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\static KwUACSet.exe File created C:\Program Files (x86)\360\360Safe\Config\advtools\AdvanceTools_pic_360TaskMgr_10_52.png setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\advtools\AdvanceTools_pic_360ablum_10_32.png setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\advtools\360win10set.xml setupbeta.exe File created C:\Program Files (x86)\360\360Safe\SoftMgr\apppages\errorpage.html setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\Skin\base\SongPayDialog.xml kuwo_jm882.exe File opened for modification C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\skin\servertheme\10075\svrconf.ini KwMusic.exe File opened for modification C:\Program Files (x86)\360\360Safe\safemon\360realpro.exe setupbeta.exe File created C:\Program Files (x86)\360\360Safe\safemon\WDPayPro.exe setupbeta.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\Net35\System.Windows.Interactivity.xml HuyaClientInstall260.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\Player\swresample-3.dll HuyaClientInstall260.exe File created C:\Program Files (x86)\360\360Safe\Config\promote\popularize_speed.xml setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\theme.xml setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\theme_Pdown.xml setupbeta.exe File created C:\Program Files (x86)\360\360Safe\deepscan\dsbs.dat setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\ADMgr\pwlog_theme.ui setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Config\advtools\360DocumentProtector.xml setupbeta.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\Net35\api-ms-win-core-file-l2-1-0.dll HuyaClientInstall260.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\channel_mnx.html KwUACSet.exe File opened for modification C:\Program Files (x86)\360\360Safe\endata setupbeta.exe File created C:\Program Files (x86)\360\360Safe\Utils\DrvmgrCore.dll setupbeta.exe File created C:\Program Files (x86)\HuyaLive\HuyaClient\Presenter\api-ms-win-crt-time-l1-1-0.dll HuyaClientInstall260.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong\img\comment\face\emoji_59.png kuwo_jm882.exe File opened for modification C:\Program Files (x86)\360\360Safe\Config\image\state_risk_scanning.png setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\res\DeskLyric\DL_Themes_5b.png kuwo_jm882.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\img\comment\face\emoji_26.png KwUACSet.exe File opened for modification C:\Program Files (x86)\360\360Safe\safemon\360AntiHijack.dat 360tray.exe File created \??\c:\program files (x86)\2345soft\2345safecenter\6.12.1.10076\sectionsbackup\safeupdate\2022-04-23\BAP01.data.pg_0 2345SafeCenterUpdate.exe File created C:\Program Files (x86)\2345Soft\2345Explorer\icudtl.dat 2345explorer_100350.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\html\webdata\netsong.tmp\netsong\img\earth_close.png KwUACSet.exe File created C:\Program Files (x86)\BirdWallpaper\wallpaperhelper\HardwareProtect.sys ldsgamemaster.exe File created C:\Program Files (x86)\360\360Safe\deepscan\qex\qexvmmodel\malware.18.mdf setupbeta.exe File created C:\Program Files (x86)\360\360Safe\SoftMgr\mobileSoft.dat setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\360Common.dll setupbeta.exe File opened for modification C:\Program Files (x86)\360\360Safe\deepscan\qutmload.dll setupbeta.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\Skin\base\KwCopyLinkTips.xml kuwo_jm882.exe File created C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\KWMUSIC\ModuleData\ModDownload\icon_tool_ID126.png kuwo_jm882.exe -
Drops file in Windows directory 64 IoCs
Processes:
2345MPCSafe.exedescription ioc process File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2a2f66220fcb97e2_winresume.efi.mui_f412814e 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.15063.0_en-us_53639d962243b4e0_clipsvc.dll.mui_18823613 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-client-li..m-service.resources_31bf3856ad364e35_10.0.15063.0_de-de_aa72c79d3365a91b_clipsvc.dll.mui_18823613 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-w..r-webclnt.resources_31bf3856ad364e35_10.0.15063.0_en-us_507ecdc8096d0ff0_webclnt.dll.mui_e8f04040 2345MPCSafe.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_e1f4fde2e2936fd2_vdsutil.dll.mui_0caf9b0e 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\x86_microsoft.windows.isolationautomation_6595b64144ccf1df_1.0.15063.0_none_58a3b1f2dbb10121_sxsoa.dll_cb87188c 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-s..-netlogon.resources_31bf3856ad364e35_10.0.15063.0_it-it_cd82274d21c9d0bd_netlogon.dll.mui_ecbeb9bd 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-rasserver_31bf3856ad364e35_10.0.15063.0_none_bcbd1290a09b9a77_iprtrmgr.dll_50f5fe79 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_10.0.15063.0_en-us_dc0c6ac43ce52ba2_winlogon.exe.mui_3280fc46 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.15063.0_en-us_87ac933f1cd28fdb_winload.efi.mui_35ee487d 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_es-es_d21d37cff862835d_memtest.exe.mui_77b8cbcc 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-security-spp_31bf3856ad364e35_10.0.15063.0_none_35c9db038e226e49_sppmig.dll_22b5b188 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_it-it_0bd56943b236948f_dsreg.dll.mui_5d9efc7e 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_10.0.15063.0_none_f5dc2ec982476ba8_iscsidsc.dll_20ed5065 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-themeservice.resources_31bf3856ad364e35_10.0.15063.0_de-de_c98b512d3ca0bb42.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-etw-ese_31bf3856ad364e35_10.0.15063.0_none_eac35629f38bb48f_etweseproviderresources.dll_f21e8ea7 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_33a9f3ab14804647_scfilter.sys.mui_cebab716 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-f..uetype-malgungothic_31bf3856ad364e35_10.0.15063.0_none_1663b7b0fef8745d_malgun.ttf_166813d8 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-font-truetype-ebrima_31bf3856ad364e35_10.0.15063.0_none_df8fa7e794d7be79_ebrima.ttf_8897b9ba 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.15063.0_en-us_59667b55984cb570_user32.dll.mui_14652dbb 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_hu-hu_bc452e16cf9468db_memtest.exe.mui_77b8cbcc 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_fi-fi_71383c7ced7c7587_memtest.exe.mui_77b8cbcc 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-s..gc-kspsvc.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_4d03cf87179eca2a.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-w..r-webclnt.resources_31bf3856ad364e35_10.0.15063.0_en-us_507ecdc8096d0ff0.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-appidcore.resources_31bf3856ad364e35_10.0.15063.0_it-it_f71764dc4b9f7087_applockercsp.dll.mui_d2a0df70 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-filtermanager-core_31bf3856ad364e35_10.0.15063.0_none_221d4c2b639acaed_fltmgr.sys_c6e91b41 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-xmllite_31bf3856ad364e35_10.0.15063.0_none_a4a4021e107e099a_xmllite.dll_ce078c31 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-win32kbase.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_d455474aa5ae1c65_win32kbase.sys.mui_07d441e9 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-w..ient-core.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_443aebdfd447e1c0_wuaueng.dll.mui_297f975d 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_it-it_0180bef17dd5d294_userdeviceregistration.ngc.dll.mui_d2c6ca95 2345MPCSafe.exe File opened for modification C:\Windows\Panther\setupact.log 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-user32_31bf3856ad364e35_10.0.15063.0_none_de4c457aa62b389a_user32.dll_55f4ed20 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_es-es_5801262b97b61409_msimsg.dll.mui_72e8994f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_sv-se_3d51cb70dfbd2866_msimsg.dll.mui_72e8994f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_sk-sk_4071e5a8ddae1035_msimsg.dll.mui_72e8994f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_ko-kr_6225f301d1726e4d_bootmgr.efi.mui_be5d0075 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_sl-si_e3656bdd25eab1e2_msimsg.dll.mui_72e8994f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-tcpip_31bf3856ad364e35_10.0.15063.0_none_72996f15c8286420_netiougc.exe_94123cfe 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.15063.0_de-de_34657c991714ac40_netiougc.exe.mui_ad7a9e4d 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-d..vices-sam.resources_31bf3856ad364e35_10.0.15063.0_es-es_255f748c786d21fa_samsrv.dll.mui_32250491 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2a2f66220fcb97e2_winload.exe.mui_3bc5b827 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.15063.0_it-it_e611447f6277a2f5_user32.dll.mui_14652dbb 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-codeintegrity_31bf3856ad364e35_10.0.15063.0_none_b18bca773d8e9dae.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.15063.0_de-de_c5f11561ed21f5cb_axinstui.exe.mui_aea34130 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_10.0.15063.0_none_0ecb907c70c8a1bf_netlogon.dll_90e0458e 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-rasserver_31bf3856ad364e35_10.0.15063.0_none_c711bce2d4fc5c72_rasmigplugin.dll_7ee2aa40 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_da-dk_e9cf62e131074778_bootmgfw.efi.mui_a6e78cfa 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-d..ient-core.resources_31bf3856ad364e35_10.0.15063.0_es-es_28223c9b3a32c939_dnsapi.dll.mui_97465f8a 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-profsvc.resources_31bf3856ad364e35_10.0.15063.0_de-de_cedf17224e64925d_profsvc.dll.mui_32482e9e 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2a2f66220fcb97e2_winresume.exe.mui_ff8b5358 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\wow64_microsoft-windows-msauditevtlog_31bf3856ad364e35_10.0.15063.0_none_e2aafdd9e59cf01f_msobjs.dll_052c8a60 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-p..ng-client-overrides_31bf3856ad364e35_10.0.15063.0_none_2aad78202bd046dc_power.settings.idleresiliency.ppkg_de8e690f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-r..intmapper.resources_31bf3856ad364e35_10.0.15063.0_de-de_52bbcd224381180e.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-uxtheme_31bf3856ad364e35_10.0.15063.0_none_b6f8740d3f5e547a_uxtheme.dll_9f6cda06 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_networking-mpssvc-svc.resources_31bf3856ad364e35_10.0.15063.0_en-us_987c8d6bc746e508_firewallapi.dll.mui_43c7a05b 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-u..erservice.resources_31bf3856ad364e35_10.0.15063.0_en-us_01db4feacaa336b9.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_sr-..-rs_61f5adcf622ceaac_bootmgr.exe.mui_c434701f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-p..ne-client-overrides_31bf3856ad364e35_10.0.15063.0_none_43849a6a5b3b562b.manifest 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-s..-credprov.resources_31bf3856ad364e35_10.0.15063.0_it-it_8677ada353a751e7_fidocredprov.dll.mui_4ca89266 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-s..gc-kspsvc.resources_31bf3856ad364e35_10.0.15063.0_de-de_019026ab35c7b65e_ngcsvc.dll.mui_96312421 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.15063.0_de-de_29579edbbad6dd55_gpsvc.dll.mui_0c160ac2 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_lt-lt_4a7c585e4840d4da_bootmgr.exe.mui_c434701f 2345MPCSafe.exe File opened for modification C:\Windows\Winsxs\backup\amd64_microsoft-windows-w..e-ws2ifsl.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_dd4c0092fa872345_ws2ifsl.sys.mui_b672c7b4 2345MPCSafe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 47 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5652 6440 WerFault.exe KuaiZip.exe 7424 8112 WerFault.exe KuaiZip.exe 8580 8340 WerFault.exe KuaiZip.exe 8496 8340 WerFault.exe KuaiZip.exe 10184 8340 WerFault.exe KuaiZip.exe 7968 6960 WerFault.exe 9F8F.tmp.exe 14120 13488 WerFault.exe Update.exe 7408 13488 WerFault.exe Update.exe 15024 14792 WerFault.exe skinbox.exe 14844 12344 WerFault.exe skinbox.exe 15348 14824 WerFault.exe skinbox.exe 15240 13704 WerFault.exe skinbox.exe 15088 14824 WerFault.exe skinbox.exe 12156 14792 WerFault.exe skinbox.exe 13008 13704 WerFault.exe skinbox.exe 14856 12344 WerFault.exe skinbox.exe 15584 14308 WerFault.exe feedback.exe 15656 14604 WerFault.exe skinbox.exe 15620 14944 WerFault.exe skinbox.exe 15560 14952 WerFault.exe skinbox.exe 15884 14604 WerFault.exe skinbox.exe 15944 14308 WerFault.exe feedback.exe 16044 14944 WerFault.exe skinbox.exe 16116 14952 WerFault.exe skinbox.exe 15308 15500 WerFault.exe skinbox.exe 11532 15576 WerFault.exe skinbox.exe 14772 15136 WerFault.exe skinbox.exe 13704 15496 WerFault.exe skinbox.exe 16464 15496 WerFault.exe skinbox.exe 16880 15948 WerFault.exe skinbox.exe 16892 15752 WerFault.exe readmode.exe 16852 16120 WerFault.exe feedback.exe 16044 15948 WerFault.exe skinbox.exe 16324 15752 WerFault.exe readmode.exe 15548 16120 WerFault.exe feedback.exe 19632 7708 WerFault.exe 2345Explorer.exe 21432 21200 WerFault.exe update.exe 21000 21200 WerFault.exe update.exe 21800 18988 WerFault.exe skinbox.exe 21864 21176 WerFault.exe skinbox.exe 21920 21192 WerFault.exe skinbox.exe 21980 21000 WerFault.exe skinbox.exe 22316 21000 WerFault.exe skinbox.exe 22392 21176 WerFault.exe skinbox.exe 22476 21192 WerFault.exe skinbox.exe 22412 18988 WerFault.exe skinbox.exe 23376 23024 WerFault.exe 2345Explorer.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 27 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeKwMusic.exefirefox.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe360tray.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz KwMusic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 360tray.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 KwMusic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 KwMusic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 KwMusic.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360tray.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz KwMusic.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
Processes:
360tray.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 360tray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 360tray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 360tray.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1936 ipconfig.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 9912 taskkill.exe -
Processes:
LDSGameHall.exeMicrosoftEdgeCP.exe2345SoftMgr.exe2345SafeCenterInstaller.exe2345RTProtect.exeMicrosoftEdge.exekuwo_jm882.exe2345MiniPage.exe2345explorer_100350.exebrowser_broker.exe2345Setting.exe2345SafeCenterInstaller.exe45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exebrowser_broker.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT LDSGameHall.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" 2345SoftMgr.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION LDSGameHall.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT LDSGameHall.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main 2345SafeCenterInstaller.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main 2345RTProtect.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Styles\MaxScriptStatements = "4294967295" kuwo_jm882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING\LDSGameHall.exe = "1" LDSGameHall.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\2345MiniPage.exe = "11000" 2345MiniPage.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main 2345SafeCenterInstaller.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU 2345SoftMgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Doctor_2345Explorer.exe = "8000" 2345explorer_100350.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\2345SoftMgr.exe = "11000" 2345SoftMgr.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 2345explorer_100350.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Styles kuwo_jm882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_OBJECT\LDSGameHall.exe = "1" LDSGameHall.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_GPU_RENDERING LDSGameHall.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALIGNED_TIMERS LDSGameHall.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\AutomaticLayoutRecovery = "0" 2345MiniPage.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main 2345Setting.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" 2345SoftMgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" 2345SoftMgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Helper_2345Explorer.exe = "8000" 2345explorer_100350.exe Set value (data) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Cache = a803000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 2345SoftMgr.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main 2345SafeCenterInstaller.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_LMZ_SCRIPT\LDSGameHall.exe = "1" LDSGameHall.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 2345MiniPage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Check_Associations = "no" 2345RTProtect.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 2345SoftMgr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LDSGameHall.exe = "11001" LDSGameHall.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ALIGNED_TIMERS\LDSGameHall.exe = "1" LDSGameHall.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 2345SafeCenterInstaller.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main 2345RTProtect.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "no" 2345RTProtect.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main 2345Setting.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main 2345Setting.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main 2345SafeCenterInstaller.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\BrowserEmulation 2345MiniPage.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" 2345SoftMgr.exe -
Modifies Internet Explorer start page 1 TTPs 3 IoCs
Processes:
2345SafeCenterInstaller.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?duotes" 2345SafeCenterInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?duotes" 2345SafeCenterInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?duotes" 2345SafeCenterInstaller.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
Protect_2345Explorer.exesvchost.exesvchost.exezhudongfangyu.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Heinote\Install\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Protect_2345Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Heinote svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\360Safe\360Scan\NetProbe zhudongfangyu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Heinote\Install svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Protect_2345Explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\Certificates Protect_2345Explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Protect_2345Explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\360Safe\360Scan\NetProbe zhudongfangyu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\360Safe\360Scan zhudongfangyu.exe -
Modifies registry class 64 IoCs
Processes:
KuaiZip.exeMicrosoftEdge.exeregsvr32.exeregsvr32.exesetupbeta.exe360Safe.exeMicrosoftEdge.exe2345Explorer.exeMicrosoftEdgeCP.exekuwo_jm882.exe360tray.exeregsvr32.exe2345SafeCenterInstaller.exehnote.exe2345SafeCenterInstaller.exe2345SoftMgr.exeMicrosoftEdgeCP.exe2345RTProtect.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.087\ KuaiZip.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\PrivacyAdvanced = "0" MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{132FFD3F-B86C-48EB-B62B-B3904879367E}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\ = "PSFactoryBuffer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E431A037-AE60-4D57-99D7-B402223AE8A0}\DefaultIcon setupbeta.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\360Safe.ext.1 360Safe.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\2345ExplorerHTML\AppUserModelId = "2345Explorer" 2345Explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.tgz\Shell\Open\Command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe\" \"%1\"" KuaiZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.004\DefaultIcon KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.014\Shell KuaiZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.032 KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.057\Shell KuaiZip.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.078\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\.xhtml 2345Explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\TypeLib setupbeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.arj\Shell\Open\Command KuaiZip.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.073\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.091 KuaiZip.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.farfetch.com\ = "10005" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\kwfile_MP2\\shell\\openkw kuwo_jm882.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D8A9DF39-075A-4C8C-B48B-8121C37FFDF0}\ShellEx\ContextMenuHandlers setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{63A39D0C-0B63-49EE-BB21-D106ED548C51}\InprocServer32\ThreadingModel = "Apartment" setupbeta.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.z\DefaultIcon KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.060\Shell\Open KuaiZip.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\farfetch.com\Total = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.farfetch.com\ = "9423" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E473FD6-C3CB-468C-BAE3-A6B556BEB007}\ = "IDeskBandExt" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F6BC477E-2646-459A-9D6A-75902C24430D}\Shell setupbeta.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\a11083715786.cdn-pci.optimiz = "9481" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A23CB8EB-C9C4-475D-88C0-CC51933F2D9E}\Shell\Open\Icon = "C:\\Program Files (x86)\\360\\360Safe\\safemon\\360UDiskGuard64.dll,0" setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\360SafeLive.Update.2\CLSID\ = "{87515F61-A66C-4319-A0E0-D416CB8059E3}" 360tray.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.023\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{FD6A8A28-DB7F-478C-A358-C989EFE02096}\ShellEx setupbeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{47F57C45-E7A1-4414-A6F0-A0865F6E4CA6}\Shell\Open\command setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.mou\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.071\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{8972B06B-3F0E-42B3-8F2F-1BE2CC64E751}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{12793398-A212-446F-BA1E-1F1B5ABDB89C}\DefaultIcon\ = "C:\\Program Files (x86)\\360\\360Safe\\safemon\\360UDiskGuard64.dll,1" setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open\command\ = "\"C:\\Program Files (x86)\\2345Soft\\2345Explorer\\2345Explorer.exe\" -- \"%1\"" 2345SafeCenterInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Heinote.log\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\Heinote\\hnote.exe %1" hnote.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Unknown\shell\opendlg\command\DelegateExecute 2345SafeCenterInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.068\ = "Kuaizip.068" KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.086\Shell\Open\Command KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage MicrosoftEdgeCP.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command 2345SoftMgr.exe Set value (int) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A23CB8EB-C9C4-475D-88C0-CC51933F2D9E}\Shell\ = "Open" setupbeta.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\DefaultIcon\ = "C:\\Program Files (x86)\\2345Soft\\2345Explorer\\2345Explorer.exe,0" 2345SafeCenterInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\ProgId = "2345ExplorerHTML" 2345RTProtect.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\htmlfile\shell\open\ 2345RTProtect.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.007\Shell KuaiZip.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.009\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.010 KuaiZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.023\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.063\Shell\Open KuaiZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F8FD7413-FFDD-40CF-B964-DD7E9E197C51}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Heinote\\HNPreview64.dll" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\kwfile_OPUS\shell\openkw kuwo_jm882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\kwfile_WV\DefaultIcon\ = "C:\\Program Files (x86)\\kuwo\\kuwomusic\\9.0.5.0_P2T1\\bin\\res\\icons\\WV.ico" kuwo_jm882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lrcx\ = "kwfile_lrcx" kuwo_jm882.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{47F57C45-E7A1-4414-A6F0-A0865F6E4CA6}\ShellFolder\Attributes = "536870912" setupbeta.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.bz2 KuaiZip.exe Key created \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000_Classes\Kuaizip.003 KuaiZip.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Kuaizip.061\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\快压\\X86\\KuaiZip.exe,0" KuaiZip.exe -
Processes:
ldsgamemaster.exe2345ShellPro.exeupdate.exePowerSaver.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 190000000100000010000000ea6089055218053dd01e37e1d806eedf0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254832000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 190000000100000010000000e843ac3b52ec8c297fa948c9b1fb2819030000000100000014000000e12dfb4b41d7d9c32b30514bac1d81d8385e2d467e0000000100000008000000000063f58926d7011d0000000100000010000000f919b9ccce1e59c2e785f7dc2ccf6708140000000100000014000000daed6474149c143cabdd99a9bd5b284d8b3cc9d86200000001000000200000006fff78e400a70c11011cd85977c459fb5af96a3df0540820d0f4b8607875e58f090000000100000022000000302006082b06010505070303060a2b0601040182370a030406082b060105050703080b000000010000002a0000005300650063007400690067006f0020002800550054004e0020004f0062006a00650063007400290000000f0000000100000014000000f45a0858c9cd920e647bad539ab9f1cfc77f24cb20000000010000006a040000308204663082034ea003020102021044be0c8b500024b411d3362de0b35f1b300d06092a864886f70d0101050500308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a656374301e170d3939303730393138333132305a170d3139303730393138343033365a308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a65637430820122300d06092a864886f70d01010105000382010f003082010a0282010100ceaa813fa3a36178aa31005595119e270f1f1cdf3a9b826830c04a611df12f0efabe79f7a523ef55519684cddbe3b96e3e31d80a2067c7f4d9bf94eb47043e02ce2aa25d870409f6309d188a97b2aa1cfc41d2a136cbfb3d91bae7d97035fae4e790c39ba39bd33cf5129977b1b709e068e61cb8f39463886a6afe0b76c9bef422e467b9ab1a5e77c18507dd0d6cbfee06c7776a419ea70fd7fbee9417b7fc85bea4abc41c31ddd7b6d1e4f0efdf168fb25293d7a1d489a1072ebfe10112421e1ae1d89534db647928ffba2e11c2e5e85b9248fb470bc26cdaad328341f3a5e54170fd65906dfafa51c4f9bd962b19042cd36da7dcf07f6f8365e26aab8786750203010001a381af3081ac300b0603551d0f0404030201c6300f0603551d130101ff040530030101ff301d0603551d0e04160414daed6474149c143cabdd99a9bd5b284d8b3cc9d830420603551d1f043b30393037a035a0338631687474703a2f2f63726c2e7573657274727573742e636f6d2f55544e2d5553455246697273742d4f626a6563742e63726c30290603551d250422302006082b0601050507030306082b06010505070308060a2b0601040182370a0304300d06092a864886f70d01010505000382010100081f52b1374478dbfdceb9da959698aa556480b55a40dd21a5c5c1f35f2c4cc8475a69eae8f03535f4d025f3c8a6a4874abd1bb17308bdd4c3cab635bb59867731cda78014ae13effcb148f96b25252d51b62c6d45c198c88a565d3eee434e3e6b278ed03a4b850b5fd3ed6aa775cbd15a872f3975135a72b002819fbef00f845420626c69d4e14dc60d9943010d12968c789dbf50a2b144aa6acf177acf6f0fd4f824555ff0341649663e5046c96371383162b862b9f353ad6cb52ba212aa194f09da5ee793c68e1408fef0308018a086854dc87dd78b03fe6ed5f79d16ac922ca023e59c91521f94df179473c3b3c1c17105200078bd13521da83ecd001fc8 update.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F8DB7E1C16F1FFD4AAAD4AAD8DFF0F2445184AEB\Blob = 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 PowerSaver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 update.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 5c000000010000000400000000080000190000000100000010000000dc73f9b71e16d51d26527d32b11a6a3d0f000000010000001400000085fef11b4f47fe3952f98301c9f98976fefee0ce7f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030109000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030153000000010000002500000030233021060b6086480186f8450107300130123010060a2b0601040182373c0101030200c06200000001000000200000008d722f81a9c113c0791df136a2966db26c950a971db46b4199f4ea54b78bfb9f1400000001000000140000007b5b45cfafcecb7afd31921a6ab6f346eb5748501d00000001000000100000005b3b67000eeb80022e42605b6b3b72400b000000010000000e00000074006800610077007400650000007e000000010000000800000000c0032f2df8d60103000000010000001400000091c6d6ee3e8ac86384e548c299295c756c817b810400000001000000100000008ccadc0b22cef5be72ac411a11a8d8122000000001000000240400003082042030820308a0030201020210344ed55720d5edec49f42fce37db2b6d300d06092a864886f70d01010505003081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f74204341301e170d3036313131373030303030305a170d3336303731363233353935395a3081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100aca0f0fb8059d49cc7a4cf9da159730910450c0d2c6e68f16c5b4868495937fc0b3319c2777fcc102d95341ce6eb4d09a71cd2b8c9973602b789d4245f06c0cc4494948d02626feb5add118d289a5c8490107a0dbd74662f6a38a0e2d55444eb1d079f07ba6feee9fd4e0b29f53e84a001f19cabf81c7e89a4e8a1d871650da3517beebcd222600db95b9ddfbafc515b0baf98b2e92ee904e86287de2bc8d74ec14c641eddcf8758ba4a4fca68071d1c9d4ac6d52f91cc7c71721cc5c067eb32fdc9925c94da85c09bbf537d2b09f48c9d911f976a52cbde0936a477d87b875044d53e6e2969fb3949261e09a5807b402debe82785c9fe61fd7ee67c971dd59d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e041604147b5b45cfafcecb7afd31921a6ab6f346eb574850300d06092a864886f70d010105050003820101007911c04bb391b6fcf0e967d40d6e45be55e893d2ce033fedda25b01d57cb1e3a76a04cec5076e864720ca4a9f1b88bd6d68784bb32e54111c077d9b3609deb1bd5d16e4444a9a601ec55621d77b85c8e48497c9c3b5711acad73378e2f785c906847d96060e6fc073d222017c4f716e9c4d872f9c8737cdf162f15a93efd6a27b6a1eb5aba981fd5e34d640a9d13c861baf5391c87bab8bd7b227ff6feac4079e5ac106f3d8f1b79768bc437b3211884e53600eb632099b9e9fe3304bb41c8c102f94463209e81ce42d3d63f2c76d3639c59dd8fa6e10ea02e41f72e9547cfbcfd33f3f60b617e7e912b8147c22730eea7105d378f5c392be404f07b8d568c68 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 5c000000010000000400000000100000190000000100000010000000ea6089055218053dd01e37e1d806eedf0300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e0b00000001000000100000005300650063007400690067006f0000001d0000000100000010000000885010358d29a38f059b028559c95f901400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd253000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd9796254830400000001000000100000001bfe69d191b71933a372a80fe155e5b52000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd ldsgamemaster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 2345ShellPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 ldsgamemaster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 ldsgamemaster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 2345ShellPro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 0400000001000000100000008ccadc0b22cef5be72ac411a11a8d81203000000010000001400000091c6d6ee3e8ac86384e548c299295c756c817b817e000000010000000800000000c0032f2df8d6010b000000010000000e00000074006800610077007400650000001d00000001000000100000005b3b67000eeb80022e42605b6b3b72401400000001000000140000007b5b45cfafcecb7afd31921a6ab6f346eb5748506200000001000000200000008d722f81a9c113c0791df136a2966db26c950a971db46b4199f4ea54b78bfb9f53000000010000002500000030233021060b6086480186f8450107300130123010060a2b0601040182373c0101030200c009000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703017f000000010000002a000000302806082b0601050507030206082b0601050507030306082b0601050507030406082b060105050703010f000000010000001400000085fef11b4f47fe3952f98301c9f98976fefee0ce190000000100000010000000dc73f9b71e16d51d26527d32b11a6a3d2000000001000000240400003082042030820308a0030201020210344ed55720d5edec49f42fce37db2b6d300d06092a864886f70d01010505003081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f74204341301e170d3036313131373030303030305a170d3336303731363233353935395a3081a9310b300906035504061302555331153013060355040a130c7468617774652c20496e632e31283026060355040b131f43657274696669636174696f6e205365727669636573204469766973696f6e31383036060355040b132f2863292032303036207468617774652c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79311f301d06035504031316746861777465205072696d61727920526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100aca0f0fb8059d49cc7a4cf9da159730910450c0d2c6e68f16c5b4868495937fc0b3319c2777fcc102d95341ce6eb4d09a71cd2b8c9973602b789d4245f06c0cc4494948d02626feb5add118d289a5c8490107a0dbd74662f6a38a0e2d55444eb1d079f07ba6feee9fd4e0b29f53e84a001f19cabf81c7e89a4e8a1d871650da3517beebcd222600db95b9ddfbafc515b0baf98b2e92ee904e86287de2bc8d74ec14c641eddcf8758ba4a4fca68071d1c9d4ac6d52f91cc7c71721cc5c067eb32fdc9925c94da85c09bbf537d2b09f48c9d911f976a52cbde0936a477d87b875044d53e6e2969fb3949261e09a5807b402debe82785c9fe61fd7ee67c971dd59d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e041604147b5b45cfafcecb7afd31921a6ab6f346eb574850300d06092a864886f70d010105050003820101007911c04bb391b6fcf0e967d40d6e45be55e893d2ce033fedda25b01d57cb1e3a76a04cec5076e864720ca4a9f1b88bd6d68784bb32e54111c077d9b3609deb1bd5d16e4444a9a601ec55621d77b85c8e48497c9c3b5711acad73378e2f785c906847d96060e6fc073d222017c4f716e9c4d872f9c8737cdf162f15a93efd6a27b6a1eb5aba981fd5e34d640a9d13c861baf5391c87bab8bd7b227ff6feac4079e5ac106f3d8f1b79768bc437b3211884e53600eb632099b9e9fe3304bb41c8c102f94463209e81ce42d3d63f2c76d3639c59dd8fa6e10ea02e41f72e9547cfbcfd33f3f60b617e7e912b8147c22730eea7105d378f5c392be404f07b8d568c68 ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 ldsgamemaster.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates\F8DB7E1C16F1FFD4AAAD4AAD8DFF0F2445184AEB PowerSaver.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E ldsgamemaster.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 ldsgamemaster.exe -
NTFS ADS 14 IoCs
Processes:
firefox.exefirefox.exeamigo_setup.exedescription ioc process File created C:\Users\Admin\Downloads\amigo_setup.exe:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\ee74894c73c1cb2cb94487e3def1f537946345f3c7150554c6383e0eb641322c.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\AppData\Local\Temp\amigo_ldir_5008_13786\amigo_setup.exe\:Zone.Identifier:$DATA amigo_setup.exe File created C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.zip:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.zip:Zone.Identifier firefox.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 5000 NOTEPAD.EXE -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 13236 regedit.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exepid process 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2168 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 2168 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 1128 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 1128 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2992 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2992 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 1364 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 1364 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2248 633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe 2248 633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
2345SoftMgr.exetaskmgr.exepid process 9044 2345SoftMgr.exe 21836 taskmgr.exe -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
setupbeta.exe360tray.exepid process 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 632 20952 setupbeta.exe 20952 setupbeta.exe 20952 setupbeta.exe 632 632 632 632 632 21236 360tray.exe 632 632 21236 360tray.exe 21236 360tray.exe 21236 360tray.exe 632 21236 360tray.exe 632 632 632 21236 360tray.exe 632 632 21236 360tray.exe 632 632 21236 360tray.exe 632 632 21236 360tray.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exedc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 2464 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 4364 dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe 8460 MicrosoftEdgeCP.exe 8460 MicrosoftEdgeCP.exe 8460 MicrosoftEdgeCP.exe 8460 MicrosoftEdgeCP.exe 11420 MicrosoftEdgeCP.exe 11420 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exetaskmgr.exefirefox.exe7zG.exe7zG.exe7zG.exe576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe7zG.exe7zG.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exesvchost.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe7zG.exe7zG.exe7zG.exe7zG.exedescription pid process Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2444 firefox.exe Token: SeDebugPrivilege 2248 taskmgr.exe Token: SeSystemProfilePrivilege 2248 taskmgr.exe Token: SeCreateGlobalPrivilege 2248 taskmgr.exe Token: 33 2248 taskmgr.exe Token: SeIncBasePriorityPrivilege 2248 taskmgr.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 3012 7zG.exe Token: 35 3012 7zG.exe Token: SeSecurityPrivilege 3012 7zG.exe Token: SeSecurityPrivilege 3012 7zG.exe Token: SeRestorePrivilege 4188 7zG.exe Token: 35 4188 7zG.exe Token: SeSecurityPrivilege 4188 7zG.exe Token: SeSecurityPrivilege 4188 7zG.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 4116 7zG.exe Token: 35 4116 7zG.exe Token: SeSecurityPrivilege 4116 7zG.exe Token: SeSecurityPrivilege 4116 7zG.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeDebugPrivilege 2308 576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe Token: SeRestorePrivilege 3068 7zG.exe Token: 35 3068 7zG.exe Token: SeSecurityPrivilege 3068 7zG.exe Token: SeSecurityPrivilege 3068 7zG.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 3300 7zG.exe Token: 35 3300 7zG.exe Token: SeSecurityPrivilege 3300 7zG.exe Token: SeSecurityPrivilege 3300 7zG.exe Token: SeShutdownPrivilege 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Token: SeCreatePagefilePrivilege 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Token: SeBackupPrivilege 1404 svchost.exe Token: SeRestorePrivilege 1404 svchost.exe Token: SeSecurityPrivilege 1404 svchost.exe Token: SeTakeOwnershipPrivilege 1404 svchost.exe Token: 35 1404 svchost.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeShutdownPrivilege 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Token: SeCreatePagefilePrivilege 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 684 7zG.exe Token: 35 684 7zG.exe Token: SeSecurityPrivilege 684 7zG.exe Token: SeSecurityPrivilege 684 7zG.exe Token: SeRestorePrivilege 4280 7zG.exe Token: 35 4280 7zG.exe Token: SeSecurityPrivilege 4280 7zG.exe Token: SeSecurityPrivilege 4280 7zG.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 4292 7zG.exe Token: 35 4292 7zG.exe Token: SeSecurityPrivilege 4292 7zG.exe Token: SeSecurityPrivilege 4292 7zG.exe Token: SeDebugPrivilege 3996 firefox.exe Token: SeRestorePrivilege 2296 7zG.exe Token: 35 2296 7zG.exe Token: SeSecurityPrivilege 2296 7zG.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exeamigo_setup.exetaskmgr.exefirefox.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe7zG.exe7zG.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exepid process 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 4772 amigo_setup.exe 4772 amigo_setup.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3012 7zG.exe 4188 7zG.exe 4116 7zG.exe 3068 7zG.exe 3300 7zG.exe 3996 firefox.exe 3996 firefox.exe 684 7zG.exe 4280 7zG.exe 4292 7zG.exe 2296 7zG.exe 4596 7zG.exe 1760 7zG.exe 952 96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe 952 96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe 1092 7zG.exe 3996 firefox.exe 1160 7zG.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exetaskmgr.exefirefox.exe1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exepid process 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 2248 taskmgr.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe 2484 1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
firefox.exeamigo_setup.exefirefox.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exepid process 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 2444 firefox.exe 4772 amigo_setup.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 760 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 4776 10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 4808 45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe 3996 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 2444 2348 firefox.exe firefox.exe PID 2444 wrote to memory of 3908 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 3908 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 4320 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe PID 2444 wrote to memory of 1856 2444 firefox.exe firefox.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
2345ShellPro.exe2345Setting.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 2345ShellPro.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "221" 2345ShellPro.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 2345Setting.exe
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://amigo-light.mail.ru/1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" http://amigo-light.mail.ru/2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2444.0.1014873165\1722729221" -parentBuildID 20200403170909 -prefsHandle 1528 -prefMapHandle 1312 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2444 "\\.\pipe\gecko-crash-server-pipe.2444" 1612 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2444.3.1919806371\1701184956" -childID 1 -isForBrowser -prefsHandle 2224 -prefMapHandle 2220 -prefsLen 122 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2444 "\\.\pipe\gecko-crash-server-pipe.2444" 2196 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2444.13.1338797060\1391366994" -childID 2 -isForBrowser -prefsHandle 3332 -prefMapHandle 3328 -prefsLen 6904 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2444 "\\.\pipe\gecko-crash-server-pipe.2444" 3308 tab3⤵
-
C:\Users\Admin\Downloads\amigo_setup.exe"C:\Users\Admin\Downloads\amigo_setup.exe"1⤵
- Executes dropped EXE
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\amigo_ldir_5008_13786\amigo_setup.exeC:\Users\Admin\AppData\Local\Temp\amigo_ldir_5008_13786\amigo_setup.exe --wi=1 --make-default=1 --attr=obpnff --rfr=900005 --ext_params="old_mr1lad%3D62640b036929c540-0-0-" --cp2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3996.0.458000687\725150672" -parentBuildID 20200403170909 -prefsHandle 1472 -prefMapHandle 1464 -prefsLen 1 -prefMapSize 220401 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3996 "\\.\pipe\gecko-crash-server-pipe.3996" 1536 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3996.3.1342484521\8819339" -childID 1 -isForBrowser -prefsHandle 2360 -prefMapHandle 2160 -prefsLen 448 -prefMapSize 220401 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3996 "\\.\pipe\gecko-crash-server-pipe.3996" 2124 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3996.13.1517388628\539305239" -childID 2 -isForBrowser -prefsHandle 3376 -prefMapHandle 3372 -prefsLen 6604 -prefMapSize 220401 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 3996 "\\.\pipe\gecko-crash-server-pipe.3996" 3388 tab3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\" -spe -an -ai#7zMap3858:190:7zEvent160051⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\" -spe -an -ai#7zMap23380:320:7zEvent99541⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"C:\Users\Admin\Downloads\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450\dc5f7d89ab2465597ff7fa9f544326613aeaab2afa6e2e457ba5fc0da15bd450.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\" -spe -an -ai#7zMap686:190:7zEvent156171⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe"C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\" -spe -an -ai#7zMap54:320:7zEvent256021⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\576c0f0c427bc26f4f32211bb46a7430085cc5dda994f3c1829921d41236cb09\.rsrc\version.txt1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\" -spe -an -ai#7zMap31853:190:7zEvent178911⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg==2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe"C:\Users\Admin\Downloads\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a\10b0165335963104a7e15d665718a2352b52001083d9e9e1bdce140608a0ed5a.exe" /_ShowProgress /PrTxt:TG9hZGluZy4uLg==2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a\" -spe -an -ai#7zMap1757:190:7zEvent156791⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe"C:\Users\Admin\Downloads\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a\633379dbc341f8182833ef8b06c104129b9a8d23a1fc58765f1a8e63f34f545a\" -spe -an -ai#7zMap18014:320:7zEvent91261⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\" -spe -an -ai#7zMap25534:190:7zEvent309111⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe"C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea.exe"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736\" -spe -an -ai#7zMap24003:190:7zEvent94821⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe"C:\Users\Admin\Downloads\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736\7012f1343236610a93c4d1e72f8402f544c570e3b8fd3de1ec37de3e72fa3736.exe"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\" -spe -an -ai#7zMap5646:320:7zEvent21811⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\45e6d9c104370e07cff80f9a65ca36750ae99ca5a14c7ed19c7ffb534b0780ea\.rsrc\version.txt1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d\" -spe -an -ai#7zMap2594:190:7zEvent82441⤵
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe"C:\Users\Admin\Downloads\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d\96634c9a8ec6bf53aa05a1521dc67485f2d03434e8747d058046f089fb0cd01d.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\ee74894c73c1cb2cb94487e3def1f537946345f3c7150554c6383e0eb641322c\" -spe -an -ai#7zMap4217:190:7zEvent251091⤵
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8\" -spe -an -ai#7zMap31832:190:7zEvent112491⤵
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe"C:\Users\Admin\Downloads\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8\1d36ad7531393b119ef8e73253874e7af0f22f20a8072797d6ff243e7bb66bb8.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Error.txt2⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\temp\29608\MJImageConverter_106401.exeC:\Windows\temp\29608\MJImageConverter_106401.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\ProgramData\MJImageConverter\ImgEncodec.dll",ImageCodec23⤵
- Loads dropped DLL
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\MJImageConverter\ImgEncodec.dll",ImageCodec24⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\eCsksh\vrgikx.exe"C:\Users\Admin\AppData\Local\eCsksh\vrgikx.exe" /install /silent2⤵
- Executes dropped EXE
-
C:\Windows\temp\29608\2345pcsafe_100107_duotes.exeC:\Windows\temp\29608\2345pcsafe_100107_duotes.exe /S2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe" --type=install --installtype=new --lockExplorerKB=1 --lockIEState=1 --lock3rdState=1 --lockBrowserState=1 --silent=13⤵
- Executes dropped EXE
- Modifies system certificate store
- System policy modification
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeCenter\2345SafeCenterInstaller.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeCenter\2345SafeCenterInstaller.exe" --type=install --invoke_product=1 --path="C:\Program Files (x86)\2345Soft\" --lockExplorerKB=1 --lockIEState=1 --lock3rdState=1 --lockBrowserState=1 --safe_override=04⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe" --shortcut=notify --from=s --entry=12 --package="C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345softmgr_v5.4.0.11680.7z" --nwinst=14⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe" --install=SoftMgrMenu64.dll5⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ExtShell64.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ExtShell64.exe" --install=AvShellExt64.dll3⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe" --type=installstatic --installtype=new --usertype=UNION --silent=1 --preversion=0.0.0.03⤵
- Executes dropped EXE
-
C:\Windows\temp\29608\wEBWekbEJkyzip282561115scuix001.exeC:\Windows\temp\29608\wEBWekbEJkyzip282561115scuix001.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShell.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShellProp.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\快压\X86\kuaizipUpdateChecker.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShell.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShell.dll4⤵
- Modifies system executable filetype association
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShellProp.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\快压\X64\KuaiZipShellProp.dll4⤵
- Modifies system executable filetype association
-
C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe"C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe" -instsvr3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6440 -s 6164⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe"C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe" -AssociateAll3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8112 -s 6164⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\快压\X86\KZReport.exe"C:\Users\Admin\AppData\Roaming\快压\X86\KZReport.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\temp\29608\2345explorer_100350.exeC:\Windows\temp\29608\2345explorer_100350.exe /S2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
-
C:\Windows\temp\29608\2345explorer_100350.exe"C:\Windows\temp\29608\2345explorer_100350.exe" --release_file3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --lang=zh_cn --no-sandbox --unzip-data="C:\Users\Admin\AppData\Local"3⤵
- Executes dropped EXE
-
C:\Windows\temp\29608\2345explorer_100350.exe"C:\Windows\temp\29608\2345explorer_100350.exe" --install_service --install_sdk=13⤵
- Drops file in Drivers directory
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345Explorer\Protect\ServiceManager.exe"C:\Program Files (x86)\2345Soft\2345Explorer\Protect\ServiceManager.exe" install "C:\Program Files (x86)\2345Soft\2345Explorer\Protect\Protect_2345Explorer.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345Explorer\Assistant\HelperTool64.exe"C:\Program Files (x86)\2345Soft\2345Explorer\Assistant\HelperTool64.exe" --pin_operation=1 --link_path="C:\Users\Admin\Desktop\2345加速浏览器.lnk"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\Assistant\HelperTool64.exe"C:\Program Files (x86)\2345Soft\2345Explorer\Assistant\HelperTool64.exe" --pin_operation=3 --link_path="C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\2345加速浏览器.lnk"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --lang=zh_cn --no-sandbox --send-stat --action=install3⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345SafeCenterInstaller.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345SafeCenterInstaller.exe" --type=install --invoke_product=2 --path="C:\Program Files (x86)\2345Soft" --lockBrowserState=1 --target=23⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\Temp\2345SafeCenterInstaller.exe"C:\Windows\Temp\2345SafeCenterInstaller.exe" --type=uninstall --sub_type=delete_self --invoke_product=6 --path="C:\Program Files (x86)\2345Soft\2345SafeCenter\{AFEACBC6-3B9B-4C01-A4B0-4041FC1647F1}\"4⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --make-default-browser3⤵
- Modifies registry class
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x224,0x228,0x22c,0x230,0x220,0x234,0x64dc14a8,0x64dc14b8,0x64ec14c4,0x64dc14c44⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1272,6323126359355942227,12628383171759467482,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=807ED6FDD2F83D97E9F7242E2D99754D --mojo-platform-channel-handle=1444 --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Windows\temp\29608\HuyaClientInstall260.exeC:\Windows\temp\29608\HuyaClientInstall260.exe2⤵
- Drops startup file
- Drops file in Program Files directory
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Huya.exe/startservicefromsvc3⤵
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Net45\HuyaService.exe"C:\Program Files (x86)\HuyaLive\HuyaClient\Net45\HuyaService.exe" /From_HuyaService4⤵
-
C:\Windows\temp\29608\peBpAkmaZheinote3549984242345x001.exeC:\Windows\temp\29608\peBpAkmaZheinote3549984242345x001.exe -wjm2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s /u C:\Users\Admin\AppData\Roaming\Heinote\hnchecker.dll3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg3⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -install3⤵
- Modifies registry class
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Roaming\Heinote\UserChoise.reg"4⤵
- Runs .reg file with regedit
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNShell64.dll4⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -schedule3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll3⤵
-
C:\Windows\system32\regsvr32.exe/s C:\Users\Admin\AppData\Roaming\Heinote\HNPreview64.dll4⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe"C:\Users\Admin\AppData\Roaming\Heinote\notepaper.exe" -install3⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"3⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\temp\29608\kuwo_jm882.exeC:\Windows\temp\29608\kuwo_jm882.exe2⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\curl.exe"C:\Users\Admin\AppData\Local\Temp\curl.exe" -d MiUwOTxTUkM6TVVTSUNfOS4wLjUuMF9QMlQxfEFDVDpJTlNUQUxMX0lORk98VFlQRTpTdGFydFNldHVwfFRDb3VudDoyNDIxMzcxNDB8e2t1d29fam04ODIuZXhlfXxVOnxNQUM6RDZERDBFQUFFOTRDPg== http://log.kuwo.cn/music.yl -o C:\Users\Admin\AppData\Local\Temp\kuwomsglog.txt3⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwService.exe" 酷我核心服务 ENABLE3⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwMusic.exe" 酷我音乐 ENABLE3⤵
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\RegTpData.dll" runDll MUSIC_9.0.5.0_P2T13⤵
- Blocklisted process makes network request
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\Temp\curl.exe"C:\Users\Admin\AppData\Local\Temp\curl.exe" -d MiUwOTxTUkM6TVVTSUNfOS4wLjUuMF9QMlQxfEFDVDpJTlNUQUxMX1NIRUxMfFRZUEU6UmVnVHBEYXRhfFNVQzoxfFRDb3VudDoyNDIxNTk2NTZ8e2t1d29fam04ODIuZXhlfXxVOnxNQUM6RDZERDBFQUFFOTRDPg== http://log.kuwo.cn/music.yl -o C:\Users\Admin\AppData\Local\Temp\kuwomsglog.txt3⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwMusic.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwMusic.exe" /autorun /nologauto3⤵
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwService.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwService.exe"4⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwWebKit.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwWebKit.exe" --type=renderer --disable-gpu-compositing --no-sandbox --enable-begin-frame-scheduling --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --enable-system-flash --enable-pinch --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=1 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-gpu-compositing --channel="17244.0.1572461965\1449487497" /prefetch:6731311514⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\WriteMbox.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\WriteMbox.exe"4⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KWUpdate.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KWUpdate.exe" /kwsid=63440682 /kwver=MUSIC_9.0.5.0_P2T14⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwConfig.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwConfig.exe"4⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwUACSet.exe--unzipnetsong4⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\WriteMbox.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\WriteMbox.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\curl.exe"C:\Users\Admin\AppData\Local\Temp\curl.exe" -d MiUwOTxTUkM6TVVTSUNfOS4wLjUuMF9QMlQxfEFDVDpJTlNUQUxMX0lORk98U3VjOjF8RGlzcGxheUNvbXBsZXRlUGFnZTowfEhhc1Nob3dDaGVjazowfEhhc1VuQ2hlY2s6MHxIYXNTdGFydE11c2ljQm94OjB8RXhjcHRpb25BYm9ydDowLjJ8U0tJUFRZUEU6MHxBdXRvUnVuOjF8U3RhZ2U6OTN8SW5zdGFsbFRpY2s6MjQyMTUxNjg3fEV4aXRUeXBlOjF8VVVJRDpFRENBQjMyRkJGQTk0RjRBQjE4RjJGMzlDNzVFMDAwNTMvcUNGbytmZlhLQXR4NE44Mnd4TnVUdFA1UFplajR6fFRDb3VudDoyNDIxNjA3OTZ8e2t1d29fam04ODIuZXhlfXxVOnxNQUM6RDZERDBFQUFFOTRDPg== http://log.kuwo.cn/music.yl -o C:\Users\Admin\AppData\Local\Temp\kuwomsglog.txt3⤵
-
C:\Windows\temp\29608\LDSGameMasterInstRoad_210901.exeC:\Windows\temp\29608\LDSGameMasterInstRoad_210901.exe2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\ldsgamemaster.exe"C:\Users\Admin\AppData\Local\Temp\ldsgamemaster.exe" /PID="210901" /S /FROM=inst3⤵
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies system certificate store
-
C:\MobileEmuMaster\SoftMgr\SoftMgrInst.exe"C:\MobileEmuMaster\SoftMgr\SoftMgrInst.exe" --hwnd=1573168 --from=LDSGameMaster --new=true --log4⤵
-
C:\MobileEmuMaster\Utils\MobileEmuHelper.exeC:\MobileEmuMaster\Utils\MobileEmuHelper.exe4⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\RegSvr32.exe"C:\Windows\System32\RegSvr32.exe" /s /i "C:\MobileEmuMaster\Plugin\ShellExt_x64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s /i "C:\MobileEmuMaster\Plugin\ShellExt_x64.dll"5⤵
-
C:\Windows\SysWOW64\RegSvr32.exe"C:\Windows\System32\RegSvr32.exe" /s /i "C:\MobileEmuMaster\GameMemoryOpt_x64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s /i "C:\MobileEmuMaster\GameMemoryOpt_x64.dll"5⤵
-
C:\MobileEmuMaster\LDSGameHall\LDSGameHall.exe"C:\MobileEmuMaster\LDSGameHall\LDSGameHall.exe" /DisplayMode="hide" /From="inst" /HideBoot /NewInstall /PID="210901" /Push /SubPID="210901"4⤵
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
-
C:\MobileEmuMaster\update.exe"C:\MobileEmuMaster\update.exe" checkupdate5⤵
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
-
C:\Windows\SysWOW64\Dism.exe/Online /Get-FeatureInfo:Microsoft-Hyper-V5⤵
-
C:\MobileEmuMaster\LDSGameHall\LDSGameRun.exe"C:\MobileEmuMaster\LDSGameHall\LDSGameRun.exe"5⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\LuDaShi\Utils\LdsHelper.exe"C:\Program Files (x86)\LuDaShi\Utils\LdsHelper.exe"4⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\BirdWallpaper\Utils\BirdHelper.exe"C:\Program Files (x86)\BirdWallpaper\Utils\BirdHelper.exe"4⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" "C:\Program Files (x86)\BirdWallpaper\wallpaperhelper\ComputerZ8_x64.dll" /s4⤵
-
C:\Windows\system32\regsvr32.exe"C:\Program Files (x86)\BirdWallpaper\wallpaperhelper\ComputerZ8_x64.dll" /s5⤵
- Modifies registry class
-
C:\Program Files (x86)\HaloDesktop\Utils\HaloHelper.exe"C:\Program Files (x86)\HaloDesktop\Utils\HaloHelper.exe"4⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\MasterPDF\PDFRunningHelper.exe"C:\Program Files (x86)\MasterPDF\PDFRunningHelper.exe" /enableServer4⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s "C:\Program Files (x86)\MasterPDF\XDShellExtHelper64.dll"5⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4381⤵
-
C:\Users\Admin\AppData\Local\eCsksh\vrgikx.exeC:\Users\Admin\AppData\Local\eCsksh\vrgikx.exe1⤵
- Executes dropped EXE
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043\" -spe -an -ai#7zMap25108:190:7zEvent228171⤵
-
C:\Users\Admin\Downloads\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043.exe"C:\Users\Admin\Downloads\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043\70f90541f85877063ddc79f0115e2b44f862cebcbb41be36c7d87bc7a6471043.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterSvc.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterSvc.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterCrashReport.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterCrashReport.exe" --crashtype=Driver3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterInstaller.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterInstaller.exe" --type=after_upgrade --invoke_product=63⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\System32\ipconfig.exe" /flushdns3⤵
- Gathers network information
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe" --shortcut=notify --from=s --entry=1 --intval=3603⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe" --install=SoftMgrMenu64.dll4⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterUpdate.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterUpdate.exe" --type=default3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterInstaller.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345SafeCenterInstaller.exe" --type=repairfiles --target=normally2⤵
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeSvc.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeSvc.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeTray.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeTray.exe" --type=logonauto --sf=12⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ShellPro.exe" --type=repair3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe" --type=repairfiles --target=normally4⤵
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345RTProtect.exe"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345NightMode.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345NightMode.exe" --type=silent --switch=enable3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ManuUpdate.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ManuUpdate.exe" --type=manusaferepair3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe" --type=default3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345Setting.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345Setting.exe" --type=active --activeid=default3⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- System policy modification
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345ProtectManager.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345ProtectManager.exe" --type=active --tbid=2 --lf=3 --activeid=14⤵
- Executes dropped EXE
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345MPCSafe.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345MPCSafe.exe" --type=active --activeid=exam --start=03⤵
- Modifies firewall policy service
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ManuUpdate.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345ManuUpdate.exe" --type=manusaferepair4⤵
-
C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345VirusScan.exe"C:\Program Files (x86)\2345Soft\2345SafeCenter\6.12.1.10076\2345VirusScan.exe"4⤵
-
C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe"C:\Program Files (x86)\2345Soft\2345PCSafe\6.12.1.13307\2345SafeUpdate.exe" --type=repairfiles --target=normally2⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31\" -spe -an -ai#7zMap29599:190:7zEvent28781⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k kuaizipupdatesvc1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k kuaizipupdatesvc1⤵
-
C:\Users\Admin\Downloads\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe"C:\Users\Admin\Downloads\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31\09d2a852e68ae253edf08115b438c11ea8dc168bff12a392fa1c9928c7889a31.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" -- "http://laserveradedomaina.com/redirect/57a764d042bf8"2⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x20c,0x210,0x214,0x218,0x208,0x21c,0x610814a8,0x610814b8,0x611814c4,0x610814c43⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=943CA31AE40BFB317A23A395C8D062D5 --mojo-platform-channel-handle=1264 --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --service-pipe-token=8C9AAB0B895676228FFADAF7B7329E48 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=8C9AAB0B895676228FFADAF7B7329E48 --renderer-client-id=4 --mojo-platform-channel-handle=2500 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --service-pipe-token=62C865A420C8A22E932ED247EA0F9FF4 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=62C865A420C8A22E932ED247EA0F9FF4 --renderer-client-id=6 --mojo-platform-channel-handle=3060 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --service-pipe-token=6FBE3186F4E7EDE7C238E46898CD2152 --lang=zh-CN --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=6FBE3186F4E7EDE7C238E46898CD2152 --renderer-client-id=3 --mojo-platform-channel-handle=3364 /prefetch:13⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe"C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe" --type=utility --action=upgrade3⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --not_main --force-visible-status-icon-on-win10-2345 --status-icon-id=43⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x20c,0x210,0x214,0x218,0x208,0x21c,0x610814a8,0x610814b8,0x611814c4,0x610814c44⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1256,3393724588493138875,10252467347597635856,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=78669AE8F7E0ADE42E24000763020459 --mojo-platform-channel-handle=1276 --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7708 -s 12444⤵
- Program crash
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --disable-gpu-compositing --service-pipe-token=261B37B8B15375D136511E09D278F67A --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=261B37B8B15375D136511E09D278F67A --renderer-client-id=7 --mojo-platform-channel-handle=6632 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1236,7771441629066351894,2407714111372293324,131072 --disable-gpu-sandbox --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=0AD42A0CBFEB977021D8A8ED9808C7F6 --mojo-platform-channel-handle=3536 /prefetch:23⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --no-sandbox --lang --upgrade /prefetch:83⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe"C:\Users\Admin\AppData\Roaming\快压\X86\KuaiZip.exe" "C:\Users\Admin\Downloads\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.zip"1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8340 -s 5882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8340 -s 15322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8340 -s 15242⤵
- Program crash
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86\" -spe -an -ai#7zMap20987:190:7zEvent277871⤵
-
C:\Users\Admin\Downloads\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.exe"C:\Users\Admin\Downloads\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86\83b5a1c76aac0d4e299208dbc4af02f8427f5e3a2d1c3ebdb74f6baa6538bc86.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9F8F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\9F8F.tmp.exe" --stid="" --onl2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6960 -s 12683⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c taskkill /f /pid 6960 & for /l %x in (1,1,60) do ( ping 127.0.0.1 -n 2 -w 500 & del /q /f "C:\Users\Admin\AppData\Local\Temp\9F8F.tmp.exe" & if not exist "C:\Users\Admin\AppData\Local\Temp\9F8F.tmp.exe" ( exit ) )3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 69604⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 2 -w 5004⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe" --shortcut=softmgr --from=cx --entry=51⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\2345SoftMgr.exe" --shortcut=update --from=f --entry=112⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe"C:\Users\Admin\AppData\Roaming\SoftMgr_2345\Application\5.4.0.11680\2345SoftMgrShell64.exe" --install=SoftMgrMenu64.dll2⤵
- Modifies system executable filetype association
- Executes dropped EXE
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Modifies registry class
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\Protect\Protect_2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\Protect\Protect_2345Explorer.exe"1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\2345Soft\2345Explorer\Protect\2345MiniPage.exe"C:\Program Files (x86)\2345Soft\2345Explorer\Protect\2345MiniPage.exe" --from=B --entry=12⤵
- Modifies Internet Explorer settings
-
C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe"C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe" --type=utility --action=upgrade3⤵
-
C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe"C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe" --type=utility --action=upgrade3⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x44c1⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --shortcut=desktop1⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x20c,0x210,0x214,0x218,0x208,0x21c,0x64dc14a8,0x64dc14b8,0x64ec14c4,0x64dc14c42⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=B485610D3E9D5E12796E25DAEF4D4E46 --mojo-platform-channel-handle=1252 --ignored=" --type=renderer " /prefetch:22⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --no-sandbox --service-request-channel-token=6B78FF2C6BAC22ED20BE811DE1B2143D --mojo-platform-channel-handle=2360 /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --service-pipe-token=B931659EE29023E9C7BA9A1B58FF4DBD --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=B931659EE29023E9C7BA9A1B58FF4DBD --renderer-client-id=4 --mojo-platform-channel-handle=2640 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --service-pipe-token=6E26C6230427F5CA10671996C3CE0D3E --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=6E26C6230427F5CA10671996C3CE0D3E --renderer-client-id=5 --mojo-platform-channel-handle=3428 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --service-pipe-token=3D60181F6189791B406EC66406C99819 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=3D60181F6189791B406EC66406C99819 --renderer-client-id=6 --mojo-platform-channel-handle=3448 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --service-pipe-token=F7A44056813D53A1E478402F06CA4465 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=F7A44056813D53A1E478402F06CA4465 --renderer-client-id=7 --mojo-platform-channel-handle=3488 /prefetch:12⤵
- Checks computer location settings
-
C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe"C:\Users\Admin\AppData\Roaming\GameHall_2345\2345GameHall.exe" --type=utility --action=upgrade2⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --disable-gpu-sandbox --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=4E0605E789A611F307888F8D98A8587E --mojo-platform-channel-handle=6200 /prefetch:22⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --disable-gpu-compositing --service-pipe-token=1CB0EEA9454765B05AE486057F652F42 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=1CB0EEA9454765B05AE486057F652F42 --renderer-client-id=9 --mojo-platform-channel-handle=6176 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --no-sandbox --service-request-channel-token=7150ACAFFDEAE051189A56383B34673B --mojo-platform-channel-handle=4480 /prefetch:82⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --disable-gpu-compositing --service-pipe-token=B5DD0D0C2D09428BF62F328B32A8AE77 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=B5DD0D0C2D09428BF62F328B32A8AE77 --renderer-client-id=11 --mojo-platform-channel-handle=6196 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --no-sandbox --lang --upgrade /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=D21188487F0F4D704CDB6174810ED6C8 --mojo-platform-channel-handle=5860 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=7033701F48410BB94FF84C20C9166EFA --mojo-platform-channel-handle=4996 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=C4DE9C47EBE9BDEEB2DA2A08236C01CC --mojo-platform-channel-handle=6872 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=07D14F88441A2023CB4DAF8F1F0E7AFC --mojo-platform-channel-handle=5936 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=CB099F18EE8C1B3296BC46252587D4BA --mojo-platform-channel-handle=7008 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --disable-gpu-compositing --service-pipe-token=9AA8EBFD11F5BEAFE30F349408CDB9ED --lang=zh-CN --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=9AA8EBFD11F5BEAFE30F349408CDB9ED --renderer-client-id=17 --mojo-platform-channel-handle=7104 /prefetch:12⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --lang=zh-CN --service-sandbox-type=utility --service-request-channel-token=6A89D018D59990FEBF8158510D7BFD4A --mojo-platform-channel-handle=4664 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1232,2480874022340948737,17492369275312440179,131072 --disable-gpu-compositing --service-pipe-token=6849354C4EC019E522A0E098A4DD7119 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=6849354C4EC019E522A0E098A4DD7119 --renderer-client-id=5 --mojo-platform-channel-handle=4896 /prefetch:12⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --shortcut=desktop1⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x20c,0x210,0x214,0x218,0x208,0x21c,0x64dc14a8,0x64dc14b8,0x64ec14c4,0x64dc14c42⤵
-
C:\Users\Admin\AppData\Roaming\快压\X86\Update.exeC:\Users\Admin\AppData\Roaming\快压\X86\Update.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13488 -s 7682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13488 -s 7602⤵
- Program crash
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Huya.exe"C:\Program Files (x86)\HuyaLive\HuyaClient\Huya.exe"1⤵
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Net45\HuyaService.exe"C:\Program Files (x86)\HuyaLive\HuyaClient\Net45\HuyaService.exe" /From_huya_client2⤵
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Net45\HuyaClient.exe"Net45/HuyaClient.exe"2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\HuyaLive\HuyaClient\Player\huyaplayerModule.exe"C:\Program Files (x86)\HuyaLive\HuyaClient\Player\huyaplayerModule.exe" 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3⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k HEINOTEUPDATE1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k HEINOTEUPDATE1⤵
- Modifies data under HKEY_USERS
-
C:\users\admin\appdata\roaming\heinote\hnote.exe"C:\users\admin\appdata\roaming\heinote\hnote.exe" -fix2⤵
-
C:\users\admin\appdata\roaming\heinote\hnote.exe"C:\users\admin\appdata\roaming\heinote\hnote.exe" -fix3⤵
-
\??\c:\users\admin\appdata\roaming\heinote\skinbox.exec:\users\admin\appdata\roaming\heinote\skinbox.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15136 -s 4483⤵
- Program crash
-
\??\c:\users\admin\appdata\roaming\heinote\skinbox.exec:\users\admin\appdata\roaming\heinote\skinbox.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15496 -s 4523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15496 -s 4443⤵
- Program crash
-
\??\c:\users\admin\appdata\roaming\heinote\skinbox.exec:\users\admin\appdata\roaming\heinote\skinbox.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\skinbox.exec:\users\admin\appdata\roaming\heinote\skinbox.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15576 -s 4523⤵
- Program crash
-
\??\c:\users\admin\appdata\roaming\heinote\skinbox.exec:\users\admin\appdata\roaming\heinote\skinbox.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15500 -s 4523⤵
- Program crash
-
\??\c:\users\admin\appdata\roaming\heinote\feedback.exec:\users\admin\appdata\roaming\heinote\feedback.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\feedback.exec:\users\admin\appdata\roaming\heinote\feedback.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\feedback.exec:\users\admin\appdata\roaming\heinote\feedback.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\feedback.exec:\users\admin\appdata\roaming\heinote\feedback.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\readmode.exec:\users\admin\appdata\roaming\heinote\readmode.exe -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\feedback.exec:\users\admin\appdata\roaming\heinote\feedback.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\readmode.exec:\users\admin\appdata\roaming\heinote\readmode.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\readmode.exec:\users\admin\appdata\roaming\heinote\readmode.exe -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\readmode.exec:\users\admin\appdata\roaming\heinote\readmode.exe -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\readmode.exec:\users\admin\appdata\roaming\heinote\readmode.exe -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\Update.exec:\users\admin\appdata\roaming\heinote\Update.exe -param=dfCYNNpbbFHijXbhxQ==2⤵
-
\??\c:\users\admin\appdata\roaming\heinote\Report.exec:\users\admin\appdata\roaming\heinote\Report.exe -param=dfCYNNpba0T2g3DwxQ==2⤵
- Writes to the Master Boot Record (MBR)
-
\??\c:\users\admin\appdata\roaming\heinote\upgrade.exec:\users\admin\appdata\roaming\heinote\upgrade.exe -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12344 -s 4763⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 12344 -s 4683⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14824 -s 4523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14824 -s 3843⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14792 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14792 -s 4403⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13704 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 13704 -s 4403⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14952 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14952 -s 4203⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14604 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14604 -s 4403⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14944 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14944 -s 4403⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14308 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 14308 -s 4243⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -assoc1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15752 -s 4522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15752 -s 4442⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16120 -s 4522⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 16120 -s 4442⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Update.exe"C:\Users\Admin\AppData\Roaming\Heinote\Update.exe" -param=dfCYNNpbbFHijXbhxQ==1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Update.exe"C:\Users\Admin\AppData\Roaming\Heinote\Update.exe" -param=dfCYNNpbbFHijXbhxQ==1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15948 -s 4482⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 15948 -s 4402⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=1⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\kwmusic.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\kwmusic.exe"1⤵
-
C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwMusic.exe"C:\Program Files (x86)\kuwo\kuwomusic\9.0.5.0_P2T1\bin\KwMusic.exe" "C:\Users\Admin\Desktop\DenyCompress.wav"1⤵
-
\??\c:\windows\syswow64\svchost.exec:\windows\syswow64\svchost.exe -k netsvcs -s WpSvc1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exeC:\Users\Admin\AppData\Roaming\Heinote\hnote.exe -fix1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe" -fix2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\update.exeC:\Users\Admin\AppData\Roaming\Heinote\update.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21200 -s 7202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21200 -s 6882⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"C:\Users\Admin\AppData\Roaming\Heinote\hnote.exe"1⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"C:\Users\Admin\AppData\Roaming\Heinote\Report.exe"2⤵
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18988 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 18988 -s 3843⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21192 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21192 -s 4683⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21176 -s 4483⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21176 -s 4683⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21000 -s 4523⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 21000 -s 4443⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe"C:\Users\Admin\AppData\Roaming\Heinote\skinbox.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe"C:\Users\Admin\AppData\Roaming\Heinote\upgrade.exe" -param=2HQ9sxfXzleBicXpT3jVJdvTT+s=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=J0Z6kgD1zknZAicYsqHVd8fzx6Ss2F5TuzzqeMSgKA6YPU6Xt6zXO0MrAQ45ya2aNIjfr2zLkCy2uObLyM0jXJ5b2Jdy2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVpwoBoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe"C:\Users\Admin\AppData\Roaming\Heinote\readmode.exe" -param=eDLeEO7WpbvmB2m0F4X+sXBg0VxBpcbdDN+BHvdMU+SlooOFbdptBzYiF1YCrj0JiBCL829mAx7u+pEishBKDXYA2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=UyHMS8M5Tqo1P7by74nKxImB66tWWqsPLcByb/6jqW76ozONW75q9ToNpmuLtbgnjx1EM1+znraeK1YgQbDh2⤵
-
C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe"C:\Users\Admin\AppData\Roaming\Heinote\feedback.exe" -param=OXVRw+SMTwb/opEpTejFGM43N8gtRLQEoYzVvBsLoeOoTOlh6R5ZEEjGY2Pw7SFHY4mOVvkDvQ3dVjtmjVQ=2⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Program Files (x86)\BirdWallpaper\Utils\BirdPreview.exe"C:\Program Files (x86)\BirdWallpaper\Utils\BirdPreview.exe"1⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" -- "http://down.360safe.com/setupbeta.exe"2⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0xa0,0x94,0x98,0x90,0x9c,0x1f8,0x60cc14a8,0x60cc14b8,0x60dc14c4,0x60cc14c43⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1220,17134880264831425199,17224501830063453178,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=94EC76A5B7F50F80CFE5F055F80794FD --mojo-platform-channel-handle=1240 --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1220,17134880264831425199,17224501830063453178,131072 --service-pipe-token=1FEC9601F73879BBEF5196817E9B19A7 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=1FEC9601F73879BBEF5196817E9B19A7 --renderer-client-id=4 --mojo-platform-channel-handle=2548 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1220,17134880264831425199,17224501830063453178,131072 --service-pipe-token=7D3BD274B4178F5E1477215F6F6FC608 --lang=zh-CN --extension-process --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=7D3BD274B4178F5E1477215F6F6FC608 --renderer-client-id=3 --mojo-platform-channel-handle=2960 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=renderer --field-trial-handle=1220,17134880264831425199,17224501830063453178,131072 --disable-gpu-compositing --service-pipe-token=7FF5FC7DE926C5C29EF57EC49B0995F7 --lang=zh-CN --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=1 --service-request-channel-token=7FF5FC7DE926C5C29EF57EC49B0995F7 --renderer-client-id=5 --mojo-platform-channel-handle=4880 /prefetch:13⤵
- Checks computer location settings
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --not_main --force-visible-status-icon-on-win10-2345 --status-icon-id=43⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe"C:\Program Files (x86)\2345Soft\2345Explorer\crashpad_helper.exe" --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\2345Explorer\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\2345Explorer\User Data" --url=https://dump.2345.com/upload.php --annotation=plat=Win32 --annotation=prod=2345Explorer --annotation=ver=10.17.0.21258 --initial-client-data=0x20c,0x210,0x214,0x218,0x208,0x21c,0x60cc14a8,0x60cc14b8,0x60dc14c4,0x60cc14c44⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1224,3835372440843546408,17410442372999265907,131072 --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=6956538663F3684EBE2C0379C7F2437C --mojo-platform-channel-handle=1244 --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 23024 -s 12924⤵
- Program crash
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=gpu-process --field-trial-handle=1220,17134880264831425199,17224501830063453178,131072 --disable-gpu-sandbox --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=FBA8223A531FF6B0981DDD3BCA027FA7 --mojo-platform-channel-handle=4900 /prefetch:23⤵
-
C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe"C:\Program Files (x86)\2345Soft\2345Explorer\2345Explorer.exe" --type=utility --no-sandbox --lang --upgrade /prefetch:83⤵
-
C:\2345Downloads\setupbeta.exe"C:\2345Downloads\setupbeta.exe"3⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Adds Run key to start application
- Checks for any installed AV software in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: LoadsDriver
-
C:\Users\Admin\AppData\Local\Temp\{3BBE2E3E-66E3-4b7a-B77A-283739D9DAAE}.tmp\AgreementViewer.exe"C:\Users\Admin\AppData\Local\Temp\{3BBE2E3E-66E3-4b7a-B77A-283739D9DAAE}.tmp\AgreementViewer.exe" /Content="C:\Users\Admin\AppData\Local\Temp\{3BBE2E3E-66E3-4b7a-B77A-283739D9DAAE}.tmp\licence.rtf" /Title="360安全卫士安装许可使用协议"4⤵
-
C:\Users\Admin\AppData\Local\Temp\{A3277847-44EF-4d65-8737-1BA83E71C43C}.tmp\WscReg.exe"C:\Users\Admin\AppData\Local\Temp\{A3277847-44EF-4d65-8737-1BA83E71C43C}.tmp\WscReg.exe" /regas:1_14⤵
- Modifies security service
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\360Safe\Utils\shell360ext64.dll"4⤵
- Modifies system executable filetype association
- Modifies registry class
-
C:\Windows\System32\bcdedit.exe"C:\Windows\Sysnative\bcdedit.exe" /set flightsigning on4⤵
- Modifies boot configuration data using bcdedit
-
C:\Program Files (x86)\360\360Safe\Utils\360seclogon\360SecLogonHelper.exe"C:\Program Files (x86)\360\360Safe\Utils\360seclogon\360SecLogonHelper.exe"4⤵
- Writes to the Master Boot Record (MBR)
-
C:\Windows\System32\bcdedit.exe"C:\Windows\Sysnative\bcdedit.exe" /set {bootmgr} flightsigning on4⤵
- Modifies boot configuration data using bcdedit
-
C:\Program Files (x86)\360\360Safe\safemon\PopWndTracker.exe"C:\Program Files (x86)\360\360Safe\safemon\PopWndTracker.exe" /query4⤵
-
C:\Program Files (x86)\360\360Safe\softmgr\EaInstHelper.exe"C:\Program Files (x86)\360\360Safe\softmgr\EaInstHelper.exe" /Install4⤵
-
C:\Program Files (x86)\360\360Safe\softmgr\EaInstHelper64.exe"C:\Program Files (x86)\360\360Safe\softmgr\EaInstHelper64.exe" /Install4⤵
-
C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /Install4⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\360Safe\safemon\safemon64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\360\360Safe\safemon\safemon64.dll"5⤵
-
C:\Program Files (x86)\360\360Safe\Utils\PowerSaver.exe"C:\Program Files (x86)\360\360Safe\Utils\PowerSaver.exe" /flightsigning4⤵
- Modifies system certificate store
-
C:\Program Files (x86)\360\360Safe\Utils\PowerSaver.exe"C:\Program Files (x86)\360\360Safe\Utils\PowerSaver.exe" /HImmu4⤵
-
C:\Program Files (x86)\360\360Safe\360Safe.exe"C:\Program Files (x86)\360\360Safe\360Safe.exe" /setup_or_firstrun4⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
-
C:\Program Files (x86)\360\360Safe\360leakfixer.exe"C:\Program Files (x86)\360\360Safe\360leakfixer.exe" /safeinit /pid=215805⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\360\360Safe\utils\360UHelper.exe"C:\Program Files (x86)\360\360Safe\utils\360UHelper.exe" \from=safe \page=download \url=http://static.360.cn/qucexp/safe/SafeTabTip13.cab \param=-d C:\Program Files (x86)\360\360Safe\Config\newui\themes\default\advisetip\ -t=35001 -s=10000 -n=4605225⤵
-
C:\Program Files (x86)\360\360Safe\LiveUpdate360.exe"C:\Program Files (x86)\360\360Safe\LiveUpdate360.exe" /s6⤵
-
C:\Program Files (x86)\360\360Safe\safemon\360tray.exe"C:\Program Files (x86)\360\360Safe\safemon\360tray.exe" /TrayInstall /clean /showtrayicon4⤵
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks computer location settings
- Checks whether UAC is enabled
- Enumerates connected drives
- Maps connected drives based on registry
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: LoadsDriver
-
C:\Program Files (x86)\360\360Safe\SoftMgr\SML\SoftMgrLite.exe"C:\Program Files (x86)\360\360Safe\SoftMgr\SML\SoftMgrLite.exe"5⤵
- Writes to the Master Boot Record (MBR)
-
C:\Program Files (x86)\360\360Safe\SoftMgr\SML\SMLProxy64.exe"C:\Program Files (x86)\360\360Safe\SoftMgr\SML\SMLProxy64.exe" /64BitLauncher=Install6⤵
-
C:\Program Files (x86)\360\360Safe\Utils\360IA.exe"C:\Program Files (x86)\360\360Safe\Utils\360IA.exe" /src=probe /dpi=965⤵
-
C:\Program Files (x86)\360\360Safe\SoftMgr\AdvUtils.exe"C:\Program Files (x86)\360\360Safe\SoftMgr\AdvUtils.exe" /IsUniDpi /hWnd=5916305⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\360\360Safe\safemon\safemon64.dll"5⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\360\360Safe\safemon\safemon64.dll"6⤵
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\360\360Safe\safemon\safemon.dll"5⤵
-
C:\Program Files (x86)\360\360Safe\SoftMgr\SoftupNotify.exe"C:\Program Files (x86)\360\360Safe\SoftMgr\SoftupNotify.exe" /install4⤵
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\360Safe\SoftMgr\SoftMgrExt64.dll"5⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\360\360Safe\SoftMgr\SoftMgrExt64.dll"6⤵
- Modifies system executable filetype association
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\360Safe\SoftMgr\SMWebProxy.dll"5⤵
-
C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /Start4⤵
-
C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"1⤵
- Modifies data under HKEY_USERS
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3a70855 /state1:0x41c64e6d1⤵
-
\??\c:\windows\syswow64\svchost.exec:\windows\syswow64\svchost.exe -k netsvcs -s DesktopSvc1⤵
-
\??\c:\windows\syswow64\svchost.exec:\windows\syswow64\svchost.exe -k netsvcs -s HpSvc1⤵
-
\??\c:\windows\syswow64\svchost.exec:\windows\syswow64\svchost.exe -k netsvcs -s SpSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
3Change Default File Association
1Registry Run Keys / Startup Folder
4Bootkit
1Defense Evasion
Modify Registry
10Virtualization/Sandbox Evasion
2Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\06FC6B818235493BBBEC2B9CE6991189E8621F0CFilesize
213KB
MD5fb531dc6dd30a13cc0b1af9c02243277
SHA1b3d65d2b81f57c8e513100263bb65da952597ea7
SHA2565e3339acede47ab600c97ac9d080d370092f2bdf1ea0e258c27791d6b93d1c6b
SHA5124befa1e6c77a839e92e689e8411b72131019639c847575de2576d27806d2410eb5785434cda5f9a4b2857ea822858c00be96c5183bf0d1e8d551ff411519c2f5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\075194AE83D023F67C9C5C20DB6543A9D0E02049Filesize
220KB
MD527a153569cd66cecffe89d370c8d2c11
SHA141628558e892648eebf33e01896568534c15d95c
SHA256bebcee94cea7d49e79c7253a3497b3850c529fb127bb8e6dc2a1defb1ae95ea2
SHA512b871419b1db301dd936ed919be4bcf913e148cbb708550a0e2c1d788ba202cc916edab62aad21588bfe9dbbc71ff7bcb3b2dd052e2a6e4f954d0bf109dcbfab6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\0BAB0C836149B5E6E79B55F5F5EA347931BCA4CBFilesize
1KB
MD5177c24f848eb56e16d5dc42c784855b1
SHA1ffc8ccbd374bb644aa4a4a77a9d45268b922e836
SHA25669d5272db7084279c3028ced1cd327e54d0027df213f89a83d89abd8dd0124d2
SHA512b59461d8962e3f13f279b07d1f3c9fb7c25d27db02b75bebff36319a9b7af0cc18b7bcc9a3c82b587b3f79483dbdf07a85a2fffb1d0cb51c4a2e304f9f5d00bd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\1274EFFCFBD5A0ACB13DC21229761071B763BD22Filesize
1KB
MD542cd544b31b2922a08c1859886c1fdd7
SHA18e51eb795de0ff9d23585c678921eded2a499afe
SHA256be5d29d0689cc16eb2df4efd47ac0b58a7a9335d347f319db32eafdbebdc5665
SHA51248ca65811bbf2f190c5a74d9a6f774cef2451b3c280be3880bf0b57f8dedf5082eb2df92991fe933bbc766a2a8c91b3ddea9df0c89a4c0cec30fdb1e1ae3de63
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\1C8CBD7AB6D54530CDE7FD60DBF2F63F9E388D6DFilesize
18KB
MD5f67b593332b0bbca95486d075ff08604
SHA1c2a2db77dec87d0aec18faccae3b03a8cba5002f
SHA25684028a9f44ce94e9d50db568c282bba9f11f5d6896a5a11c318b22ff34bfdb7e
SHA51200ed2b293c3e63f8a2126dd2ef6cd37d7ae0f8d01c3d54400fb15a7682bbe4d3ccbb35115dbc1498526b9c724f9d7f5c2cb87887a439f6289d006802f4c78feb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\21A994537757BA58EF0DDE687AD3C6D63886BBC6Filesize
1KB
MD52f00cbb96cc0fd4c05512b6ed096e09b
SHA1d6b8d7daaa280efa10ea9b51a63f1d588134c50a
SHA25620a303c52841df0d1208d4accd29f51adc93057e87255209d51dadb0b92a5cdc
SHA512726987fc5a8b4f899018b9ad5a1a4472be78154a7a8592a7bbcd3696fe2375c987dd3161d46df5fdf8a45c77d74876b55ed009956e65d6c7c441b00e5d38a92e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\235D7C112869138E88EB456F003689E9F0373C02Filesize
220KB
MD53def776d0626dff406a6b452ea92e39a
SHA1aacb008120867b98de26c7dcb84a9a2aafbc38b3
SHA256cc4fd70d2a2547150a5b9501e5818482e948309b61183d06828341a450e9a07b
SHA5121ab04e2ef5e6b7218ec82edce6453f4e99da3c1ed3466ecf8429ef58f9c6d03c6d262a8afec0521b49d5d354afed67eeeeebc91516128e439f38e1b609b93a07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\2E0C4058E084A83FFD5E59DF25634B4708213893Filesize
20KB
MD5a161aabfd788bd74636cf2f59e110d54
SHA16954eaa68516d8085185a5efd3566cb66a51c4ef
SHA256e3b6d97df2562362c01cc0747829bc61d50f47b9049158aa714c203a54f00dda
SHA51239325499d7968ad19f3c92e18e7479e4c8f81f2233ac8d5a5a348883ae6700865c0d5c293af744b1e47363dc3c18da9eb57f3621310839d8bd56094fd3203336
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\32F6B70E2739A32EEF02D95FCFFB1EF3ABFD4A76Filesize
213KB
MD5ee83b9052785608680ac8276772728c3
SHA11f30478f28736741f56740dc3b3b74fec521f9ee
SHA2561a8ba3d645a198b50e0fa2a9269edbac63d7932c06a7bd7e52bbdb19c34e04d3
SHA512aad6885167d2d9f1d7ef80d454c8f60b183b1a134a907d8043572551f95d251a0cf5c063353cf45d81e00811e3de2e27c46a11e1f19f04124de5897a0e6108fb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\37D4C2538200DB67979ED3940910BD2EC8688418Filesize
157KB
MD5738769ab18a525bf1516fc064e9aa482
SHA112610e84c6c4c0e708badef6c06e79b3105b2164
SHA2567a535ae2bbd1246bd3b997328095a42cbf5d0590932809d6566f3ef04259aef5
SHA512a8716b78eb022095bb76376746b78f996fcd76cb3a1a7a38d5a2b888c93b7a8a772994d4b0ffb87952c707e680e110f316f08c2bc3bf2efc72db638c8ff4bb89
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\4903E7ABE348ED39D98D1C844FB81A906D5ECA16Filesize
9KB
MD5599afbcb8491a466db3a9873858bccce
SHA18e34c505530df58431968ccfbebdba453c7234d4
SHA256c5137ee33c87f5877da9aaf91c10acec6db043a4fd28b92a6b6b728f8618e65e
SHA5124f9c28e7b00731bf30c0a226ded6f5a489f4cd2c30142bdc163721b6a1642c43385545a1970dc97d0c896e742a0586cd7110eed0cfbfe02bb0499efcc36fe09a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\5025E5DF3C89B7D612FD31437F7003CDAC32F565Filesize
775B
MD5053029844fbebf18a7a766f2df7378a6
SHA15bb608ab83d71e0fbd2fe6ec56471e585f159c0f
SHA256e87d738d2b8569da7331236da186cb63342a579a10c679725c5bcd855923cad2
SHA51252f6d55839748da6f4d0c5a98166465a98c3c0aacc7ef2a5e5235557faa2d3ecaf495be2072da70d9415976aa67692507bcf3429997257d4702fb126c976b78d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\53C5A63DD10FCCCBBB92D7F43CAB295FE10FD0AFFilesize
1KB
MD532ee56706a4a82f54f460a9095bf89bd
SHA1cca15435f7a5f0c4db3ae73da8800a31fef25648
SHA256d64257e5e02da3eaf5e2831c8bb00d4230760c7813dc0b85778f3cea0ac6a4f0
SHA512b9b56857a468752462dc9c044c399cd705e8d10faee33b7fba109f06c09fcd048041d59b0c31152421f511d97c64115208fdb30581bb54432d6f38486f270b7f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\5F144EFB84CD71651AB02773B712DD9389942D9CFilesize
19KB
MD535450281f5ddb244a166230f1acf6476
SHA1896fbf2024a8b01f01a25fcaca7470b9d35812ef
SHA25601cb0b3397ced95e854b03b4c8fb761b2713176d8b7ce568b5c2deb24791abc2
SHA512cb2b4f5fa8139fa0574eb8faf79c8c16e935b0cab280b96cf3dfb3b80b725c636a25d564706ed8b33d3371315f5b967d59ddf9b397b88f5dc1fd1d3523bffa6d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\655E8A0863E307C99EFB92CE6918EB2455425FCBFilesize
2KB
MD555ba1ef0f8c5303a4c662ab21204a3de
SHA1d152fdd548cfb14787cef99d9c77c3cd8da1c18a
SHA2562463d6405fac5c250f45a53ca6cbea8e7c7f8c74cec50a21740415c6dc232446
SHA512ee4b8ce76af17edea30f573763a8ef98d2fd5644306f269c33bc027e1fe94e37ec48e08b0980fa1293338f962afa10cf023c910ec92132ec134829d2df9120a7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\69B4554E0E599C38DD06AEE5AF8B85B5E4E43BB9Filesize
8KB
MD5eb12790a49de8d3eba7d38d8356ea72e
SHA1f7a689138396925ca1eaca0fe74bb9670efb0d08
SHA256f4e97bd938c58f253022d865a4bf3da0010cae8cc53fdc36a403980f457a6cd9
SHA512cc6c4e1b6af086860922856378b7dc6c0488eacd2995b4d6425b6646f371a2a31f7969d7fb0d022fa675f07bb63dee061bd644c396320353384f1e45f6476148
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\6D4934FE31BFAF4563C9C133D9CEB4B986FB5CA0Filesize
9KB
MD51e818b4001fdd4add914c48f5debf77f
SHA1cfb6681fe1148561b96a61181177a0425b490de7
SHA2563bf22b3bd8e9055b62abfcecdd13ebe7429227b4b744afa6ff94f24e1945aa39
SHA51201a6de9a5c7e7fef18fc3ca3533ddc3b81ab2135a0dea620fa1a48f92b915241bd294ff94b452afb046a97978a34c734acfd1fe9f8ebefbbf8a06970464e8b56
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\6D621CE7EDB23030A35AD4DBDF4E1BA373D4FEA0Filesize
716B
MD583af07b9dff205a556fbb1298afea574
SHA19a641d94a7b796f1282f12a7a1b9fba39eb243e0
SHA25651b108055ceeeed5277901cac201768afa9727bea9b1d457902f552fc74af62e
SHA512b31df91649a44a9601ee12c6b0ddb65c7d0572fb92761edcfb7ebce6555209c2a39ef15801efad5ba5425d254977064fd313a5ca0428c108929817899048c571
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\780510E062825FABB8C95BE4566EC7650B63949CFilesize
1002B
MD52ac6ea579666246453eeb9310e113a10
SHA17ee203ed0b658ca34ea05e59ff0c16a9b043f37b
SHA2564e5eb79c879f2de46742df898c2a52f22508d0e3ebcc4b0431b58073ecaaacce
SHA512f9199bbebb687c6d4631c67c2e442a5091942abed788f473e2aaf30e6f3080233ccfeee204ffb3ff0eb55c896aa3effeac9282c870db150ac5a4e74aea1a843c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\8507E971A5AE9DB2C48EC2CF56A84EC4C40BAC50Filesize
14KB
MD5cc326977700d2607cbf54713f7ba0bf3
SHA1bc24fc71d0c2bdd2ff0a652b94cf8a002dbf7161
SHA256b3773133506a2c6ef16060f31d7fd9397cdb398a46719c99854cd3d9db9df412
SHA51256e2d1084490fb2d8bf2fae826bc9ec0143606868321565c70dfde97e4ad83a3b87480f51ac32469b70abbb60ff8f7e3671fc7bba08f902e5ae7b19cda2aa1f3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cache2\entries\ED07F042F4253F704BFC7070ADB92A3EDC4588A0Filesize
9KB
MD5505981b96f7992e51c5561b6c67e4bf1
SHA1542036413ab8adc59d210ebec116f2e03b735914
SHA2565bb6658350f08b0df197a1f30b10dff3c63ccbde2803b8d1af44f7766037785d
SHA5126de341bc0235629d416f2146e4b8150945ca823ad746e9b20cd065a7a8abfd8c51c56699e3f5bee081e11582b9cb63abb1928d1cb81b057011a80511637caebb
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\ads-track-digest256.vlpsetFilesize
51KB
MD56c3605de4e50f585c2dad2819d138112
SHA14c647f39e09f9a3f16c982febbcca061ffa42652
SHA2561983aa1c36d96d197aa522d6347f0ab6a62234294964f1d5889600c2ca6605d0
SHA512b619f4fa7138b90ea92064fa9e614e978b014257a59a71738d2fd2382988d395c1d9d7aa362e90abe5acf82dbe786f860bdeff65684db16ab5b42ebd5f47fc44
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\allow-flashallow-digest256.vlpsetFilesize
69B
MD5de0d88480c24350c59e1e9a3583de0d1
SHA14e3c279344cb37deb5e893ab24770982de135789
SHA25601ba9f0b913e04ed10bd7166796483dd4f72005f249d6ee68b12117be4b5d3c7
SHA512f627c69598baa9bc60b036cea03fdadc8b4cc424ef8cdf93614275a336de05a60961f5e77553226c99c29ec2932272ae994327a4da77d75d2464f6722cb700aa
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\analytics-track-digest256.vlpsetFilesize
9KB
MD52b077f437067b52d00d4280df1b248a5
SHA119c10d8bdf159b9e53db9855d1d97a658d92c994
SHA256a8cb2ff713acaba0b4612c5bfece51a5e5d436a739c0455a3731d1ef8e0eae12
SHA512ba03b93b68e5cc0de34f890d7d112a1df0a17dcb451bd9c0761e087260fe9b3cb2afda9efb0b9d075cb722b77a859ca0b27c570a6db62a08b2fa9d30a04d00d5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\base-cryptomining-track-digest256.vlpsetFilesize
2KB
MD5f45cb33dfea35013b6d5951f464a7841
SHA121c9d73636871aafe063797059078fe2373d1233
SHA256498ab828f2dff25b45deed474bebdbcfadac63a1cbba2e393162ab54bbc9f2e1
SHA51288ff2955d709d53fe248b88beb3f6bc31a485c17c80c5ddb8ea91abf46b0a43bcaf7f357ea4ac09dfb1d7988f8b7b1034ded15c2861d9de01719c131cf72a27c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\base-fingerprinting-track-digest256.vlpsetFilesize
2KB
MD5cb73b8baffcd07ff5d1df58f8477370b
SHA13bdda94d12aea19a659c3b4035d0e613e18ca202
SHA2561e063a0cbc2d947925265cabbbb0da6721b7e05361b1171316fca37e906226fa
SHA512f5004c43ba0b5b48fae0c45c5f61c2a608a4ca3c61362cf27c51da7335597f9862f6c5a04e137bba16e92f3523e1009b5ca2542f52d478f56b946cebf2140712
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\block-flash-digest256.vlpsetFilesize
6KB
MD5130b9ac2beec5ada274561105d81ae36
SHA185a4785b34bb151da41bc0dfed380cceb7a29983
SHA2567d99fec08182a5b95d18d1569edaa2c60c2aafbd15a56d8882f22f3b395e6460
SHA512cbf32630bfe48fe6dd0e815f2e9752ca75c066bdfb5f12941f3278883b0530f1736b2d179801afc7ab4680be6ca9976c6e2e3705147d95503ef32cf730194631
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\block-flashsubdoc-digest256.vlpsetFilesize
71KB
MD540165280ff1345b5241ec2a9d1da2af0
SHA1c49f9172a6bba2dc4e91fa97defd161d9e87773e
SHA256f80bdd5341d8b1ee946e344e258ef2d35c3c0bb6b13eb7b3e6a77467dfa8b97f
SHA512b5ec96e5f786de54976de804491aaf01bd79dd48d81ec81e1a9d32157881b0e7690d3608ee18e60e4381291a1c179999f40e0b98f9483519084da268b4904c8e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\content-track-digest256.vlpsetFilesize
15KB
MD59f355ca06a2c5eed2b13ab75dd4ca3d3
SHA116a014268d85c8b1cd476da2cfcf7aef79d5218c
SHA256039695d5ea6e79797e1b2acb4aa95bcbbe3f4c53970abf28c68aef2b13f1a95e
SHA512ace6b46c28c25ce5d87162566a882cf99b4a2512ac5fd9f0168ff9936d316af8652e775ebce8b1fc8b95d33844425da3a4832348115ead078d7b78a0b369b78f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\except-flash-digest256.vlpsetFilesize
101B
MD5c2994d388f8780c87d35c352d9582985
SHA1b4e9ecdf3ecce53f072b7ce9e695ffcc17ea9f76
SHA2567ed09f7d2bd632f70077a4ae4f2bd2f3fb654b03cd72652f51678b0c7d027f25
SHA51260edd83f6e0ff782ab251579e0f3c113d3d5fff7ba7f3a8900cd4fd6bc7271921445e94b53073129db9529f0210750615318348307db650fd11ffaedaeb7bd15
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\except-flashallow-digest256.vlpsetFilesize
69B
MD57194b6bff691a056852a51e2e06ce8fe
SHA10adb901d9e202ee31ce6a8131ff15e5ecca834f7
SHA256cbe2dc6abfe25bead60f4dfaf419fc0f441ff8a8dd4a2febf5553be1cbd90c49
SHA512b0d8240050a25b2ab754e8f260361298d0017e3a938e965a34b6db072380cb6167c4fa5e0c2293b46b1135207ce9242ce1441b77af8b07a3212a49000e8bbd36
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\except-flashsubdoc-digest256.vlpsetFilesize
133B
MD50c0d67875bd75a0227c02dd8529ba01a
SHA12b12efb5e31bdac680b6283e2585eeea096fe73c
SHA256614be0169ec36e67223eb9645a98da66dbfde5dfbb89bb064f428aaeabdd9d97
SHA5128fb01246c4b7b4a2cf0379f931e0cd3ea5a32781078efdc4c4a5ac3bc496697957f6d15a0b6daaf562e48bd1b1ffbafe0583c59962689b030c4c5543cf8e2ce5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\google-trackwhite-digest256.vlpsetFilesize
1.4MB
MD5e54e5b84194eee15e64d2a03f1136bb7
SHA1308413c74a49af1a575bc6f64fea33f9ad2f220d
SHA25607707b589be3dba3bb0bdac67760a2b180ea3531e9d7976b73e4c1d8df9dbb1e
SHA512f3bae1816db808c69871bd1a059236bf57982e90da5706adcc3359a200f1ec2c529be516be629fbdb5e7da8c3ea80000815d99c8c2c347440cacd9237bddd3b7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\mozstd-trackwhite-digest256.vlpsetFilesize
293KB
MD5dbd7544bf04db52719348298521f4ed4
SHA1ab838a83ae023aadba87bcae62093e874393a0e6
SHA256f87c0e78f812bf39363b1974ed20175e907cd6114173db31e1c7243f4d515dfd
SHA5120ef0ba0a594bb019133a133b9edb73901e804c845a66d427686f32a48c9d1ba665623d3fcd10018c2415202fd3f722aa23420598ce892444b4574c108ce4d6e4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\social-track-digest256.vlpsetFilesize
2KB
MD5399e146c7c24fb3a69525f748f6742ab
SHA15a19c6f96244a65ec44af582956a9085407768a0
SHA25611bddd57f215cf440ef5e41385a618123658be38b03097b547a9ac5220db425e
SHA5123d280f40d78b0ef1b76fb8210f1d59edc5412208058d7f9448e14ff11c4e717505735c161979e2f84c4ccbcf4c4fa13ff3e8200b27ee2bb96e8d1180fca62e5e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\social-tracking-protection-facebook-digest256.vlpsetFilesize
485B
MD5c6e5d0e5cc6cabbb446b625d9a14f3ef
SHA12d46657ed7ddb6f4c295b90aea7c477f2560d4f4
SHA256de974099351ab8e3b4945d3fae34a2d8bf43407921800719256cf29139f516e7
SHA5126e30e2adc27654d3052fbdaa8c4bf6d2ea41687bea67cc80c412c0d07a6174211e633a1aace5629444ba9ab0289af9f56651b5ab9061bcbb820b04debe175098
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\social-tracking-protection-linkedin-digest256.vlpsetFilesize
165B
MD5e28d310df430e7b6d95d9c912fa94e2f
SHA16c54ae3b421f47b73260751c44584d4b1effbb16
SHA2560f6bd075711185f73238b0cd030f84a6fa9ddc17d341a669aadd07b806a86626
SHA5121dc3c42fd79042eb9d17746a6f5c3e46d3bcbf36bda2143b380a02519771c39870cef4e8031e29191505c125c52a73e20c8167e1c26c3458fd9b7c89f231f0ce
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\safebrowsing\social-tracking-protection-twitter-digest256.vlpsetFilesize
261B
MD5dafe2c58eba7740af1a2bad64cef0f54
SHA1f10d56c4c9d035744f46ed60690d7eab35952c27
SHA25616093715575f4b5990d69d92459156f5843134a22135ff93185fbf109d64423d
SHA5125e6e65b2e357e6dabb163496135b0269f4e6f19f230e2f5f51f17c18b3462280f83e48d621747aeb88eca016906acc9d6c05664b3f5d20ac6d90ba0aca41ba4c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\startupCache\scriptCache-child.binFilesize
665KB
MD5e37bdb056937afe9788b22593545af91
SHA1e4457f3c6e21247f868e2186524f5cc22512810a
SHA2562ea03c2023a59bd3381ed405839390b338d23226fbc9fd76c5da106e45a30cda
SHA512a0f007b98655e9cb0cea1190ae0d24abf61649e1155afec9c602ced6b3beea843f12377390a81f4cdf448edd5f39858b5bc9589f37d10cff5f17a42d48ed538b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\startupCache\scriptCache.binFilesize
6.7MB
MD5f44163eac2dbd32078ec8aa42c543907
SHA1f40385e1b25141a0ef3f23f2edd3c43b07bedb3d
SHA256f5c661f4146b474d2940f645425cfccea47964a55b82302ffcfbbf10fdd63d0f
SHA512becdb9db853e4a0e0f3bc8e96204f9c5846c010141ec450122fd31ff1c7115762cac25f750da98c81b3158ca7c1b363ea39f9b1a73531fdca223d7a74a309795
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\startupCache\startupCache.8.littleFilesize
1.6MB
MD564cad1a3c3e69544759aa6a0a3804cda
SHA13dda8a235cd15e6226765689ee409622b4734c3c
SHA256688f2d1b8dae96a12c201c78a1fa347945506e365608e7f481d373660e6f9322
SHA51230dad0962a77b0da6d290bdd0c227e5d14f0416a9c2ec93ff60227d8647269b2ed8dcb6ee89de031d9569f82428f78af15daf6e03ab48f0bd8d129b88f0ced73
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\startupCache\urlCache.binFilesize
1KB
MD5c1c8b7f2df03ebe0a29cd1b520c63606
SHA1eac91fdff61640408b7dd6f0ae3ccf61c13fe794
SHA25626278cd0634599bba79331db97bf3afb47a6eafa721544a29c9e423b59183322
SHA5122cd0fffe1dab670dec7605a3691d6ea855ad23dd9709162b79a0158343c41ce0a1e6ac74648c8627d52a43ddc1e8cb05cbd50340bb5c59a6f8bc437cb93062a2
-
C:\Users\Admin\AppData\Local\Temp\amigo_ldir_5008_13786\amigo_setup.exeFilesize
402KB
MD57924f6ab2fe0ec11701067c1618c89d4
SHA181de81907832dea9a290e0eaef759279e30a7d0f
SHA25617d5755415288240395da7c596e34470cf3bb597e01e9c7d23d2d5ea85cce244
SHA5125f40048071fcbc625ef60582c373d4c65189ca59feabdcb7fd61ac766d6d2d69663f7f01905876d4d2240751c86d2d0ca6d725f9a82b080e8afeac969c104b74
-
C:\Users\Admin\AppData\Local\Temp\amigo_ldir_5008_13786\amigo_setup.exeFilesize
402KB
MD57924f6ab2fe0ec11701067c1618c89d4
SHA181de81907832dea9a290e0eaef759279e30a7d0f
SHA25617d5755415288240395da7c596e34470cf3bb597e01e9c7d23d2d5ea85cce244
SHA5125f40048071fcbc625ef60582c373d4c65189ca59feabdcb7fd61ac766d6d2d69663f7f01905876d4d2240751c86d2d0ca6d725f9a82b080e8afeac969c104b74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\UK1T0M~1.DEF\cert9.dbFilesize
224KB
MD52f0dd997a30477f66627ca62a4bd1fa0
SHA1169f5886899c479e12188ce83ade292b3c8a488a
SHA2562418ee69b58cde96eaa6b3d28701298a1e5891183ea28fa4645cc9581b7965bb
SHA512260f214a570ab2fb6553f3f6d0feff7e97bc97134a3405f9b261602ae6f4fafe3d1984d3ad69cf7446a8814b9df6273bef69934ef47173fed26a4288d260df72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\SiteSecurityServiceState.txtFilesize
568B
MD563ef4c5948022a7eba6b41c2a53f554d
SHA1db3a84e2b7ee08f74aae6b4f4816eca204f3bb2d
SHA256d50ccb4885f6262af0d321952e152685602e32bc23c57fcf5efcd164b670ba8e
SHA5125b6b59dbccb241b7c5c6a905695973a8ca98f3644e11841cf49428f874b379c4b61686d951b204828e11875f2bfbd92477360739ab12269ed8f7457bec080b6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\addonStartup.json.lz4Filesize
1KB
MD5bc4bd0071af0574fe57b6756f0b26071
SHA1dfc6af6b87b58391f67679a24c28495503f9e75d
SHA2562f0cb964330decccb1375985d126d6cd2fec171e344cdd6e21026fa9459d8ad3
SHA5129cd3f9140a3beca18114253556281c48e0a2401d8e7bb01b518a0615caf6a1f4a8cece627c00caaf9cb3f7cf3a57a224ec5233682b5b3f8e933619b85488551d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\cookies.sqliteFilesize
512KB
MD5448c3c71d3e19ee36830d0b4488d5bcb
SHA1852b28bc6eb5882795b212cfe1e8b311321dfd1f
SHA256f84de25aeef599e29278900773c71a16026ca2f863cf541d5608c99584583147
SHA512ab9931299c2b6e82eaf77ce27ca70aa32bdcdfe602a09402e873450b86c11a49e43606b308fff7983d21d6ce597f421c27eb14a1532f529f883e15a7bdeb6ee2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\favicons.sqliteFilesize
5.0MB
MD58859662540bef79adee4f32dfc979ba3
SHA1ad7c2271baf5a5e15f04d05fae82d899367125d5
SHA256ca3c230f2573a776082d1ba5972029d769bd17037f1f6e81f92434505670f2d0
SHA5121019327088bc96104c15c915eb4ba87e7f65104666f92a4e3f59161c8c98bc08f98dc9e52e0a14196b51495cf580ef3f636ac341225a94dc5e5fd0073e6201e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\permissions.sqliteFilesize
96KB
MD588fd9f5480da1a1b7ba33d38f8acaf88
SHA10aa02fd91606c84a38981ee536164859bedf3ef3
SHA25646c8fc9d9ecf049ebdb5db860d5b63f81f5035deeb6e0441ec5b8bc52d5e1248
SHA512d42305fc26a289e32cd3aa93d6bbb2b5d4c2d3b7d0575e607ffb3f56b9972cb0cac4b3e0de0f1942b653c027e6028a4c9619ddd9bbc5cbc0718f7642fb0bdfd6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\places.sqliteFilesize
5.0MB
MD5c5faf57dbab5a87e56f20bea8525691e
SHA1fddad78436b5bae90d73972c23b860c8dd4bfb17
SHA2565048f75a618c45bbafc0f1674c310927cd9e58a6b0fb62eaa405cc7914dd143e
SHA512058fad13fd8726355a915699572d45b76b15da85dfedf91b6531e73132c0372c1a0dfa46322279d8edc09c4159797c4a19b167ba227fa183ced99eca073c304c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\prefs.jsFilesize
6KB
MD52625927693ae0aac402405afb84f2253
SHA1fddedaa8b545425afb319791cb1c4dde9229267a
SHA256bfe4967701a660758c35139f45ae47df28e314ca75077a8bc046951f10ce981c
SHA512100ce17ee5d4362c6e8574bd40547bc6141763c428bb7b62d5193e0c6ef6fcf895d010b1b48ab46fb5f60c9332ab320fcedfdd26868e95594e2484afcffc2678
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\protections.sqliteFilesize
64KB
MD56c050eb6d13675bfeab8bc7f09fd274a
SHA14d14b0ef1884a6b5c0b6860da3ebb8a83b398df7
SHA256b6e55a1dfda381c4356952acb8aebc56c09191e4013ecc4980a847feb511f76e
SHA512b52f418e3247d42cd7274163d1968630657d66380bd243ba8ca5077853949c75aed7a5af8a9425765aa0da501f42d713420f8434a42a3c391cac999144df5e0f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\search.json.mozlz4Filesize
2KB
MD5943e7dcd75583e6b0e5971815ed79384
SHA1935af00a1b5a24e7cf22451f2071e98f4832522e
SHA256de8ed33623f36e268baeed3e44f97ba97b0a4aa541124663b35be8d6c34b1f26
SHA512419dbf1a6dbad43447170f072c55108f140d8006d4f2406f902c0ded76873c740cb257aa66acc61133a8fbe604dd62292bda620ecc1cb0efbc4ce1ca306e241b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\sessionCheckpoints.jsonFilesize
288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\sessionstore.jsonlz4Filesize
3KB
MD5df9d57a1d6be14bb7ecfb5dd11686b27
SHA12349743e47c87052baefdef9babadaf5a272d169
SHA256fdc5f2d1b0bfa7143d66a188836a0e84e3aad4f1ce55ca6f701b9fa4d9c865ba
SHA512c42d602f5bb1321cf5acf787b95ce5382abf489bdee0b64716039293a8767fa1d979c4557fa21794cd0f66728b488a685ae47dcdfac5d08afeb933eee5fdc760
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteFilesize
48KB
MD52649b0b46e8ba3f0c98a4ab8fc1d40ff
SHA1408c085ff88ecd61b57b6b2728ae02bbbc6b5012
SHA2569e1f84f72685ec2514a06f55744d98f30e6ef5a42a89a4e85da92b66420cffec
SHA512bde98c3277b4db34f28220614c7df00c3591b5ad129d9c0f89f27ce7b1381cc14495fc3270be31beb7cc793ba854485e54e173ab54e755ecc7d1523649a4fba3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteFilesize
3.1MB
MD5212b190937bb48b4ea287abc80463ff0
SHA1f6b159e108cfdc2c0189cc5123931cbffc2a3a37
SHA256f490674cd3fa46f5f6dfec314c094d3a64ebdc63befdcbe8944bf3087324449e
SHA5127429572764ecc1cf1dc08903a56f781b4c7b57f3d7ea151e1abbb2555ae80ba4906b09e1c01bfa0b269022e9b4d26fd36bcc903cea6469070f3a8ebaa916e441
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\webappsstore.sqliteFilesize
96KB
MD577112fbc43fa28cc600b2cb4b144bec3
SHA1afce0049a43b707dc54dcac3f110bf90c12b115d
SHA256d0ccf798e94dbe3a5c8b77f624994922fc24d1e95e5476f0b5fb9e03d5677276
SHA51296620b97a8a41c315f1dfc3e472c716e2d68b6f9aa51853b8ab56ab3a4f3310191f961f962730ffce393a1d9aee0f6b0706d314dc88e74c6c890514577b8420b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uk1t0mn4.default-release\xulstore.jsonFilesize
141B
MD51995825c748914809df775643764920f
SHA155c55d77bb712d2d831996344f0a1b3e0b7ff98a
SHA25687835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776
SHA512c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c
-
C:\Users\Admin\Downloads\amigo_setup.exeFilesize
402KB
MD57924f6ab2fe0ec11701067c1618c89d4
SHA181de81907832dea9a290e0eaef759279e30a7d0f
SHA25617d5755415288240395da7c596e34470cf3bb597e01e9c7d23d2d5ea85cce244
SHA5125f40048071fcbc625ef60582c373d4c65189ca59feabdcb7fd61ac766d6d2d69663f7f01905876d4d2240751c86d2d0ca6d725f9a82b080e8afeac969c104b74
-
C:\Users\Admin\Downloads\amigo_setup.exeFilesize
402KB
MD57924f6ab2fe0ec11701067c1618c89d4
SHA181de81907832dea9a290e0eaef759279e30a7d0f
SHA25617d5755415288240395da7c596e34470cf3bb597e01e9c7d23d2d5ea85cce244
SHA5125f40048071fcbc625ef60582c373d4c65189ca59feabdcb7fd61ac766d6d2d69663f7f01905876d4d2240751c86d2d0ca6d725f9a82b080e8afeac969c104b74
-
memory/760-202-0x0000000002890000-0x0000000002990000-memory.dmpFilesize
1024KB
-
memory/760-196-0x0000000002850000-0x00000000029F6000-memory.dmpFilesize
1.6MB
-
memory/760-203-0x0000000002851000-0x000000000291A000-memory.dmpFilesize
804KB
-
memory/760-200-0x0000000002850000-0x00000000029F6000-memory.dmpFilesize
1.6MB
-
memory/760-201-0x0000000002850000-0x00000000029F6000-memory.dmpFilesize
1.6MB
-
memory/760-198-0x000000000291A000-0x00000000029F5000-memory.dmpFilesize
876KB
-
memory/760-186-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/760-187-0x00000000024A0000-0x000000000258B000-memory.dmpFilesize
940KB
-
memory/760-193-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/760-194-0x00000000022C0000-0x00000000023A5000-memory.dmpFilesize
916KB
-
memory/760-195-0x00000000023B0000-0x0000000002494000-memory.dmpFilesize
912KB
-
memory/760-197-0x0000000002690000-0x0000000002840000-memory.dmpFilesize
1.7MB
-
memory/784-281-0x0000000000400000-0x0000000000CCE000-memory.dmpFilesize
8.8MB
-
memory/784-283-0x0000000000400000-0x0000000000CCE000-memory.dmpFilesize
8.8MB
-
memory/784-280-0x0000000000000000-mapping.dmp
-
memory/820-286-0x0000000000400000-0x0000000000CCE000-memory.dmpFilesize
8.8MB
-
memory/820-284-0x0000000000400000-0x0000000000CCE000-memory.dmpFilesize
8.8MB
-
memory/1128-184-0x0000000000B20000-0x0000000000E40000-memory.dmpFilesize
3.1MB
-
memory/1128-183-0x000000000041D0B0-mapping.dmp
-
memory/1364-262-0x000000000294A000-0x0000000002A25000-memory.dmpFilesize
876KB
-
memory/1364-269-0x0000000002881000-0x000000000294A000-memory.dmpFilesize
804KB
-
memory/1364-253-0x0000000000000000-mapping.dmp
-
memory/1364-254-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1364-261-0x0000000002880000-0x0000000002A26000-memory.dmpFilesize
1.6MB
-
memory/1364-264-0x0000000002880000-0x0000000002A26000-memory.dmpFilesize
1.6MB
-
memory/1364-265-0x0000000002880000-0x0000000002A26000-memory.dmpFilesize
1.6MB
-
memory/1364-266-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1364-267-0x00000000026C0000-0x0000000002870000-memory.dmpFilesize
1.7MB
-
memory/1364-255-0x00000000024D0000-0x00000000025BB000-memory.dmpFilesize
940KB
-
memory/1364-268-0x00000000028C0000-0x00000000029C0000-memory.dmpFilesize
1024KB
-
memory/1936-306-0x0000000000000000-mapping.dmp
-
memory/2168-182-0x0000000000B60000-0x0000000000E80000-memory.dmpFilesize
3.1MB
-
memory/2168-181-0x000000000041D0B0-mapping.dmp
-
memory/2308-185-0x0000000000AD0000-0x0000000000B10000-memory.dmpFilesize
256KB
-
memory/2316-279-0x0000000000000000-mapping.dmp
-
memory/2484-270-0x0000000000400000-0x0000000000F89000-memory.dmpFilesize
11.5MB
-
memory/2484-272-0x0000000000400000-0x0000000000F89000-memory.dmpFilesize
11.5MB
-
memory/2484-273-0x0000000000400000-0x0000000000F89000-memory.dmpFilesize
11.5MB
-
memory/2992-219-0x00000000028F0000-0x00000000029F0000-memory.dmpFilesize
1024KB
-
memory/2992-220-0x00000000028B1000-0x000000000297A000-memory.dmpFilesize
804KB
-
memory/2992-205-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2992-204-0x0000000000000000-mapping.dmp
-
memory/2992-206-0x0000000002500000-0x00000000025EB000-memory.dmpFilesize
940KB
-
memory/2992-218-0x00000000026F0000-0x00000000028A0000-memory.dmpFilesize
1.7MB
-
memory/2992-217-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/2992-216-0x00000000028B0000-0x0000000002A56000-memory.dmpFilesize
1.6MB
-
memory/2992-215-0x00000000028B0000-0x0000000002A56000-memory.dmpFilesize
1.6MB
-
memory/2992-213-0x000000000297A000-0x0000000002A55000-memory.dmpFilesize
876KB
-
memory/2992-212-0x00000000028B0000-0x0000000002A56000-memory.dmpFilesize
1.6MB
-
memory/3908-278-0x0000000000000000-mapping.dmp
-
memory/4296-236-0x0000000002760000-0x0000000002910000-memory.dmpFilesize
1.7MB
-
memory/4296-235-0x0000000002760000-0x0000000002910000-memory.dmpFilesize
1.7MB
-
memory/4296-234-0x0000000002840000-0x00000000029E6000-memory.dmpFilesize
1.6MB
-
memory/4296-233-0x0000000002840000-0x00000000029E6000-memory.dmpFilesize
1.6MB
-
memory/4296-232-0x0000000002840000-0x00000000029E6000-memory.dmpFilesize
1.6MB
-
memory/4296-231-0x000000000290A000-0x00000000029E5000-memory.dmpFilesize
876KB
-
memory/4296-229-0x00000000021B0000-0x0000000002288000-memory.dmpFilesize
864KB
-
memory/4296-228-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4296-222-0x0000000002570000-0x000000000265B000-memory.dmpFilesize
940KB
-
memory/4296-221-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4772-120-0x0000000000000000-mapping.dmp
-
memory/4776-251-0x0000000002930000-0x0000000002A30000-memory.dmpFilesize
1024KB
-
memory/4776-239-0x0000000002540000-0x000000000262B000-memory.dmpFilesize
940KB
-
memory/4776-252-0x00000000028F1000-0x00000000029BA000-memory.dmpFilesize
804KB
-
memory/4776-238-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/4776-250-0x0000000002730000-0x00000000028E0000-memory.dmpFilesize
1.7MB
-
memory/4776-249-0x00000000028F0000-0x0000000002A96000-memory.dmpFilesize
1.6MB
-
memory/4776-248-0x00000000028F0000-0x0000000002A96000-memory.dmpFilesize
1.6MB
-
memory/4776-246-0x00000000029BA000-0x0000000002A95000-memory.dmpFilesize
876KB
-
memory/4776-245-0x00000000028F0000-0x0000000002A96000-memory.dmpFilesize
1.6MB
-
memory/4776-237-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/5000-276-0x0000000000000000-mapping.dmp
-
memory/5044-277-0x0000000000000000-mapping.dmp
-
memory/5072-350-0x0000000000000000-mapping.dmp
-
memory/5184-287-0x0000000000000000-mapping.dmp
-
memory/5376-288-0x0000000000300000-0x0000000000308000-memory.dmpFilesize
32KB
-
memory/5524-312-0x0000000000000000-mapping.dmp
-
memory/5676-335-0x0000000000000000-mapping.dmp
-
memory/5864-289-0x0000000000000000-mapping.dmp
-
memory/5876-309-0x0000000000000000-mapping.dmp
-
memory/5928-290-0x0000000000000000-mapping.dmp
-
memory/5932-311-0x0000000000000000-mapping.dmp
-
memory/6148-302-0x00000000674E0000-0x00000000684D9000-memory.dmpFilesize
16.0MB
-
memory/6148-295-0x00000000674E0000-0x00000000684D9000-memory.dmpFilesize
16.0MB
-
memory/6148-291-0x0000000000000000-mapping.dmp
-
memory/6168-297-0x0000000000000000-mapping.dmp
-
memory/6228-293-0x0000000000000000-mapping.dmp
-
memory/6320-298-0x0000000000000000-mapping.dmp
-
memory/6324-294-0x0000000000000000-mapping.dmp
-
memory/6440-337-0x0000000000000000-mapping.dmp
-
memory/6680-303-0x0000000000000000-mapping.dmp
-
memory/6828-310-0x0000000000000000-mapping.dmp
-
memory/6828-314-0x0000000000000000-mapping.dmp
-
memory/6960-358-0x0000000000000000-mapping.dmp
-
memory/6960-359-0x0000000000400000-0x00000000004DA000-memory.dmpFilesize
872KB
-
memory/6988-305-0x0000000000000000-mapping.dmp
-
memory/7092-296-0x0000000000000000-mapping.dmp
-
memory/7316-333-0x0000000000000000-mapping.dmp
-
memory/7376-331-0x0000000000000000-mapping.dmp
-
memory/7380-340-0x0000000000000000-mapping.dmp
-
memory/7396-317-0x0000000000000000-mapping.dmp
-
memory/7452-315-0x0000000000000000-mapping.dmp
-
memory/7496-330-0x0000000000000000-mapping.dmp
-
memory/7552-332-0x0000000000000000-mapping.dmp
-
memory/7600-334-0x0000000000000000-mapping.dmp
-
memory/7624-336-0x0000000000000000-mapping.dmp
-
memory/8092-339-0x0000000000000000-mapping.dmp
-
memory/8096-316-0x0000000000000000-mapping.dmp
-
memory/8112-338-0x0000000000000000-mapping.dmp
-
memory/8248-362-0x0000000000000000-mapping.dmp
-
memory/8564-360-0x0000000000000000-mapping.dmp
-
memory/8604-363-0x0000000000000000-mapping.dmp
-
memory/8656-364-0x0000000000000000-mapping.dmp
-
memory/9244-351-0x0000000000000000-mapping.dmp
-
memory/9560-352-0x0000000000000000-mapping.dmp
-
memory/9572-357-0x0000000000400000-0x00000000004DA000-memory.dmpFilesize
872KB
-
memory/9912-361-0x0000000000000000-mapping.dmp
-
memory/10040-353-0x0000000000000000-mapping.dmp
-
memory/10260-366-0x0000000000000000-mapping.dmp
-
memory/10320-365-0x0000000000000000-mapping.dmp
-
memory/10404-390-0x0000000000000000-mapping.dmp
-
memory/11688-371-0x0000000000000000-mapping.dmp
-
memory/11804-377-0x0000000000000000-mapping.dmp
-
memory/11844-378-0x0000000000000000-mapping.dmp
-
memory/12060-380-0x0000000000000000-mapping.dmp
-
memory/12248-381-0x0000000000000000-mapping.dmp
-
memory/12424-395-0x0000000000000000-mapping.dmp
-
memory/12748-401-0x0000000000000000-mapping.dmp
-
memory/12860-404-0x0000000000000000-mapping.dmp
-
memory/12944-409-0x0000000000000000-mapping.dmp
-
memory/12976-415-0x0000000000000000-mapping.dmp
-
memory/13512-494-0x0000000000B40000-0x0000000000B58000-memory.dmpFilesize
96KB
-
memory/13512-495-0x0000000009C00000-0x0000000009C38000-memory.dmpFilesize
224KB
-
memory/14680-503-0x0000000005A30000-0x0000000005A8A000-memory.dmpFilesize
360KB
-
memory/14680-510-0x00000000060A0000-0x00000000060A8000-memory.dmpFilesize
32KB
-
memory/14680-500-0x0000000004D90000-0x0000000004DBE000-memory.dmpFilesize
184KB
-
memory/14680-501-0x0000000002330000-0x000000000233A000-memory.dmpFilesize
40KB
-
memory/14680-502-0x0000000002340000-0x000000000234C000-memory.dmpFilesize
48KB
-
memory/14680-498-0x00000000000B0000-0x000000000014E000-memory.dmpFilesize
632KB
-
memory/14680-504-0x00000000059F0000-0x0000000005A02000-memory.dmpFilesize
72KB
-
memory/14680-506-0x0000000005EB0000-0x0000000005ECC000-memory.dmpFilesize
112KB
-
memory/14680-507-0x0000000005EA0000-0x0000000005EAE000-memory.dmpFilesize
56KB
-
memory/14680-508-0x00000000060F0000-0x0000000006156000-memory.dmpFilesize
408KB
-
memory/14680-505-0x0000000005A10000-0x0000000005A28000-memory.dmpFilesize
96KB
-
memory/14680-509-0x0000000006080000-0x000000000608A000-memory.dmpFilesize
40KB
-
memory/14680-511-0x00000000060B0000-0x00000000060C4000-memory.dmpFilesize
80KB
-
memory/14680-499-0x0000000000A10000-0x0000000000A1A000-memory.dmpFilesize
40KB
-
memory/14680-512-0x00000000060E0000-0x00000000060E8000-memory.dmpFilesize
32KB
-
memory/14680-513-0x00000000069E0000-0x00000000069E8000-memory.dmpFilesize
32KB
-
memory/14680-514-0x0000000006C90000-0x0000000006CA2000-memory.dmpFilesize
72KB
-
memory/14680-515-0x0000000005AB0000-0x0000000005ACC000-memory.dmpFilesize
112KB
-
memory/14680-516-0x00000000072C0000-0x00000000078C2000-memory.dmpFilesize
6.0MB
-
memory/14680-517-0x0000000005B10000-0x0000000005B4E000-memory.dmpFilesize
248KB
-
memory/14680-518-0x0000000005AE0000-0x0000000005AE8000-memory.dmpFilesize
32KB
-
memory/14680-519-0x0000000005AF0000-0x0000000005AF8000-memory.dmpFilesize
32KB
-
memory/14680-520-0x000000000B980000-0x000000000BE7E000-memory.dmpFilesize
5.0MB
-
memory/14680-521-0x000000000A7D0000-0x000000000A862000-memory.dmpFilesize
584KB
-
memory/14680-522-0x000000000D600000-0x000000000D63E000-memory.dmpFilesize
248KB
-
memory/14680-523-0x000000000D350000-0x000000000D378000-memory.dmpFilesize
160KB
-
memory/14680-524-0x000000000D380000-0x000000000D3AA000-memory.dmpFilesize
168KB
-
memory/14680-525-0x000000000D3B0000-0x000000000D3C8000-memory.dmpFilesize
96KB