Analysis
-
max time kernel
149s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe
Resource
win7-20220414-en
General
-
Target
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe
-
Size
726KB
-
MD5
50d0eeb5f7b2657ef9449f4b023ec164
-
SHA1
3b49a623038bdb87a64b2d49122da99068b55e3f
-
SHA256
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14
-
SHA512
d0f30087f24bcb94b36712326ccb29dae7a9593f0652578548405b1d20f20b5ed78f30d9622ed273e756f0ac83359f0579978089d4f450268898b9ed5eecd4c7
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 14 IoCs
Processes:
duba_3_295.exekxescore.exedescription ioc process File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisnetm.sys duba_3_295.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\bc.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisnetm64.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksapi64.sys duba_3_295.exe File opened for modification C:\Windows\SysWOW64\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\kisknl.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksapi.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisknl.sys kxescore.exe File opened for modification C:\Windows\system32\drivers\bc.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisknl64.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisnetmxp.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksskrpr.sys duba_3_295.exe -
Executes dropped EXE 38 IoCs
Processes:
setup_30004.exexxxx_@rgybn@_51792_21000001.exeppah_ad_tuiguang8_Setup.exeadevicehelpersvr.exeadevicehelpersvr.exeadevicehelpersvr.exeahelper.exeadevicehelpermon.exe360se_nanaxt9.exesetup.exeduba_3_295.exesetup.exe360se.exemusic_21_1_yc.exe360se.exeSoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exekavlog2.exekxetray.exekislive.exekxescore.exekxescore.exekxetray.exeQQPCDownload72844.exeFileAssociationsTool.exeFileAssociationsTool.exeFileAssociationsTool.exeSohuVA.exeFileAssociationsTool.exeFileAssociationsTool.exeFileAssociationsTool.exeFileAssociationsTool.exeFileAssociationsTool.exeSHRes.exeSHPlayer.exeSHRes.exekwsprotect64.exepid process 272 setup_30004.exe 1388 xxxx_@rgybn@_51792_21000001.exe 1248 ppah_ad_tuiguang8_Setup.exe 2024 adevicehelpersvr.exe 568 adevicehelpersvr.exe 1096 adevicehelpersvr.exe 1868 ahelper.exe 436 adevicehelpermon.exe 936 360se_nanaxt9.exe 1580 setup.exe 364 duba_3_295.exe 1648 setup.exe 316 360se.exe 2248 music_21_1_yc.exe 2236 360se.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2640 kavlog2.exe 2656 kxetray.exe 2688 kislive.exe 2672 kxescore.exe 2700 kxescore.exe 2812 kxetray.exe 2916 QQPCDownload72844.exe 2696 FileAssociationsTool.exe 2864 FileAssociationsTool.exe 2972 FileAssociationsTool.exe 1840 SohuVA.exe 1480 FileAssociationsTool.exe 2112 FileAssociationsTool.exe 1864 FileAssociationsTool.exe 2588 FileAssociationsTool.exe 2436 FileAssociationsTool.exe 2520 SHRes.exe 2772 SHPlayer.exe 1780 SHRes.exe 1840 SohuVA.exe 2212 kwsprotect64.exe 1144 -
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 1752 netsh.exe 1904 netsh.exe 276 netsh.exe -
Registers COM server for autorun 1 TTPs 5 IoCs
Processes:
duba_3_295.exe360se.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" duba_3_295.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 360se.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\Wow6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\360se6\\Application\\360se.exe\"" 360se.exe -
Sets file execution options in registry 2 TTPs 28 IoCs
Processes:
duba_3_295.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSCAN.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scomregsvrv8.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISADDIN.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kiscall.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kislive.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kdrvmgr.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISCALL.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninst.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVLOG2.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kismain.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISMAIN.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SCOMREGSVRV8.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRECYCLE.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kscan.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxescore.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KDRVMGR.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krecycle.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksignsp.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSIGNSP.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXESCORE.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KXETRAY.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UNINST.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlog2.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kisaddin.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksetupwiz.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLIVE.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KSETUPWIZ.EXE duba_3_295.exe -
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
kxescore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe -
Processes:
resource yara_rule behavioral1/memory/364-160-0x0000000000400000-0x0000000000520000-memory.dmp upx behavioral1/memory/2248-185-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral1/memory/2248-188-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral1/memory/364-191-0x0000000000400000-0x0000000000520000-memory.dmp upx behavioral1/memory/2248-199-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral1/memory/364-341-0x0000000000400000-0x0000000000520000-memory.dmp upx -
Loads dropped DLL 64 IoCs
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exesetup_30004.exeppah_ad_tuiguang8_Setup.execmd.exeadevicehelpersvr.exeadevicehelpersvr.exeadevicehelpersvr.exeahelper.exeadevicehelpermon.exe360se_nanaxt9.exesetup.exe360se.exepid process 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 272 setup_30004.exe 272 setup_30004.exe 272 setup_30004.exe 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 272 setup_30004.exe 272 setup_30004.exe 272 setup_30004.exe 272 setup_30004.exe 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 272 setup_30004.exe 1248 ppah_ad_tuiguang8_Setup.exe 272 setup_30004.exe 272 setup_30004.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 328 cmd.exe 2024 adevicehelpersvr.exe 1248 ppah_ad_tuiguang8_Setup.exe 568 adevicehelpersvr.exe 1096 adevicehelpersvr.exe 1248 ppah_ad_tuiguang8_Setup.exe 1868 ahelper.exe 1868 ahelper.exe 1868 ahelper.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1096 adevicehelpersvr.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 1868 ahelper.exe 436 adevicehelpermon.exe 436 adevicehelpermon.exe 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 936 360se_nanaxt9.exe 1868 ahelper.exe 1580 setup.exe 1868 ahelper.exe 1868 ahelper.exe 1868 ahelper.exe 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 1580 setup.exe 1580 setup.exe 1580 setup.exe 1580 setup.exe 1580 setup.exe 1580 setup.exe 316 360se.exe 316 360se.exe 316 360se.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
duba_3_295.exeFileAssociationsTool.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SohuVA = "\"C:\\Program Files (x86)\\????\\SHPlayer.exe\" /auto" FileAssociationsTool.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
duba_3_295.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini duba_3_295.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini duba_3_295.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
kxetray.exedescription ioc process File opened (read-only) \??\P: kxetray.exe File opened (read-only) \??\T: kxetray.exe File opened (read-only) \??\X: kxetray.exe File opened (read-only) \??\D: kxetray.exe File opened (read-only) \??\G: kxetray.exe File opened (read-only) \??\H: kxetray.exe File opened (read-only) \??\L: kxetray.exe File opened (read-only) \??\Y: kxetray.exe File opened (read-only) \??\Z: kxetray.exe File opened (read-only) \??\F: kxetray.exe File opened (read-only) \??\I: kxetray.exe File opened (read-only) \??\V: kxetray.exe File opened (read-only) \??\Q: kxetray.exe File opened (read-only) \??\R: kxetray.exe File opened (read-only) \??\S: kxetray.exe File opened (read-only) \??\U: kxetray.exe File opened (read-only) \??\W: kxetray.exe File opened (read-only) \??\E: kxetray.exe File opened (read-only) \??\J: kxetray.exe File opened (read-only) \??\N: kxetray.exe File opened (read-only) \??\K: kxetray.exe File opened (read-only) \??\M: kxetray.exe File opened (read-only) \??\O: kxetray.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{452ADB5B-00BE-469D-A65F-3046146B2ED5} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{452ADB5B-00BE-469D-A65F-3046146B2ED5}\ = "SohuBHO" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
setup.exeQQPCDownload72844.exe360se.exeduba_3_295.exe17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exedescription ioc process File opened for modification \??\PhysicalDrive0 setup.exe File opened for modification \??\PhysicalDrive0 QQPCDownload72844.exe File opened for modification \??\PhysicalDrive0 360se.exe File opened for modification \??\PhysicalDrive0 duba_3_295.exe File opened for modification \??\PHYSICALDRIVE0 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe -
Drops file in System32 directory 5 IoCs
Processes:
kavlog2.exekxescore.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\KAVEventLog.EVT kavlog2.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 kxescore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 kxescore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 kxescore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 kxescore.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
music_21_1_yc.exepid process 2248 music_21_1_yc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
kxetray.exeSoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exeduba_3_295.exeppah_ad_tuiguang8_Setup.exe17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\ktool_update\kdownload\kav\index.dat kxetray.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_dwdopenfloder_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_nv_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_smartset_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_tool_definition_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\i_no_hover.png.r28001 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\codecs\mp4.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\lyric_btn_desktop_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\codecs\qasf.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kae\kaecore.ini duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kshmpg.ini duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kdrvmgr.exe duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_set_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_upload_video_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\dlna_btn_back_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\us_zero.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\sogou.ico SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kfcdetect.dll duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksbwdet2.dll duba_3_295.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_clearlist_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_download_begin_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_play_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_set_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\PP安卓助手\msvcp120.dll ppah_ad_tuiguang8_Setup.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_TVSeries_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\us_pause.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\codecs\ff_kernelDeint.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\HotGamePlugin.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treeclose_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\downloaed_flag.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\Program Files\006czSTKjw1evtw7rmsm9g30a00a04kg.gif 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe File created C:\Program Files (x86)\PP安卓助手\Product.config ppah_ad_tuiguang8_Setup.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_del_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_downloadset_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_exnode_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_preLoad_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\i_no_link.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\codecs\ogm.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kseescan.dll duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_pause_nor.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_resotre_hover_top.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_title_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_upload_video_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\SHControl.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\update\chupgrade.ini kxetray.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_cycleplay_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_next_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_pause_nor.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_play_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treeLess_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\win_normal_rt.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\SoHuLiveUpdate.exe SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_previous_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_refresh_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_share_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_showconsole_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_username_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\lyric_btn_search_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksreng3.dll duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_speedhide_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\dbtn_shortcut_del_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\us_five.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\codecs\Real\dnet3260.dll SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksedset.ini duba_3_295.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule \Program Files\setup_30004.exe nsis_installer_1 \Program Files\setup_30004.exe nsis_installer_2 C:\Program Files\setup_30004.exe nsis_installer_1 C:\Program Files\setup_30004.exe nsis_installer_2 C:\Program Files\setup_30004.exe nsis_installer_1 C:\Program Files\setup_30004.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
360se.exe360se.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
SHPlayer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SHPlayer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer SHPlayer.exe -
Processes:
music_21_1_yc.exeSHRes.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main music_21_1_yc.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main SHRes.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
kxescore.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs kxescore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs kxescore.exe -
Modifies registry class 64 IoCs
Processes:
FileAssociationsTool.exeSHRes.exe360se.exeduba_3_295.exeFileAssociationsTool.exeFileAssociationsTool.exeregsvr32.exeregsvr32.exeSohuVA.exeFileAssociationsTool.exeFileAssociationsTool.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.amr FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{BE50E592-35AC-45FB-8174-A64F81B3C6F1}\TypeLib\Version = "1.0" SHRes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6672FCB5-5CD3-43D2-AC84-42CA85CEAA14} SHRes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\ftp\shell\open\ddeexec\ 360se.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mkv\ FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F64C4F5C-1147-42BC-B120-3FA8DA5D898F}\ProgID SHRes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C9D56DC9-AFC4-4A04-8084-6463B047CD26} SHRes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\ = "使用搜狐影音播放" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHRes.SHFlashWnd\CurVer SHRes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.3gpp\shell\open\command FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.mpeg\shell\open FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.mpeg\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2v\DefaultIcon\ = "C:\\Program Files (x86)\\搜狐影音\\Skin\\Default\\player\\icon\\logo.ico" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.m4v\ FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.mpeg\ = "媒体文件(.mpeg)" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2ts FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\360seURL\shell 360se.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ogg\ FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.3gp\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.ts\DefaultIcon\ = "C:\\Program Files (x86)\\搜狐影音\\Skin\\Default\\player\\icon\\logo.ico" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{93A75914-F6D0-45CA-90D9-5259203F89B3}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.asf\shell FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.aac\DefaultIcon\ = "C:\\Program Files (x86)\\搜狐影音\\Skin\\Default\\player\\icon\\logo.ico" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6672FCB5-5CD3-43D2-AC84-42CA85CEAA14}\TypeLib\Version = "1.0" SHRes.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EB10A985-FAED-4612-85D1-DAD997C2FBED} regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\360seURL\Application\ApplicationIcon = "C:\\Users\\Admin\\AppData\\Roaming\\360se6\\Application\\360se.exe,0" 360se.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "phcs4b9taeo4j5vzpfskpggcozaj" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.3gp\shell\ = "open" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.qt\shell\open\ = "使用搜狐影音播放" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.flc\shell\ = "open" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{981DF888-FA0A-4677-8F20-AA09100BF6C0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\ = "使用搜狐影音播放" SohuVA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{C9D56DC9-AFC4-4A04-8084-6463B047CD26}\ProxyStubClsid32 SHRes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.asf\shell\open\ = "使用搜狐影音播放" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.ram\shell\open\command FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\command FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\SHPlayer.exe\shell\open\command FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.avi FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.aac\shell\open FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4B8712D5-7F58-49A4-A968-40956A4C7808}\ = "ISHResUtility" SHRes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SohuBHO.SohuDetector\CurVer\ = "SohuBHO.SohuDetector.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2ts\ = "媒体文件(.m2ts)" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ifox FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2v\ = "媒体文件(.m2v)" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2v\shell\open FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.mp4\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.asf\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_3_295.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000_CLASSES\360seURL\shell\open 360se.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.fli\DefaultIcon FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2p\shell\ = "open" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2ts\shell FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.mpeg\shell\ = "open" FileAssociationsTool.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.m2ts\shell\open\command FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHPlayer.qt\shell\open\command\ = "\"C:\\Program Files (x86)\\搜狐影音\\SHPlayer.exe\" \"%1\"" FileAssociationsTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SHRes.SHResUtility\CurVer\ = "SHRes.SHResUtility.1" SHRes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6672FCB5-5CD3-43D2-AC84-42CA85CEAA14}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" SHRes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8381A5DF-B3FB-4AB6-A62F-1FE9D78A31E5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe -
Processes:
kxescore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 040000000100000010000000cb17e431673ee209fe455793f30afa1c0f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c909000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030353000000010000002500000030233021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c01400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331330b000000010000001200000056006500720069005300690067006e0000001d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3610300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e5190000000100000010000000d8b5fb368468620275d142ffd2aade372000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a kxescore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exeppah_ad_tuiguang8_Setup.exeduba_3_295.exemusic_21_1_yc.exeSoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exekxescore.exeQQPCDownload72844.exekxetray.exepid process 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 1248 ppah_ad_tuiguang8_Setup.exe 364 duba_3_295.exe 364 duba_3_295.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2560 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 2700 kxescore.exe 2916 QQPCDownload72844.exe 2916 QQPCDownload72844.exe 2700 kxescore.exe 2700 kxescore.exe 364 duba_3_295.exe 364 duba_3_295.exe 2812 kxetray.exe 2812 kxetray.exe 2700 kxescore.exe 2700 kxescore.exe 2700 kxescore.exe 2700 kxescore.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
pid process 464 464 464 464 -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
setup_30004.exe360se_nanaxt9.exeduba_3_295.exekislive.exekxescore.exekxetray.exeSHPlayer.exedescription pid process Token: SeDebugPrivilege 272 setup_30004.exe Token: 33 936 360se_nanaxt9.exe Token: SeIncBasePriorityPrivilege 936 360se_nanaxt9.exe Token: SeDebugPrivilege 364 duba_3_295.exe Token: SeDebugPrivilege 2688 kislive.exe Token: SeDebugPrivilege 2700 kxescore.exe Token: SeDebugPrivilege 364 duba_3_295.exe Token: SeDebugPrivilege 2812 kxetray.exe Token: SeDebugPrivilege 2700 kxescore.exe Token: SeDebugPrivilege 2700 kxescore.exe Token: SeDebugPrivilege 2772 SHPlayer.exe Token: SeDebugPrivilege 2812 kxetray.exe Token: 33 2700 kxescore.exe Token: SeIncBasePriorityPrivilege 2700 kxescore.exe Token: SeDebugPrivilege 2812 kxetray.exe Token: 33 2700 kxescore.exe Token: SeIncBasePriorityPrivilege 2700 kxescore.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
ahelper.exeQQPCDownload72844.exekxetray.exeSHPlayer.exepid process 1868 ahelper.exe 1868 ahelper.exe 1868 ahelper.exe 2916 QQPCDownload72844.exe 2812 kxetray.exe 2812 kxetray.exe 2772 SHPlayer.exe 2772 SHPlayer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
ahelper.exeQQPCDownload72844.exekxetray.exeSHPlayer.exepid process 1868 ahelper.exe 1868 ahelper.exe 1868 ahelper.exe 2916 QQPCDownload72844.exe 2812 kxetray.exe 2812 kxetray.exe 2772 SHPlayer.exe 2772 SHPlayer.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
xxxx_@rgybn@_51792_21000001.exeahelper.exemusic_21_1_yc.exeSHRes.exeSHPlayer.exekwsprotect64.exekxetray.exepid process 1388 xxxx_@rgybn@_51792_21000001.exe 1388 xxxx_@rgybn@_51792_21000001.exe 1868 ahelper.exe 1868 ahelper.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe 1780 SHRes.exe 2772 SHPlayer.exe 1780 SHRes.exe 1780 SHRes.exe 2212 kwsprotect64.exe 2212 kwsprotect64.exe 2812 kxetray.exe 2812 kxetray.exe 2812 kxetray.exe 2248 music_21_1_yc.exe 2248 music_21_1_yc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exeppah_ad_tuiguang8_Setup.execmd.execmd.execmd.execmd.execmd.exeadevicehelpersvr.exedescription pid process target process PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 272 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 1156 wrote to memory of 1388 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 1156 wrote to memory of 1388 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 1156 wrote to memory of 1388 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 1156 wrote to memory of 1388 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1156 wrote to memory of 1248 1156 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 1248 wrote to memory of 780 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 780 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 780 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 780 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 780 wrote to memory of 1752 780 cmd.exe netsh.exe PID 780 wrote to memory of 1752 780 cmd.exe netsh.exe PID 780 wrote to memory of 1752 780 cmd.exe netsh.exe PID 780 wrote to memory of 1752 780 cmd.exe netsh.exe PID 1248 wrote to memory of 1600 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1600 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1600 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1600 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1600 wrote to memory of 1904 1600 cmd.exe conhost.exe PID 1600 wrote to memory of 1904 1600 cmd.exe conhost.exe PID 1600 wrote to memory of 1904 1600 cmd.exe conhost.exe PID 1600 wrote to memory of 1904 1600 cmd.exe conhost.exe PID 1248 wrote to memory of 1648 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1648 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1648 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1648 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1648 wrote to memory of 276 1648 cmd.exe netsh.exe PID 1648 wrote to memory of 276 1648 cmd.exe netsh.exe PID 1648 wrote to memory of 276 1648 cmd.exe netsh.exe PID 1648 wrote to memory of 276 1648 cmd.exe netsh.exe PID 1248 wrote to memory of 328 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 328 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 328 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 328 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 328 wrote to memory of 2024 328 cmd.exe adevicehelpersvr.exe PID 328 wrote to memory of 2024 328 cmd.exe adevicehelpersvr.exe PID 328 wrote to memory of 2024 328 cmd.exe adevicehelpersvr.exe PID 328 wrote to memory of 2024 328 cmd.exe adevicehelpersvr.exe PID 1248 wrote to memory of 1848 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1848 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1848 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1248 wrote to memory of 1848 1248 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 1848 wrote to memory of 568 1848 cmd.exe adevicehelpersvr.exe PID 1848 wrote to memory of 568 1848 cmd.exe adevicehelpersvr.exe PID 1848 wrote to memory of 568 1848 cmd.exe adevicehelpersvr.exe PID 1848 wrote to memory of 568 1848 cmd.exe adevicehelpersvr.exe PID 1248 wrote to memory of 1868 1248 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 1248 wrote to memory of 1868 1248 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 1248 wrote to memory of 1868 1248 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 1248 wrote to memory of 1868 1248 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 1096 wrote to memory of 436 1096 adevicehelpersvr.exe adevicehelpermon.exe PID 1096 wrote to memory of 436 1096 adevicehelpersvr.exe adevicehelpermon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe"C:\Users\Admin\AppData\Local\Temp\17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\setup_30004.exe"C:\Program Files\setup_30004.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\xxxx_@rgybn@_51792_21000001.exe"C:\Program Files\xxxx_@rgybn@_51792_21000001.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exe"C:\Program Files\ppah_ad_tuiguang8_Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP安卓助手" description="PP安卓助手主程序" dir=in program="C:\Program Files (x86)\PP安卓助手\ahelper.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP安卓助手" description="PP安卓助手主程序" dir=in program="C:\Program Files (x86)\PP安卓助手\ahelper.exe" action=allow4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP安卓助手连接模块" description="PP安卓助手连接模块" dir=in program="C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP助手设备连接" description="PP助手设备连接" dir=in program="C:\Program Files (x86)\PP安卓助手\PPLoader.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP助手设备连接" description="PP助手设备连接" dir=in program="C:\Program Files (x86)\PP安卓助手\PPLoader.exe" action=allow4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -install3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -install4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -start3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -start4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\PP安卓助手\ahelper.exe"C:\Program Files (x86)\PP安卓助手\ahelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\360se_nanaxt9.exe"C:\Program Files\360se_nanaxt9.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\360se6CR_DB416.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\360se6CR_DB416.tmp\setup.exe" --exe-path="C:\Program Files\360se_nanaxt9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Roaming\360se6\Application\7.1.1.531\Installer\setup.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\7.1.1.531\Installer\setup.exe" --launch-helper4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --do-shortcut=0_0_1 --set-homepage-overwrite=http://f.jiss360.cn --silent-install=3_1_1 --no-welcome-page --set-adfilter-mode=04⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies registry class
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=utility --channel="316.0.247359203\288333408" --lang=en-US --no-sandbox /prefetch:-6453510015⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Program Files\duba_3_295.exe"C:\Program Files\duba_3_295.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Sets file execution options in registry
- Adds Run key to start application
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd3⤵
- Executes dropped EXE
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd4⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore3⤵
- Executes dropped EXE
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\music_21_1_yc.exe"C:\Program Files\music_21_1_yc.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe"C:\Program Files\SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /PreventPinning "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\搜狐影音\卸载搜狐影音.lnk"3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /ModifyTaskbar "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\搜狐影音.lnk"3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /EnableAutoRun3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /ModifyMainShortcut3⤵
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /F3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /TIFOX3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /ChangeSohuVARunToSHplayerRun3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /ReleaseSWF3⤵
- Executes dropped EXE
-
C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe"C:\Program Files (x86)\搜狐影音\FileAssociationsTool.exe" /InstallSuccess 03⤵
- Executes dropped EXE
-
C:\Program Files (x86)\搜狐影音\SHRes.exe"C:\Program Files (x86)\搜狐影音\SHRes.exe" /RegServer3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\搜狐影音\SoHuAutoDetector.dll"3⤵
- Installs/modifies Browser Helper Object
- Modifies registry class
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\搜狐影音\SHUploadFile.dll"3⤵
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Program Files (x86)\搜狐影音\SohuDetector.dll"3⤵
- Modifies registry class
-
C:\Program Files (x86)\搜狐影音\SHPlayer.exe"C:\Program Files (x86)\搜狐影音\SHPlayer.exe" /auto3⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\搜狐影音\SohuVA.exe"C:\Program Files (x86)\搜狐影音\SohuVA.exe"3⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Program Files\QQPCDownload72844.exe"C:\Program Files\QQPCDownload72844.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP安卓助手连接模块" description="PP安卓助手连接模块" dir=in program="C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe" action=allow1⤵
- Modifies Windows Firewall
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "627783567-1510002821-1904120056-1620647906-658487497-4444492271965424189-553159717"1⤵
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\搜狐影音\SHRes.exe"C:\Program Files (x86)\搜狐影音\SHRes.exe" -Embedding1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PP安卓助手\ADBUtil.dllFilesize
100KB
MD5211420bf80fe2c1736fb5c0b52ce5e67
SHA1e03996fc662a4dfe59dfd560d79112670425b0d0
SHA2563c42cbea7340820150cc26fe6117d8e0d924ab5c9300ebb87726d3d1e5cd5f4d
SHA51241460e3ee28830b91375491f89d5042dab025aec5064f8b6f5738f7ddda671cd11cd7754a8fee7ba3deea3ef5e67d42273ee6d0df652efecfab32b7f333aff94
-
C:\Program Files (x86)\PP安卓助手\AdbWinApi.dllFilesize
131KB
MD551c42f59eb2e82048b1f6adfb20eed65
SHA1140f56618410132ccdac20a47cfa3f2f0686dcc0
SHA256f6e91ff7788aa9c0a4864bf41e7e38521ccebfd7403f4e7fe818c70b470c6443
SHA51222e7fcb61149e376baed45fc801524179428fb0c3cac9a0ac07f40d98a1244d2cacdaebc9b7e82dd4c4703f16a304c12acdd908c885e8f33c8b47eb8364f96e3
-
C:\Program Files (x86)\PP安卓助手\DEVICEHELPER.dllFilesize
564KB
MD583a44923e788b2d9678c89741cc000ba
SHA133a53d50ef4a95a298810b2e6206df195b80c6a9
SHA256027eeba519592832fab7d43d4f9df339da4b524c96283eb96cece18b58271f5f
SHA5120f7661ad3a922e8fb6e2886466cd938de39fa75ffdd5fc95d60d270f662cfff105ece833b0782dc89d01674984fa566fa06662058fbb835decdbc08ad11a3a28
-
C:\Program Files (x86)\PP安卓助手\MSVCP120.dllFilesize
444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
C:\Program Files (x86)\PP安卓助手\MSVCR120.dllFilesize
948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exeFilesize
161KB
MD53a6646298e6502716e60800259232c4e
SHA11f69e23c3a87a4dbf7036b3895756e97a70d3ae1
SHA25605bf742069166b963e065fc31e86cf43556c67b6d76de9a9eed7cf5d4d24343a
SHA512e3fff5b016cf32e3fbeec9dfd67eb4e2ec1c8c67c9f61e43d1b5917e9993379158ac973980a2cee379c8de55a9cfbbf524ac23dfb01606066b986234b9dc8d34
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exeFilesize
161KB
MD53a6646298e6502716e60800259232c4e
SHA11f69e23c3a87a4dbf7036b3895756e97a70d3ae1
SHA25605bf742069166b963e065fc31e86cf43556c67b6d76de9a9eed7cf5d4d24343a
SHA512e3fff5b016cf32e3fbeec9dfd67eb4e2ec1c8c67c9f61e43d1b5917e9993379158ac973980a2cee379c8de55a9cfbbf524ac23dfb01606066b986234b9dc8d34
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
C:\Program Files (x86)\PP安卓助手\ahelpercore.dllFilesize
1.5MB
MD5594ec49ccd4de92d6901ad51ea750d37
SHA10a3d3ea9ba3dff76b36deeb3056492a384ed751b
SHA25651c1ec9f0175ad51969f633d6783d70fd53fa40c3c9f4c0045175c0e7a357b5c
SHA512a2cb60e9cde8a2aa2c1095d1b07210279d157f52ae7748e70577238efee4f4d6054269b99c15ad2828be6f2035029fc531c5b4b9c38c92945bf0840030816663
-
C:\Program Files (x86)\PP安卓助手\monconfig.xmlFilesize
1KB
MD5a65fc810874d7f199366b7b4fb6bb70a
SHA16f6ca1921a6e32e2be5f6164ecf04a3299515847
SHA25670b8b5430fd2805f65843cdc8197c412c4002a93ffc597599fb8020aa8ceb61c
SHA51224a02cb3d1463291699e2b3382c9dd09dd00c12a284386ae6ef4587c12eaaa7c7c322142648df0bae2aa918c8786de1cf49614d7fbd3d0d5e01cb16ccb9a2bd3
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\sqlite3.dllFilesize
598KB
MD5e7beda46fe2ebb0a5e247a7992bda21d
SHA14cb792f5d912ec0f89f5f3de80935f944eaa4840
SHA256647b29f50b0ee42e8aacfd6fa69d1930bb579caac52748d822adc0e17cedf735
SHA5124a29d0735424b473e8473fd8039a126963989dd16617e2fd2c5fca74e5dd5e07c809760ee2a248f3450b381db44ed74f0a3cfe86a02cde62534ef9eb344d7299
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exeFilesize
9.7MB
MD5bc9fb547cff37669c24ef347bed92aae
SHA1c14b8fd549f91dfbc19fb21caeb17d52a27fb7fc
SHA256e55acc0501b58ab686c9270eaac25a01934ed3ca660591900857fa0ad44b9c6c
SHA5120f70c4776d04e60bd56bccceadc1feec66b2220cea3bd71d62c352cda0ab9cdc549b794f46b737be81ab2be25122f7c6a3fd713bd7b62c346868a3a35b1219cb
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exeFilesize
9.7MB
MD5bc9fb547cff37669c24ef347bed92aae
SHA1c14b8fd549f91dfbc19fb21caeb17d52a27fb7fc
SHA256e55acc0501b58ab686c9270eaac25a01934ed3ca660591900857fa0ad44b9c6c
SHA5120f70c4776d04e60bd56bccceadc1feec66b2220cea3bd71d62c352cda0ab9cdc549b794f46b737be81ab2be25122f7c6a3fd713bd7b62c346868a3a35b1219cb
-
C:\Program Files\setup_30004.exeFilesize
630KB
MD5272edafd76205919cd3f5218cd14d247
SHA16a45cf0768211067a5924dc8cc1555a4ccc6831a
SHA25673b2afe10f7935444a1712d94765f5f762a0dddbbb09353a0f605376696a1546
SHA512357cb57d6658b3b8632e9e8564b5b3ccafb0703ac0d4d0c1f0e5fb040db7829108f93d2c6f28cd73878a598d54924977a75d120fffc91d46c153d5ec229de4f2
-
C:\Program Files\setup_30004.exeFilesize
630KB
MD5272edafd76205919cd3f5218cd14d247
SHA16a45cf0768211067a5924dc8cc1555a4ccc6831a
SHA25673b2afe10f7935444a1712d94765f5f762a0dddbbb09353a0f605376696a1546
SHA512357cb57d6658b3b8632e9e8564b5b3ccafb0703ac0d4d0c1f0e5fb040db7829108f93d2c6f28cd73878a598d54924977a75d120fffc91d46c153d5ec229de4f2
-
C:\Program Files\xxxx_@rgybn@_51792_21000001.exeFilesize
3.8MB
MD5c56ccba4c33c8666f96cce9247831c93
SHA1e842efdaa3afd8a7f482bda96bc21ff2e45f8e91
SHA256fe30619b3491a31782798b2814988051528863e28c71bd9ced9f58e879e9890a
SHA5121351c033931d33cc54c28e3729fbf40b556b358cfb9a02abf8f92ceff1f2fe7446b0a241b82b11a4d51fddca07260ce5792351847f81f41886283019fbf60893
-
\Program Files (x86)\PP安卓助手\ADBUtil.dllFilesize
100KB
MD5211420bf80fe2c1736fb5c0b52ce5e67
SHA1e03996fc662a4dfe59dfd560d79112670425b0d0
SHA2563c42cbea7340820150cc26fe6117d8e0d924ab5c9300ebb87726d3d1e5cd5f4d
SHA51241460e3ee28830b91375491f89d5042dab025aec5064f8b6f5738f7ddda671cd11cd7754a8fee7ba3deea3ef5e67d42273ee6d0df652efecfab32b7f333aff94
-
\Program Files (x86)\PP安卓助手\AdbWinApi.dllFilesize
131KB
MD551c42f59eb2e82048b1f6adfb20eed65
SHA1140f56618410132ccdac20a47cfa3f2f0686dcc0
SHA256f6e91ff7788aa9c0a4864bf41e7e38521ccebfd7403f4e7fe818c70b470c6443
SHA51222e7fcb61149e376baed45fc801524179428fb0c3cac9a0ac07f40d98a1244d2cacdaebc9b7e82dd4c4703f16a304c12acdd908c885e8f33c8b47eb8364f96e3
-
\Program Files (x86)\PP安卓助手\DeviceHelper.dllFilesize
564KB
MD583a44923e788b2d9678c89741cc000ba
SHA133a53d50ef4a95a298810b2e6206df195b80c6a9
SHA256027eeba519592832fab7d43d4f9df339da4b524c96283eb96cece18b58271f5f
SHA5120f7661ad3a922e8fb6e2886466cd938de39fa75ffdd5fc95d60d270f662cfff105ece833b0782dc89d01674984fa566fa06662058fbb835decdbc08ad11a3a28
-
\Program Files (x86)\PP安卓助手\adevicehelpermon.exeFilesize
161KB
MD53a6646298e6502716e60800259232c4e
SHA11f69e23c3a87a4dbf7036b3895756e97a70d3ae1
SHA25605bf742069166b963e065fc31e86cf43556c67b6d76de9a9eed7cf5d4d24343a
SHA512e3fff5b016cf32e3fbeec9dfd67eb4e2ec1c8c67c9f61e43d1b5917e9993379158ac973980a2cee379c8de55a9cfbbf524ac23dfb01606066b986234b9dc8d34
-
\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
\Program Files (x86)\PP安卓助手\ahelpercore.dllFilesize
1.5MB
MD5594ec49ccd4de92d6901ad51ea750d37
SHA10a3d3ea9ba3dff76b36deeb3056492a384ed751b
SHA25651c1ec9f0175ad51969f633d6783d70fd53fa40c3c9f4c0045175c0e7a357b5c
SHA512a2cb60e9cde8a2aa2c1095d1b07210279d157f52ae7748e70577238efee4f4d6054269b99c15ad2828be6f2035029fc531c5b4b9c38c92945bf0840030816663
-
\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
\Program Files (x86)\PP安卓助手\msvcp120.dllFilesize
444KB
MD5fd5cabbe52272bd76007b68186ebaf00
SHA1efd1e306c1092c17f6944cc6bf9a1bfad4d14613
SHA25687c42ca155473e4e71857d03497c8cbc28fa8ff7f2c8d72e8a1f39b71078f608
SHA5121563c8257d85274267089cd4aeac0884a2a300ff17f84bdb64d567300543aa9cd57101d8408d0077b01a600ddf2e804f7890902c2590af103d2c53ff03d9e4a5
-
\Program Files (x86)\PP安卓助手\msvcr120.dllFilesize
948KB
MD5034ccadc1c073e4216e9466b720f9849
SHA1f19e9d8317161edc7d3e963cc0fc46bd5e4a55a1
SHA25686e39b5995af0e042fcdaa85fe2aefd7c9ddc7ad65e6327bd5e7058bc3ab615f
SHA5125f11ef92d936669ee834a5cef5c7d0e7703bf05d03dc4f09b9dcfe048d7d5adfaab6a9c7f42e8080a5e9aad44a35f39f3940d5cca20623d9cafe373c635570f7
-
\Program Files (x86)\PP安卓助手\sqlite3.dllFilesize
598KB
MD5e7beda46fe2ebb0a5e247a7992bda21d
SHA14cb792f5d912ec0f89f5f3de80935f944eaa4840
SHA256647b29f50b0ee42e8aacfd6fa69d1930bb579caac52748d822adc0e17cedf735
SHA5124a29d0735424b473e8473fd8039a126963989dd16617e2fd2c5fca74e5dd5e07c809760ee2a248f3450b381db44ed74f0a3cfe86a02cde62534ef9eb344d7299
-
\Program Files\ppah_ad_tuiguang8_Setup.exeFilesize
9.7MB
MD5bc9fb547cff37669c24ef347bed92aae
SHA1c14b8fd549f91dfbc19fb21caeb17d52a27fb7fc
SHA256e55acc0501b58ab686c9270eaac25a01934ed3ca660591900857fa0ad44b9c6c
SHA5120f70c4776d04e60bd56bccceadc1feec66b2220cea3bd71d62c352cda0ab9cdc549b794f46b737be81ab2be25122f7c6a3fd713bd7b62c346868a3a35b1219cb
-
\Program Files\setup_30004.exeFilesize
630KB
MD5272edafd76205919cd3f5218cd14d247
SHA16a45cf0768211067a5924dc8cc1555a4ccc6831a
SHA25673b2afe10f7935444a1712d94765f5f762a0dddbbb09353a0f605376696a1546
SHA512357cb57d6658b3b8632e9e8564b5b3ccafb0703ac0d4d0c1f0e5fb040db7829108f93d2c6f28cd73878a598d54924977a75d120fffc91d46c153d5ec229de4f2
-
\Program Files\xxxx_@rgybn@_51792_21000001.exeFilesize
3.8MB
MD5c56ccba4c33c8666f96cce9247831c93
SHA1e842efdaa3afd8a7f482bda96bc21ff2e45f8e91
SHA256fe30619b3491a31782798b2814988051528863e28c71bd9ced9f58e879e9890a
SHA5121351c033931d33cc54c28e3729fbf40b556b358cfb9a02abf8f92ceff1f2fe7446b0a241b82b11a4d51fddca07260ce5792351847f81f41886283019fbf60893
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\System.dllFilesize
11KB
MD5fc90dfb694d0e17b013d6f818bce41b0
SHA13243969886d640af3bfa442728b9f0dff9d5f5b0
SHA2567fe77ca13121a113c59630a3dba0c8aaa6372e8082393274da8f8608c4ce4528
SHA512324f13aa7a33c6408e2a57c3484d1691ecee7c3c1366de2bb8978c8dc66b18425d8cab5a32d1702c13c43703e36148a022263de7166afdce141da2b01169f1c6
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
\Users\Admin\AppData\Local\Temp\nsjC333.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\System.dllFilesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsDialogs.dllFilesize
9KB
MD5e75ae7cfe06ff9692d98a934f6aa2d3c
SHA1d5fd4a59a39630c4693ce656bbbc0a55ede0a500
SHA2561f861aeb145ebbb9a2628414e6dca6b06d0bfb252f2de624b86814cfec8097d0
SHA512ab4998f8f6bbb60321d0c2aa941d4e85319901960297059bf0832cf84b18dfbb120c3aa71963b46d3be3b7c9602434cb23f9a961c00de02403b3f266b294d41b
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
\Users\Admin\AppData\Local\Temp\nsyB148.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
memory/272-56-0x0000000000000000-mapping.dmp
-
memory/276-107-0x0000000000000000-mapping.dmp
-
memory/316-170-0x00000000037F0000-0x0000000004B38000-memory.dmpFilesize
19.3MB
-
memory/316-162-0x0000000000000000-mapping.dmp
-
memory/316-169-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/328-110-0x0000000000000000-mapping.dmp
-
memory/364-187-0x0000000003A60000-0x0000000003AE9000-memory.dmpFilesize
548KB
-
memory/364-157-0x0000000000000000-mapping.dmp
-
memory/364-160-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/364-200-0x0000000003A60000-0x0000000003AE9000-memory.dmpFilesize
548KB
-
memory/364-191-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/364-186-0x0000000003A60000-0x0000000003AE9000-memory.dmpFilesize
548KB
-
memory/364-341-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/436-138-0x0000000000000000-mapping.dmp
-
memory/568-120-0x0000000000000000-mapping.dmp
-
memory/780-98-0x0000000000000000-mapping.dmp
-
memory/936-152-0x0000000000000000-mapping.dmp
-
memory/1156-190-0x0000000002450000-0x0000000002570000-memory.dmpFilesize
1.1MB
-
memory/1156-184-0x00000000036A0000-0x0000000003937000-memory.dmpFilesize
2.6MB
-
memory/1156-183-0x00000000036A0000-0x0000000003937000-memory.dmpFilesize
2.6MB
-
memory/1156-198-0x00000000036A0000-0x0000000003937000-memory.dmpFilesize
2.6MB
-
memory/1156-159-0x0000000002450000-0x0000000002570000-memory.dmpFilesize
1.1MB
-
memory/1156-54-0x0000000074F91000-0x0000000074F93000-memory.dmpFilesize
8KB
-
memory/1248-72-0x0000000000000000-mapping.dmp
-
memory/1388-64-0x0000000000000000-mapping.dmp
-
memory/1480-281-0x0000000000000000-mapping.dmp
-
memory/1580-154-0x0000000000000000-mapping.dmp
-
memory/1600-102-0x0000000000000000-mapping.dmp
-
memory/1648-161-0x0000000000000000-mapping.dmp
-
memory/1648-106-0x0000000000000000-mapping.dmp
-
memory/1752-99-0x0000000000000000-mapping.dmp
-
memory/1840-274-0x0000000000000000-mapping.dmp
-
memory/1840-306-0x0000000000000000-mapping.dmp
-
memory/1848-119-0x0000000000000000-mapping.dmp
-
memory/1864-287-0x0000000000000000-mapping.dmp
-
memory/1868-155-0x0000000002640000-0x000000000265B000-memory.dmpFilesize
108KB
-
memory/1868-126-0x0000000000000000-mapping.dmp
-
memory/1904-103-0x0000000000000000-mapping.dmp
-
memory/2024-113-0x0000000000000000-mapping.dmp
-
memory/2112-285-0x0000000000000000-mapping.dmp
-
memory/2212-316-0x0000000000000000-mapping.dmp
-
memory/2236-175-0x0000000000000000-mapping.dmp
-
memory/2236-296-0x0000000000000000-mapping.dmp
-
memory/2248-188-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/2248-185-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/2248-176-0x0000000000000000-mapping.dmp
-
memory/2248-199-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/2436-291-0x0000000000000000-mapping.dmp
-
memory/2452-298-0x0000000000000000-mapping.dmp
-
memory/2520-293-0x0000000000000000-mapping.dmp
-
memory/2560-196-0x0000000000000000-mapping.dmp
-
memory/2588-289-0x0000000000000000-mapping.dmp
-
memory/2628-300-0x0000000000000000-mapping.dmp
-
memory/2640-201-0x0000000000000000-mapping.dmp
-
memory/2656-203-0x0000000000000000-mapping.dmp
-
memory/2672-205-0x0000000000000000-mapping.dmp
-
memory/2688-218-0x0000000002840000-0x000000000290D000-memory.dmpFilesize
820KB
-
memory/2688-212-0x0000000002320000-0x000000000233A000-memory.dmpFilesize
104KB
-
memory/2688-206-0x0000000000000000-mapping.dmp
-
memory/2696-256-0x0000000000000000-mapping.dmp
-
memory/2700-215-0x0000000000110000-0x000000000011E000-memory.dmpFilesize
56KB
-
memory/2700-219-0x0000000001220000-0x000000000124B000-memory.dmpFilesize
172KB
-
memory/2700-239-0x0000000003650000-0x0000000003772000-memory.dmpFilesize
1.1MB
-
memory/2700-241-0x0000000001100000-0x0000000001112000-memory.dmpFilesize
72KB
-
memory/2700-242-0x0000000001290000-0x00000000012A2000-memory.dmpFilesize
72KB
-
memory/2700-252-0x0000000001100000-0x0000000001111000-memory.dmpFilesize
68KB
-
memory/2700-243-0x0000000001470000-0x0000000001488000-memory.dmpFilesize
96KB
-
memory/2700-329-0x0000000001100000-0x0000000001111000-memory.dmpFilesize
68KB
-
memory/2700-216-0x0000000000FD0000-0x0000000000FFA000-memory.dmpFilesize
168KB
-
memory/2700-234-0x0000000002690000-0x0000000002740000-memory.dmpFilesize
704KB
-
memory/2700-237-0x00000000034F0000-0x0000000003644000-memory.dmpFilesize
1.3MB
-
memory/2700-225-0x0000000001100000-0x0000000001112000-memory.dmpFilesize
72KB
-
memory/2772-302-0x0000000000000000-mapping.dmp
-
memory/2772-372-0x0000000065EC0000-0x00000000667FB000-memory.dmpFilesize
9.2MB
-
memory/2772-375-0x0000000065EC0000-0x00000000667FB000-memory.dmpFilesize
9.2MB
-
memory/2772-393-0x0000000065EC0000-0x00000000667FB000-memory.dmpFilesize
9.2MB
-
memory/2812-263-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-213-0x00000000025D0000-0x0000000002763000-memory.dmpFilesize
1.6MB
-
memory/2812-246-0x0000000003C10000-0x0000000003D32000-memory.dmpFilesize
1.1MB
-
memory/2812-227-0x00000000029E0000-0x00000000029F8000-memory.dmpFilesize
96KB
-
memory/2812-248-0x0000000003D40000-0x0000000003D6A000-memory.dmpFilesize
168KB
-
memory/2812-222-0x0000000002770000-0x00000000029D8000-memory.dmpFilesize
2.4MB
-
memory/2812-265-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-250-0x0000000003D70000-0x0000000003D9B000-memory.dmpFilesize
172KB
-
memory/2812-264-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-210-0x0000000000000000-mapping.dmp
-
memory/2812-262-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-330-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-331-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-332-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2812-333-0x0000000003810000-0x0000000003821000-memory.dmpFilesize
68KB
-
memory/2864-266-0x0000000000000000-mapping.dmp
-
memory/2916-245-0x0000000003220000-0x0000000003231000-memory.dmpFilesize
68KB
-
memory/2916-221-0x0000000000000000-mapping.dmp
-
memory/2972-270-0x0000000000000000-mapping.dmp