Analysis
-
max time kernel
153s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-06-2022 19:02
Static task
static1
Behavioral task
behavioral1
Sample
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe
Resource
win7-20220414-en
General
-
Target
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe
-
Size
726KB
-
MD5
50d0eeb5f7b2657ef9449f4b023ec164
-
SHA1
3b49a623038bdb87a64b2d49122da99068b55e3f
-
SHA256
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14
-
SHA512
d0f30087f24bcb94b36712326ccb29dae7a9593f0652578548405b1d20f20b5ed78f30d9622ed273e756f0ac83359f0579978089d4f450268898b9ed5eecd4c7
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 14 IoCs
Processes:
duba_3_295.exekxescore.exedescription ioc process File created C:\Windows\system32\drivers\kisnetm.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisnetmxp.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksapi64.sys duba_3_295.exe File opened for modification C:\Windows\SysWOW64\drivers\kisknl.sys kxescore.exe File created C:\Windows\system32\drivers\bc.sys duba_3_295.exe File opened for modification C:\Windows\system32\drivers\kisknl.sys kxescore.exe File opened for modification C:\Windows\SysWOW64\drivers\KAVBase.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksapi.sys duba_3_295.exe File created C:\Windows\system32\drivers\ksskrpr.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisknl.sys kxescore.exe File opened for modification C:\Windows\system32\drivers\bc.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisknl.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisknl64.sys duba_3_295.exe File created C:\Windows\system32\drivers\kisnetm64.sys duba_3_295.exe -
Executes dropped EXE 33 IoCs
Processes:
setup_30004.exexxxx_@rgybn@_51792_21000001.exeppah_ad_tuiguang8_Setup.exeadevicehelpersvr.exeadevicehelpersvr.exeadevicehelpersvr.exeahelper.exeadevicehelpermon.exeadevicehelpermon.exeadevicehelpermon.exeadevicehelpermon.exeadevicehelpermon.exeadevicehelpermon.exe360se_nanaxt9.exesetup.exeduba_3_295.exe360se.exesetup.exe360se.exe360se.exe360se.exe360se.exe360se.exemusic_21_1_yc.exe360se.exeSoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exeQQPCDownload72844.exekavlog2.exekxetray.exekxescore.exekislive.exekxescore.exe360se.exepid process 768 setup_30004.exe 4172 xxxx_@rgybn@_51792_21000001.exe 3684 ppah_ad_tuiguang8_Setup.exe 3228 adevicehelpersvr.exe 3616 adevicehelpersvr.exe 928 adevicehelpersvr.exe 2264 ahelper.exe 4912 adevicehelpermon.exe 4504 adevicehelpermon.exe 4752 adevicehelpermon.exe 3776 adevicehelpermon.exe 3752 adevicehelpermon.exe 2108 adevicehelpermon.exe 4944 360se_nanaxt9.exe 1332 setup.exe 4520 duba_3_295.exe 1820 360se.exe 4188 setup.exe 3388 360se.exe 708 360se.exe 4232 360se.exe 632 360se.exe 4524 360se.exe 2980 music_21_1_yc.exe 2888 360se.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 1912 QQPCDownload72844.exe 3800 kavlog2.exe 4776 kxetray.exe 4768 kxescore.exe 740 kislive.exe 1484 kxescore.exe 64 360se.exe -
Modifies Windows Firewall 1 TTPs 3 IoCs
Processes:
netsh.exenetsh.exenetsh.exepid process 1764 netsh.exe 4648 netsh.exe 4560 netsh.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
Processes:
duba_3_295.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 duba_3_295.exe -
Sets file execution options in registry 2 TTPs 28 IoCs
Processes:
duba_3_295.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KDRVMGR.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kiscall.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISCALL.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kislive.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kismain.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSETUPWIZ.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxetray.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kisaddin.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISADDIN.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISLIVE.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\UNINST.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kdrvmgr.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSCAN.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksetupwiz.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KISMAIN.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krecycle.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kscan.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ksignsp.exe duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kavlog2.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KSIGNSP.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kxescore.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KXETRAY.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scomregsvrv8.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SCOMREGSVRV8.EXE duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\uninst.exe duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KAVLOG2.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KRECYCLE.EXE duba_3_295.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\KXESCORE.EXE duba_3_295.exe -
Sets service image path in registry 2 TTPs 2 IoCs
Processes:
kxescore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\kisknl\ImagePath = "\\??\\C:\\Windows\\system32\\drivers\\kisknl.sys" kxescore.exe -
Processes:
resource yara_rule behavioral2/memory/4520-237-0x0000000000400000-0x0000000000520000-memory.dmp upx behavioral2/memory/2980-295-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral2/memory/2980-304-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral2/memory/4520-334-0x0000000000400000-0x0000000000520000-memory.dmp upx behavioral2/memory/2980-335-0x0000000000400000-0x0000000000697000-memory.dmp upx behavioral2/memory/4520-432-0x0000000000400000-0x0000000000520000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exeppah_ad_tuiguang8_Setup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation ppah_ad_tuiguang8_Setup.exe -
Loads dropped DLL 64 IoCs
Processes:
setup_30004.exeppah_ad_tuiguang8_Setup.exeadevicehelpersvr.exeadevicehelpersvr.exeadevicehelpersvr.exeahelper.exeadevicehelpermon.exeadevicehelpermon.exepid process 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 768 setup_30004.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3228 adevicehelpersvr.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3616 adevicehelpersvr.exe 928 adevicehelpersvr.exe 2264 ahelper.exe 2264 ahelper.exe 2264 ahelper.exe 2264 ahelper.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4912 adevicehelpermon.exe 4504 adevicehelpermon.exe 4504 adevicehelpermon.exe 4504 adevicehelpermon.exe 4504 adevicehelpermon.exe 4504 adevicehelpermon.exe 4504 adevicehelpermon.exe 4912 adevicehelpermon.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 104.192.108.157 -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
duba_3_295.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kxesc = "\"c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kxetray.exe\" -autorun" duba_3_295.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
duba_3_295.exedescription ioc process File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini duba_3_295.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\desktop.ini duba_3_295.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 7 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
360se.exeQQPCDownload72844.exeduba_3_295.exe17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exesetup.exe360se.exe360se.exedescription ioc process File opened for modification \??\PhysicalDrive0 360se.exe File opened for modification \??\PhysicalDrive0 QQPCDownload72844.exe File opened for modification \??\PhysicalDrive0 duba_3_295.exe File opened for modification \??\PHYSICALDRIVE0 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe File opened for modification \??\PhysicalDrive0 setup.exe File opened for modification \??\PhysicalDrive0 360se.exe File opened for modification \??\PhysicalDrive0 360se.exe -
Drops file in System32 directory 1 IoCs
Processes:
kavlog2.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\KAVEventLog.EVT kavlog2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
music_21_1_yc.exepid process 2980 music_21_1_yc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exeduba_3_295.exekxetray.exeppah_ad_tuiguang8_Setup.exekxescore.exe17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exedescription ioc process File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_home_pre_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_speedhide_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\netmodeconfig.dat duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\ksscore.dll duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_minishow_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treedelete_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treedelete_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_episode_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_operating_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\option.ini kxetray.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_stop_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_dwdopenfloder_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_fullshow_pressed_top.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_pause_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\btn_radio_common_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treearrow_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\PP安卓助手\pploader.tra ppah_ad_tuiguang8_Setup.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_open_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\cs_bg.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\loading_btn_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_upload_nor.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\logo\logo_max.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\PP安卓助手\conx86.exe ppah_ad_tuiguang8_Setup.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\sp3a.nlb duba_3_295.exe File opened for modification \??\c:\program files (x86)\kingsoft\kingsoft antivirus\webui\Icon\btbg.gif kxescore.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_dwdplay_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_reverse_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treecycle_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\PP安卓助手\DriverInstallerX64.exe ppah_ad_tuiguang8_Setup.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\kseutil.dll duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\netbuyprot.dll duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_gotop_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_hideconsole_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_openfloder_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_play_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_treesearch_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\lyric_btn_desktop_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_finder_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_restore_normal.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_smartset_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\urlmon.cfg kxescore.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\kdrvmgr.exe duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_exnode_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_font_smart_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\btn_close_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\error.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe ppah_ad_tuiguang8_Setup.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\loading\generalloading.swf SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\upload\btn_download_delete_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\CenterConsole\btn_font_smart_disable.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\CommonCtl\btn_frametap_pressed.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_max_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_minishow_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\Bubble_down.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\Program Files\006czSTKjw1evyi9isx2pg309l07u4qy.gif 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe File created C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe ppah_ad_tuiguang8_Setup.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\data\floatskin\shrink_skin_config.ini duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksde\klengine.dll duba_3_295.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_resotre_hover_top.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_shutdownset_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\window\btn_shutdownset_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File opened for modification C:\Program Files (x86)\搜狐影音\Skin\Default\player\Frames\btn_preLoad_hover.png SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\kxescan\bc.sys duba_3_295.exe File created \??\c:\program files (x86)\kingsoft\kingsoft antivirus\security\ksnetm\kisnetm64.sys duba_3_295.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Program Files\setup_30004.exe nsis_installer_1 C:\Program Files\setup_30004.exe nsis_installer_2 C:\Program Files\setup_30004.exe nsis_installer_1 C:\Program Files\setup_30004.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
360se.exekxetray.exe360se.exe360se.exe360se.exe360se.exe360se.exe360se.exe360se.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString kxetray.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 360se.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 360se.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 kxetray.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
kxescore.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates kxescore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs kxescore.exe -
Modifies registry class 64 IoCs
Processes:
ahelper.exeduba_3_295.exekxetray.exekxescore.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\DefaultIcon\ = "C:\\Program Files (x86)\\PP安卓助手\\ahelper.exe,2" ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51} duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\Shellex\ContextMenuHandlers\duba_64bit duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "1" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "koz5ikhdsa2qylafyjxk2uihvgo8" duba_3_295.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\shell\open ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu64.dll" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FE82F604-65FC-4692-9D6E-3014CA28B8D6} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32 duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32 duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idno = "0" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\Shell\Open\Command\ = "\"C:\\Program Files (x86)\\PP安卓助手\\ahelper.exe\" \"%1\"" ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.apk ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxescore.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0} duba_3_295.exe Set value (int) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "856425046" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\Shellex\ContextMenuHandlers\duba_64bit duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\ = "CKavMenuShell Class" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\Shell\Open\Command ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\path = "C:\\Program Files (x86)\\PP安卓助手\\ahelper.exe" ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\shell\open\ = "安装" ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}\InprocServer32\ = "c:\\program files (x86)\\kingsoft\\kingsoft antivirus\\kavmenu.dll" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\URL Protocol ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}\InprocServer32\ThreadingModel = "Apartment" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_64bit duba_3_295.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\svrid = "koz5ikhdsa2qylafyjxk2uihvgo8" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\Shellex\ContextMenuHandlers\duba_64bit duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_64bit\ = "{DDEA5705-1BB0-4C03-AC1E-8FF9716A0D51}" duba_3_295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\mid = "856425046" duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8F6F795A-6457-4603-A561-684CF512AC68} kxetray.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\Shell\Open ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4} duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories duba_3_295.exe Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\ = "URL:PPahelper Protocol" ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper\Shell ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\ = "使用PP助手安装" ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\shell ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID duba_3_295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PPahelper ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ahelper\shell\open\command\ = "C:\\Program Files (x86)\\PP安卓助手\\ahelper.exe \"%1\"" ahelper.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.apk\ = "ahelper" ahelper.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\duba_32bit duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\duba_32bit\ = "{D21D88E8-4123-48BA-B0B1-3FDBE4AE5FA4}" duba_3_295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9B7A98EC-7EF9-468c-ACC8-37C793DBD7E0}\Implemented Categories\{A5F7140E-4311-4ef9-AABC-F55941B5EBE5}\idex = "9b4498be2eb8573cbed0addc0550773e" duba_3_295.exe -
Processes:
kxescore.exe360se.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 360se.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 360se.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\742C3192E607E424EB4549542BE1BBC53E6174E2\Blob = 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 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 kxescore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 360se.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exeppah_ad_tuiguang8_Setup.exeduba_3_295.exemusic_21_1_yc.exeSoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exepid process 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 3684 ppah_ad_tuiguang8_Setup.exe 4520 duba_3_295.exe 4520 duba_3_295.exe 4520 duba_3_295.exe 4520 duba_3_295.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe 4500 SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
360se.exepid process 1820 360se.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
pid process 664 664 664 664 -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
setup_30004.exe360se_nanaxt9.exeduba_3_295.exe360se.exe360se.exeAUDIODG.EXE360se.exekislive.exekxescore.exekxetray.exe360se.exedescription pid process Token: SeDebugPrivilege 768 setup_30004.exe Token: 33 4944 360se_nanaxt9.exe Token: SeIncBasePriorityPrivilege 4944 360se_nanaxt9.exe Token: SeDebugPrivilege 4520 duba_3_295.exe Token: SeManageVolumePrivilege 4232 360se.exe Token: SeManageVolumePrivilege 708 360se.exe Token: 33 4944 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4944 AUDIODG.EXE Token: 33 1820 360se.exe Token: SeIncBasePriorityPrivilege 1820 360se.exe Token: SeDebugPrivilege 740 kislive.exe Token: SeDebugPrivilege 1484 kxescore.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 1484 kxescore.exe Token: SeDebugPrivilege 1484 kxescore.exe Token: SeDebugPrivilege 4520 duba_3_295.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: 33 1484 kxescore.exe Token: SeIncBasePriorityPrivilege 1484 kxescore.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeManageVolumePrivilege 64 360se.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe Token: SeDebugPrivilege 4776 kxetray.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
Processes:
ahelper.exe360se.exekxetray.exeQQPCDownload72844.exepid process 2264 ahelper.exe 2264 ahelper.exe 2264 ahelper.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 1820 360se.exe 4776 kxetray.exe 1912 QQPCDownload72844.exe 4776 kxetray.exe 4776 kxetray.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
ahelper.exe360se.exekxetray.exeQQPCDownload72844.exepid process 2264 ahelper.exe 2264 ahelper.exe 2264 ahelper.exe 1820 360se.exe 4776 kxetray.exe 1912 QQPCDownload72844.exe 4776 kxetray.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
xxxx_@rgybn@_51792_21000001.exeahelper.exemusic_21_1_yc.exepid process 4172 xxxx_@rgybn@_51792_21000001.exe 4172 xxxx_@rgybn@_51792_21000001.exe 2264 ahelper.exe 2264 ahelper.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe 2980 music_21_1_yc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exeppah_ad_tuiguang8_Setup.execmd.execmd.execmd.execmd.execmd.exeadevicehelpersvr.exe360se_nanaxt9.exedescription pid process target process PID 5108 wrote to memory of 768 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 5108 wrote to memory of 768 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 5108 wrote to memory of 768 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe setup_30004.exe PID 5108 wrote to memory of 4172 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 5108 wrote to memory of 4172 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 5108 wrote to memory of 4172 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe xxxx_@rgybn@_51792_21000001.exe PID 5108 wrote to memory of 3684 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 5108 wrote to memory of 3684 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 5108 wrote to memory of 3684 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe ppah_ad_tuiguang8_Setup.exe PID 3684 wrote to memory of 3472 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 3472 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 3472 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3472 wrote to memory of 4648 3472 cmd.exe netsh.exe PID 3472 wrote to memory of 4648 3472 cmd.exe netsh.exe PID 3472 wrote to memory of 4648 3472 cmd.exe netsh.exe PID 3684 wrote to memory of 4924 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4924 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4924 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 4924 wrote to memory of 4560 4924 cmd.exe netsh.exe PID 4924 wrote to memory of 4560 4924 cmd.exe netsh.exe PID 4924 wrote to memory of 4560 4924 cmd.exe netsh.exe PID 3684 wrote to memory of 952 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 952 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 952 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 952 wrote to memory of 1764 952 cmd.exe netsh.exe PID 952 wrote to memory of 1764 952 cmd.exe netsh.exe PID 952 wrote to memory of 1764 952 cmd.exe netsh.exe PID 3684 wrote to memory of 4220 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4220 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4220 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 4220 wrote to memory of 3228 4220 cmd.exe adevicehelpersvr.exe PID 4220 wrote to memory of 3228 4220 cmd.exe adevicehelpersvr.exe PID 4220 wrote to memory of 3228 4220 cmd.exe adevicehelpersvr.exe PID 3684 wrote to memory of 4352 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4352 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 3684 wrote to memory of 4352 3684 ppah_ad_tuiguang8_Setup.exe cmd.exe PID 4352 wrote to memory of 3616 4352 cmd.exe adevicehelpersvr.exe PID 4352 wrote to memory of 3616 4352 cmd.exe adevicehelpersvr.exe PID 4352 wrote to memory of 3616 4352 cmd.exe adevicehelpersvr.exe PID 3684 wrote to memory of 2264 3684 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 3684 wrote to memory of 2264 3684 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 3684 wrote to memory of 2264 3684 ppah_ad_tuiguang8_Setup.exe ahelper.exe PID 928 wrote to memory of 4912 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4912 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4912 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4504 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4504 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4504 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 4752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3776 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3776 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3776 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 3752 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 2108 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 2108 928 adevicehelpersvr.exe adevicehelpermon.exe PID 928 wrote to memory of 2108 928 adevicehelpersvr.exe adevicehelpermon.exe PID 5108 wrote to memory of 4944 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 360se_nanaxt9.exe PID 5108 wrote to memory of 4944 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 360se_nanaxt9.exe PID 5108 wrote to memory of 4944 5108 17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe 360se_nanaxt9.exe PID 4944 wrote to memory of 1332 4944 360se_nanaxt9.exe setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe"C:\Users\Admin\AppData\Local\Temp\17f04b3536641fa295c1a11a814010f1f2319fc60b28890dcd536f5be5dfde14.exe"1⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\setup_30004.exe"C:\Program Files\setup_30004.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\xxxx_@rgybn@_51792_21000001.exe"C:\Program Files\xxxx_@rgybn@_51792_21000001.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exe"C:\Program Files\ppah_ad_tuiguang8_Setup.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP安卓助手" description="PP安卓助手主程序" dir=in program="C:\Program Files (x86)\PP安卓助手\ahelper.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP安卓助手" description="PP安卓助手主程序" dir=in program="C:\Program Files (x86)\PP安卓助手\ahelper.exe" action=allow4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP安卓助手连接模块" description="PP安卓助手连接模块" dir=in program="C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP安卓助手连接模块" description="PP安卓助手连接模块" dir=in program="C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe" action=allow4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh advfirewall firewall add rule name="PP助手设备连接" description="PP助手设备连接" dir=in program="C:\Program Files (x86)\PP安卓助手\PPLoader.exe" action=allow3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="PP助手设备连接" description="PP助手设备连接" dir=in program="C:\Program Files (x86)\PP安卓助手\PPLoader.exe" action=allow4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -install3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -install4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -start3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\ahelper.exe"C:\Program Files (x86)\PP安卓助手\ahelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\360se_nanaxt9.exe"C:\Program Files\360se_nanaxt9.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\360se6CR_AD475.tmp\setup.exe"C:\Users\Admin\AppData\Local\Temp\360se6CR_AD475.tmp\setup.exe" --exe-path="C:\Program Files\360se_nanaxt9.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=utility --channel="1820.0.609774763\606342383" --lang=en-US --no-sandbox /prefetch:-6453510015⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=renderer --enable-deferred-image-decoding --lang=en-US --renderer-print-preview --disable-html-notifications --channel="1820.1.148268875\854892437" /prefetch:6731311515⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=utility --channel="1820.2.1888636612\1430670302" --lang=en-US --ignored=" --type=renderer " /prefetch:-6453510015⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=seupdate -360se_safe_browsing_autoupdate --v3Wnd=0 --v3seProcId=18205⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\360se6\Application\7.1.1.531\Installer\setup.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\7.1.1.531\Installer\setup.exe" --launch-helper4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --do-shortcut=0_0_1 --set-homepage-overwrite=http://f.jiss360.cn --silent-install=3_1_1 --no-welcome-page --set-adfilter-mode=0 --have-user-data-dir=true4⤵
- Executes dropped EXE
- Checks processor information in registry
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=seupdate -360seautoupdate --v3Wnd=0 --v3seProcId=33885⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe"C:\Users\Admin\AppData\Roaming\360se6\Application\360se.exe" --type=seupdate -360se_safe_browsing_autoupdate --v3Wnd=0 --v3seProcId=33885⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\duba_3_295.exe"C:\Program Files\duba_3_295.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Sets file execution options in registry
- Adds Run key to start application
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kavlog2.exe" -install3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxetray.exe" /autorun /hidefloatwin /silentinstrcmd3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kwsprotect64.exe"kwsprotect64.exe" (null)4⤵
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /start kxescore3⤵
- Executes dropped EXE
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kislive.exe" /autorun /std /skipcs33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\music_21_1_yc.exe"C:\Program Files\music_21_1_yc.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe"C:\Program Files\SoHuVA_4.2.0.16-c204900001-ng-nti-tp-s-x.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\QQPCDownload72844.exe"C:\Program Files\QQPCDownload72844.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe" -start1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"C:\Program Files (x86)\PP安卓助手\adevicehelpermon.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ec 0x3081⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe"c:\program files (x86)\kingsoft\kingsoft antivirus\kxescore.exe" /service kxescore1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\adevicehelpersvr.exeFilesize
141KB
MD5b11fae7bb583dd46933225d6b29f647e
SHA13f4f71e1d4046ccc05769b06a1ab4efbb2790f23
SHA2568b6bf7887e435eb3c6d105ef296c184508e254ec61ade8f2317b9aa7f24ae452
SHA5128170cf305287e390a984c121d4e133325c8b23dfde642a02ee699891c103efc8b3ca8465cdf3846b7f29cef7d8e098e29ccd48fb3afa51daacd59458f1c85f91
-
C:\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
C:\Program Files (x86)\PP安卓助手\ahelper.exeFilesize
4.7MB
MD59ab1440bdd19cf38137be82fb8c3c192
SHA1bad57ad99d95a51eab9170602a1ed4733938dc8f
SHA25670d12bc54fdd9d5e6480e723ec50750b88af06e2c02c05a142f35285c61955e6
SHA5121f6aa6a2f9a7ba38ff7d3f81b8305844b5ce0bb42d75ae063a6e23a0469ea1a1389c61230097c505a798c0e4a9783736b2e08547e3e39995926e1028bd5b662f
-
C:\Program Files (x86)\PP安卓助手\ahelpercore.dllFilesize
1.5MB
MD5594ec49ccd4de92d6901ad51ea750d37
SHA10a3d3ea9ba3dff76b36deeb3056492a384ed751b
SHA25651c1ec9f0175ad51969f633d6783d70fd53fa40c3c9f4c0045175c0e7a357b5c
SHA512a2cb60e9cde8a2aa2c1095d1b07210279d157f52ae7748e70577238efee4f4d6054269b99c15ad2828be6f2035029fc531c5b4b9c38c92945bf0840030816663
-
C:\Program Files (x86)\PP安卓助手\ahelpercore.dllFilesize
1.5MB
MD5594ec49ccd4de92d6901ad51ea750d37
SHA10a3d3ea9ba3dff76b36deeb3056492a384ed751b
SHA25651c1ec9f0175ad51969f633d6783d70fd53fa40c3c9f4c0045175c0e7a357b5c
SHA512a2cb60e9cde8a2aa2c1095d1b07210279d157f52ae7748e70577238efee4f4d6054269b99c15ad2828be6f2035029fc531c5b4b9c38c92945bf0840030816663
-
C:\Program Files (x86)\PP安卓助手\monconfig.xmlFilesize
1KB
MD5a65fc810874d7f199366b7b4fb6bb70a
SHA16f6ca1921a6e32e2be5f6164ecf04a3299515847
SHA25670b8b5430fd2805f65843cdc8197c412c4002a93ffc597599fb8020aa8ceb61c
SHA51224a02cb3d1463291699e2b3382c9dd09dd00c12a284386ae6ef4587c12eaaa7c7c322142648df0bae2aa918c8786de1cf49614d7fbd3d0d5e01cb16ccb9a2bd3
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\monconfigapi.dllFilesize
192KB
MD57158b9ff27d3e75318106065c75542c1
SHA13ff6cb594e53fb16cc789bfdf86a34d4dc191d12
SHA2564170e276c2f7edc9ba4f98681cdca09d1ab53f0495c06b2bc259b640f4d6deb9
SHA51208ef06478bca4face60d748b4ce40824956f871e5710b97f894998fe78411e30382b4d4598d87eb2a9b9a491b9392e1c40efc3d72e3eec12c940c7bd821bf3f6
-
C:\Program Files (x86)\PP安卓助手\sqlite3.dllFilesize
598KB
MD5e7beda46fe2ebb0a5e247a7992bda21d
SHA14cb792f5d912ec0f89f5f3de80935f944eaa4840
SHA256647b29f50b0ee42e8aacfd6fa69d1930bb579caac52748d822adc0e17cedf735
SHA5124a29d0735424b473e8473fd8039a126963989dd16617e2fd2c5fca74e5dd5e07c809760ee2a248f3450b381db44ed74f0a3cfe86a02cde62534ef9eb344d7299
-
C:\Program Files (x86)\PP安卓助手\sqlite3.dllFilesize
598KB
MD5e7beda46fe2ebb0a5e247a7992bda21d
SHA14cb792f5d912ec0f89f5f3de80935f944eaa4840
SHA256647b29f50b0ee42e8aacfd6fa69d1930bb579caac52748d822adc0e17cedf735
SHA5124a29d0735424b473e8473fd8039a126963989dd16617e2fd2c5fca74e5dd5e07c809760ee2a248f3450b381db44ed74f0a3cfe86a02cde62534ef9eb344d7299
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exeFilesize
9.7MB
MD5bc9fb547cff37669c24ef347bed92aae
SHA1c14b8fd549f91dfbc19fb21caeb17d52a27fb7fc
SHA256e55acc0501b58ab686c9270eaac25a01934ed3ca660591900857fa0ad44b9c6c
SHA5120f70c4776d04e60bd56bccceadc1feec66b2220cea3bd71d62c352cda0ab9cdc549b794f46b737be81ab2be25122f7c6a3fd713bd7b62c346868a3a35b1219cb
-
C:\Program Files\ppah_ad_tuiguang8_Setup.exeFilesize
9.7MB
MD5bc9fb547cff37669c24ef347bed92aae
SHA1c14b8fd549f91dfbc19fb21caeb17d52a27fb7fc
SHA256e55acc0501b58ab686c9270eaac25a01934ed3ca660591900857fa0ad44b9c6c
SHA5120f70c4776d04e60bd56bccceadc1feec66b2220cea3bd71d62c352cda0ab9cdc549b794f46b737be81ab2be25122f7c6a3fd713bd7b62c346868a3a35b1219cb
-
C:\Program Files\setup_30004.exeFilesize
630KB
MD5272edafd76205919cd3f5218cd14d247
SHA16a45cf0768211067a5924dc8cc1555a4ccc6831a
SHA25673b2afe10f7935444a1712d94765f5f762a0dddbbb09353a0f605376696a1546
SHA512357cb57d6658b3b8632e9e8564b5b3ccafb0703ac0d4d0c1f0e5fb040db7829108f93d2c6f28cd73878a598d54924977a75d120fffc91d46c153d5ec229de4f2
-
C:\Program Files\setup_30004.exeFilesize
630KB
MD5272edafd76205919cd3f5218cd14d247
SHA16a45cf0768211067a5924dc8cc1555a4ccc6831a
SHA25673b2afe10f7935444a1712d94765f5f762a0dddbbb09353a0f605376696a1546
SHA512357cb57d6658b3b8632e9e8564b5b3ccafb0703ac0d4d0c1f0e5fb040db7829108f93d2c6f28cd73878a598d54924977a75d120fffc91d46c153d5ec229de4f2
-
C:\Program Files\xxxx_@rgybn@_51792_21000001.exeFilesize
3.8MB
MD5c56ccba4c33c8666f96cce9247831c93
SHA1e842efdaa3afd8a7f482bda96bc21ff2e45f8e91
SHA256fe30619b3491a31782798b2814988051528863e28c71bd9ced9f58e879e9890a
SHA5121351c033931d33cc54c28e3729fbf40b556b358cfb9a02abf8f92ceff1f2fe7446b0a241b82b11a4d51fddca07260ce5792351847f81f41886283019fbf60893
-
C:\Program Files\xxxx_@rgybn@_51792_21000001.exeFilesize
3.8MB
MD5c56ccba4c33c8666f96cce9247831c93
SHA1e842efdaa3afd8a7f482bda96bc21ff2e45f8e91
SHA256fe30619b3491a31782798b2814988051528863e28c71bd9ced9f58e879e9890a
SHA5121351c033931d33cc54c28e3729fbf40b556b358cfb9a02abf8f92ceff1f2fe7446b0a241b82b11a4d51fddca07260ce5792351847f81f41886283019fbf60893
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\System.dllFilesize
11KB
MD5fc90dfb694d0e17b013d6f818bce41b0
SHA13243969886d640af3bfa442728b9f0dff9d5f5b0
SHA2567fe77ca13121a113c59630a3dba0c8aaa6372e8082393274da8f8608c4ce4528
SHA512324f13aa7a33c6408e2a57c3484d1691ecee7c3c1366de2bb8978c8dc66b18425d8cab5a32d1702c13c43703e36148a022263de7166afdce141da2b01169f1c6
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsDialogs.dllFilesize
332KB
MD540f6ebba66559019a686f80f8ba3c60d
SHA122b366524730f53fd579d084be3db1abe18ea6b2
SHA256acb637140b00772e3d82fe46aed5d63742aa9ec15ab3df341e875e28a4456fa0
SHA51287f78728e5b50a215a3eb0683f00801a2b20ce0d245e9e0ac54461b3a2c494f9be782e48340c0b0fb36ad594dc3fbaec9daaaf4bbde4b5ea4190bbdebad842a9
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsg2F40.tmp\nsExec.dllFilesize
6KB
MD51128ee61dffa0a97d30b2f828235b289
SHA1b552f3d4f13894f2f30fb446893093ca78fe149c
SHA2561e33decac84bdd2b3a651c969258f8e6c90616e9ec35de6ab4f402709555ce4c
SHA512d470356be436997fc53c17b8546cc80b187538ad2f258788761b92c28d91ef733fe6d8b3b33c353d84d1e0ae089207efd1ebfde33a6d33d5a341960e7bcfc8f5
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\System.dllFilesize
11KB
MD5a436db0c473a087eb61ff5c53c34ba27
SHA165ea67e424e75f5065132b539c8b2eda88aa0506
SHA25675ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49
SHA512908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsDialogs.dllFilesize
9KB
MD5e75ae7cfe06ff9692d98a934f6aa2d3c
SHA1d5fd4a59a39630c4693ce656bbbc0a55ede0a500
SHA2561f861aeb145ebbb9a2628414e6dca6b06d0bfb252f2de624b86814cfec8097d0
SHA512ab4998f8f6bbb60321d0c2aa941d4e85319901960297059bf0832cf84b18dfbb120c3aa71963b46d3be3b7c9602434cb23f9a961c00de02403b3f266b294d41b
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsDialogs.dllFilesize
9KB
MD5e75ae7cfe06ff9692d98a934f6aa2d3c
SHA1d5fd4a59a39630c4693ce656bbbc0a55ede0a500
SHA2561f861aeb145ebbb9a2628414e6dca6b06d0bfb252f2de624b86814cfec8097d0
SHA512ab4998f8f6bbb60321d0c2aa941d4e85319901960297059bf0832cf84b18dfbb120c3aa71963b46d3be3b7c9602434cb23f9a961c00de02403b3f266b294d41b
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
C:\Users\Admin\AppData\Local\Temp\nsk1FA0.tmp\nsisdl.dllFilesize
14KB
MD586b723938b48dc670de8f1016c2fe603
SHA1ff432e1f5d2b8423872719520e9df4da401755c3
SHA256a238cb788e8077442358626fee022d0eb72fc228a5b11c101ab568662db27798
SHA5120a291d76fd950b6f4c725ba377aef42dd2ecfa2a2e7837cf6c98dfba8f4e6f30985a0d0028900d0528501b38f92ccca6353ab20acda2d3349db30021e78a2a5d
-
memory/64-439-0x0000000000000000-mapping.dmp
-
memory/632-256-0x0000000000000000-mapping.dmp
-
memory/708-254-0x0000000000000000-mapping.dmp
-
memory/708-330-0x0000000003FC0000-0x0000000004008000-memory.dmpFilesize
288KB
-
memory/708-280-0x0000000003AE0000-0x0000000003B53000-memory.dmpFilesize
460KB
-
memory/708-278-0x0000000003460000-0x000000000349B000-memory.dmpFilesize
236KB
-
memory/740-342-0x0000000000000000-mapping.dmp
-
memory/740-344-0x0000000002800000-0x000000000281A000-memory.dmpFilesize
104KB
-
memory/768-160-0x00000000022D1000-0x00000000022D3000-memory.dmpFilesize
8KB
-
memory/768-130-0x0000000000000000-mapping.dmp
-
memory/768-136-0x0000000002291000-0x0000000002294000-memory.dmpFilesize
12KB
-
memory/952-200-0x0000000000000000-mapping.dmp
-
memory/1332-235-0x0000000000000000-mapping.dmp
-
memory/1484-343-0x0000000000C40000-0x0000000000C4E000-memory.dmpFilesize
56KB
-
memory/1484-347-0x00000000013F0000-0x000000000141A000-memory.dmpFilesize
168KB
-
memory/1484-351-0x0000000001EB0000-0x0000000001EDB000-memory.dmpFilesize
172KB
-
memory/1764-201-0x0000000000000000-mapping.dmp
-
memory/1820-302-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-305-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-298-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-300-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-292-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-294-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-303-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-307-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-317-0x000000000BF90000-0x000000000BFF6000-memory.dmpFilesize
408KB
-
memory/1820-313-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-314-0x000000000491C000-0x000000000491F000-memory.dmpFilesize
12KB
-
memory/1820-238-0x0000000000000000-mapping.dmp
-
memory/1820-243-0x000000006FFF0000-0x0000000070000000-memory.dmpFilesize
64KB
-
memory/1912-337-0x0000000000000000-mapping.dmp
-
memory/1912-340-0x0000000002850000-0x0000000002861000-memory.dmpFilesize
68KB
-
memory/2108-232-0x0000000000000000-mapping.dmp
-
memory/2264-233-0x00000000030C0000-0x00000000030DB000-memory.dmpFilesize
108KB
-
memory/2264-219-0x0000000000000000-mapping.dmp
-
memory/2888-319-0x0000000000000000-mapping.dmp
-
memory/2980-304-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/2980-335-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/2980-286-0x0000000000000000-mapping.dmp
-
memory/2980-295-0x0000000000400000-0x0000000000697000-memory.dmpFilesize
2.6MB
-
memory/3228-205-0x0000000000000000-mapping.dmp
-
memory/3388-249-0x0000000000000000-mapping.dmp
-
memory/3472-192-0x0000000000000000-mapping.dmp
-
memory/3616-214-0x0000000000000000-mapping.dmp
-
memory/3684-172-0x0000000003000000-0x0000000003058000-memory.dmpFilesize
352KB
-
memory/3684-164-0x0000000000000000-mapping.dmp
-
memory/3752-231-0x0000000000000000-mapping.dmp
-
memory/3776-230-0x0000000000000000-mapping.dmp
-
memory/3800-338-0x0000000000000000-mapping.dmp
-
memory/4172-161-0x0000000000000000-mapping.dmp
-
memory/4188-248-0x0000000000000000-mapping.dmp
-
memory/4220-204-0x0000000000000000-mapping.dmp
-
memory/4232-315-0x0000000003C40000-0x0000000003CB3000-memory.dmpFilesize
460KB
-
memory/4232-287-0x00000000037B0000-0x00000000037EB000-memory.dmpFilesize
236KB
-
memory/4232-255-0x0000000000000000-mapping.dmp
-
memory/4232-332-0x0000000003DE0000-0x0000000003E28000-memory.dmpFilesize
288KB
-
memory/4352-213-0x0000000000000000-mapping.dmp
-
memory/4500-336-0x0000000000000000-mapping.dmp
-
memory/4504-228-0x0000000000000000-mapping.dmp
-
memory/4520-432-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/4520-334-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/4520-237-0x0000000000400000-0x0000000000520000-memory.dmpFilesize
1.1MB
-
memory/4520-236-0x0000000000000000-mapping.dmp
-
memory/4524-281-0x0000000000000000-mapping.dmp
-
memory/4560-197-0x0000000000000000-mapping.dmp
-
memory/4648-193-0x0000000000000000-mapping.dmp
-
memory/4752-229-0x0000000000000000-mapping.dmp
-
memory/4768-341-0x0000000000000000-mapping.dmp
-
memory/4776-339-0x0000000000000000-mapping.dmp
-
memory/4776-348-0x0000000002910000-0x0000000002B78000-memory.dmpFilesize
2.4MB
-
memory/4776-345-0x0000000002770000-0x0000000002903000-memory.dmpFilesize
1.6MB
-
memory/4912-227-0x0000000000000000-mapping.dmp
-
memory/4924-196-0x0000000000000000-mapping.dmp
-
memory/4944-234-0x0000000000000000-mapping.dmp
-
memory/5272-454-0x0000000000000000-mapping.dmp