Analysis
-
max time kernel
609s -
max time network
648s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2022 10:41
Behavioral task
behavioral1
Sample
iCUESetup_4.27.168_release.msi
Resource
win10v2004-20220812-en
General
-
Target
iCUESetup_4.27.168_release.msi
-
Size
1002.7MB
-
MD5
f9ffbb07216d04c2bd8f39a7a84cca9d
-
SHA1
04215fb570b465fd3d0e63dd221068b2af2a407a
-
SHA256
4c08cca7ac9d329e4e885862e877cc0eec25a23dae9b6265064b57be3fa90181
-
SHA512
f4af8d3600e5d1131c668119a495fde72256c8f06110a398dde988e2ca7159030c6e25ae6efa09ed3b793f09cd90f1cd488030174c6ea24ee94f637929e125e6
-
SSDEEP
25165824:OcM4l/8abE3G9ieHZNcs1K3BKbLmOZh4h18caz6DsN:OcM4hPN7KxK/TZrYDsN
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
msiexec.exeflow pid process 32 4632 msiexec.exe 33 4632 msiexec.exe 34 4632 msiexec.exe -
Drops file in Drivers directory 8 IoCs
Processes:
driverinstalltool_64.exeDrvInst.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\CorsairGamingAudio64.sys driverinstalltool_64.exe File opened for modification C:\Windows\System32\drivers\SETA291.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETA291.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\CorsairVBusDriver.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SETA3E8.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETA3E8.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\CorsairVHidDriver.sys DrvInst.exe File created C:\Windows\System32\drivers\CorsairGamingAudio64.sys driverinstalltool_64.exe -
Executes dropped EXE 41 IoCs
Processes:
InstallerGui.exeQtWebEngineProcess.exeQtWebEngineProcess.exeQtWebEngineProcess.exeQtWebEngineProcess.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exeCorsairGamingAudioCfgService64.exedriverinstalltool_64.exedriverinstalltool_64.exeCueLLAccessService.exeCueUniwillService.exeCorsair.Service.exeCorsair.Service.CpuIdRemote64.exeCorsair.Service.DisplayAdapter.exeiCUE Launcher.exeiCUE.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exepid process 3896 InstallerGui.exe 4344 QtWebEngineProcess.exe 5076 QtWebEngineProcess.exe 4220 QtWebEngineProcess.exe 1844 QtWebEngineProcess.exe 4872 driverinstalltool_64.exe 2324 driverinstalltool_64.exe 1440 driverinstalltool_64.exe 1296 driverinstalltool_64.exe 3552 driverinstalltool_64.exe 3632 driverinstalltool_64.exe 2748 driverinstalltool_64.exe 3716 driverinstalltool_64.exe 2448 driverinstalltool_64.exe 3948 CorsairGamingAudioCfgService64.exe 4504 driverinstalltool_64.exe 3836 driverinstalltool_64.exe 5088 CueLLAccessService.exe 1268 CueUniwillService.exe 4412 Corsair.Service.exe 388 Corsair.Service.CpuIdRemote64.exe 2220 Corsair.Service.DisplayAdapter.exe 4384 iCUE Launcher.exe 2224 iCUE.exe 4200 iCUEDevicePluginHost.exe 376 iCUEDevicePluginHost.exe 5024 iCUEDevicePluginHost.exe 2380 iCUEDevicePluginHost.exe 4968 iCUEDevicePluginHost.exe 4840 iCUEDevicePluginHost.exe 1908 iCUEDevicePluginHost.exe 2316 iCUEDevicePluginHost.exe 1312 iCUEDevicePluginHost.exe 1860 iCUEDevicePluginHost.exe 1836 iCUEDevicePluginHost.exe 1680 iCUEDevicePluginHost.exe 1208 iCUEDevicePluginHost.exe 3432 iCUEDevicePluginHost.exe 4128 iCUEDevicePluginHost.exe 4944 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
ie4uinit.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\IsInstalled = "1" ie4uinit.exe -
Registers COM server for autorun 1 TTPs 1 IoCs
Processes:
ie4uinit.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0002DF01-0000-0000-C000-000000000046}\LocalServer32 ie4uinit.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
QtWebEngineProcess.exeQtWebEngineProcess.exeQtWebEngineProcess.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation QtWebEngineProcess.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation QtWebEngineProcess.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation QtWebEngineProcess.exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeInstallerGui.exeQtWebEngineProcess.exepid process 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 2216 MsiExec.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 4344 QtWebEngineProcess.exe 3896 InstallerGui.exe 4344 QtWebEngineProcess.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
msiexec.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CORSAIR iCUE 4 Software = "\"C:\\Program Files\\Corsair\\CORSAIR iCUE 4 Software\\iCUE Launcher.exe\" --autorun" msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exeInstallerGui.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: InstallerGui.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: InstallerGui.exe File opened (read-only) \??\O: InstallerGui.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\G: InstallerGui.exe File opened (read-only) \??\X: InstallerGui.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: InstallerGui.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: InstallerGui.exe File opened (read-only) \??\Z: InstallerGui.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: InstallerGui.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: InstallerGui.exe File opened (read-only) \??\P: InstallerGui.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: InstallerGui.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: InstallerGui.exe File opened (read-only) \??\V: InstallerGui.exe File opened (read-only) \??\Y: InstallerGui.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: InstallerGui.exe File opened (read-only) \??\N: InstallerGui.exe File opened (read-only) \??\Q: InstallerGui.exe File opened (read-only) \??\S: InstallerGui.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: InstallerGui.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: InstallerGui.exe File opened (read-only) \??\A: msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 156 api.ipify.org 158 api.ipify.org -
Drops file in System32 directory 64 IoCs
Processes:
DrvInst.exeDrvInst.exeDrvInst.exeDrvInst.exedriverinstalltool_64.exeie4uinit.exeCorsair.Service.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAEF7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\9EarsSurroundSound.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAF18.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\SETAF4A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairgamingaudio.inf_amd64_83ed578c3d8320d4\amd64\soundidsdkdsp.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\x64\SETCA2D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairsiusbxp.inf_amd64_901a592a5fd8b1a2\x64\SiUSBXp.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairvhiddriver.inf_amd64_10bba8699a459edd\CorsairVHidDriver.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\x64\SET9FB2.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\CorsairVBusDriver.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\CorsairGamingAudioCfgService64.exe DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\CorsairGamingAudio.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\SETCA6E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\CorsairSiUSBXp.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\x64 DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairvhiddriver.inf_amd64_10bba8699a459edd\CorsairVHidDriver.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\x64\CorsairVBusDriver.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAF07.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairgamingaudio.inf_amd64_83ed578c3d8320d4\amd64\CorsairGamingAudio64.sys DrvInst.exe File created C:\Windows\System32\CorsairGamingAudioPO64.dll driverinstalltool_64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\x64\SiLib.sys DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Packages\windows_ie_ac_001\AC\INetHistory ie4uinit.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\CorsairVHidDriver.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\SET9FB4.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAEE6.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAF07.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\CorsairGamingAudio64.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAF38.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAF38.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairgamingaudio.inf_amd64_83ed578c3d8320d4\amd64\CorsairGamingAudioCoinst64.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairgamingaudio.inf_amd64_83ed578c3d8320d4\CorsairGamingAudio.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\CorsairSiUSBXp.cat DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft Corsair.Service.exe File created C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\SET8EEA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\x64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\CorsairGamingAudioCoinst64.dll DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Corsair.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Packages\windows_ie_ac_001\AC\INetCache ie4uinit.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\CorsairGamingAudio.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\x64\SETCA5D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\SET8EFB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairvbusdriver.inf_amd64_a020cf5650256c9d\CorsairVBusDriver.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09} DrvInst.exe File created C:\Windows\System32\9EarsSurroundSound.dll driverinstalltool_64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\x64\SET8EE9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\x64\CorsairVHidDriver.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{99f9e291-0825-784c-8cd5-88cf3700aa45}\SET8EFB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairsiusbxp.inf_amd64_901a592a5fd8b1a2\x64\SiLib.sys DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Packages\windows_ie_ac_001\AC ie4uinit.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{6d39d60f-0b08-d74c-9482-e1f44d0cc32a}\x64\SETCA5D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\x64\SET9FB2.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{eef509d0-b31d-6e47-82bb-00795b296c09}\SET9FB4.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAED5.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\amd64\SETAEF7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9e65a528-2128-584e-b96e-e38acf0786d4}\SETAF49.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\corsairgamingaudio.inf_amd64_83ed578c3d8320d4\amd64\9EarsSurroundSound.dll DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\k55_rgb_pro.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\SwitchIndicator.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Universal\CheckDelegate.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Private\ScrollViewHelper.qmlc msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\sounds\default\AutoShutdown.wav msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\cue_qml_plugins\UtilityCueQmlPlugin.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Imagine\Frame.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\Lenovo\Lenovo Legion Y750\layouts\Legion_Layout_French.jpg msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\void_wireless_white.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Menu.qmlc msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Styles\Base\GaugeStyle.qmlc msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\virtuoso_se_brown_dongle.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Material\DialogButtonBox.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\Lenovo\Lenovo Legion Y750\layouts\Legion_Layout_US_International.jpg msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\vengeance_rgb_rs.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\translations\qtwebengine_locales\cs.pak msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Common.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\dominator_platinum_rgb_ddr5.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\generic_commander_pro.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\ApplicationWindow.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\Lenovo\Default\device_view_1_legion15_Portuguese.jpg msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Extras\Private\Handle.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\ButtonPanel.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\Dialog.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\m65_rgb_elite_ig.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\Drawer.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Styles\Base\ToggleButtonStyle.qmlc msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Qt5MultimediaQuick.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Universal\MenuSeparator.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\MenuItem.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\LenovoY760\Lenovo Legion Y760\layouts\Legion_Y760_Hungary.jpg msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\DelayButton.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVBusDriver.inf msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\k65_lux_rgb.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\isousb\fpgatest.cat msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Extras\Private\TextSingleton.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Styles\Base\images\arrow-up@2x.png msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Private\TabBar.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\Assignments.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtWebChannel\plugins.qmltypes msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\LenovoY760s\Lenovo Legion Y760s\layouts\Legion_Y760s_Latin_Spanish.jpg msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\MenuBar.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Material\qmldir msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Universal\Popup.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls\Private\EditMenu.qmlc msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\plugins\Lenovo\Default\device_view_3_legion_mask.png msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtGraphicalEffects\Desaturate.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\LegacyProtocols.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\cue_qml_plugins\TutorialsCueQmlPlugin.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Fusion\CheckIndicator.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\corsair_one_pro.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQuick\Controls.2\Universal\SwitchDelegate.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\api-ms-win-core-processenvironment-l1-1-0.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\api-ms-win-core-timezone-l1-1-0.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\h110i_gt.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtQml\Models.2\plugins.qmltypes msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtWebEngine\Controls1Delegates\AlertDialog.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\sabre_rgb_pro.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\hueapi.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\cue_qml_plugins\TouchscreensCueQmlPlugin.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\QtGraphicalEffects\Blend.qml msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\MediaActionUi.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\modules\void_wireless_carbon.dll msiexec.exe File created C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Qt5Quick.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exedriverinstalltool_64.exeMsiExec.exeDrvInst.exeDrvInst.exedriverinstalltool_64.exeDrvInst.exeDrvInst.exedriverinstalltool_64.exedriverinstalltool_64.exeDrvInst.exedriverinstalltool_64.exedriverinstalltool_64.exeDrvInst.exedriverinstalltool_64.exesvchost.exedescription ioc process File opened for modification C:\Windows\Installer\MSI4578.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\Installer\MSI1C06.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI61AD.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log MsiExec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\wix{B1071BDE-E9F2-4F8C-8A0F-0FB8BA5835CD}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Installer\SourceHash{B1071BDE-E9F2-4F8C-8A0F-0FB8BA5835CD} msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSICFC5.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\Installer\MSICDF5.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vccorlib140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI34EF.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIA4D2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBA20.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140_codecvt_ids.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\concrt140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI6C46.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3183.tmp msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\inf\oem5.inf DrvInst.exe File created C:\Windows\inf\oem5.inf DrvInst.exe File created C:\Windows\Installer\{B1071BDE-E9F2-4F8C-8A0F-0FB8BA5835CD}\ProgramIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI2D68.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140_2.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI4683.tmp msiexec.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI2E05.tmp msiexec.exe File created C:\Windows\Installer\e598fd2.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168 msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log driverinstalltool_64.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Installer\MSI3A30.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vcruntime140.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vcruntime140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File opened for modification C:\Windows\Installer\MSI707E.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\Installer\e598fd5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2EC2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEDA4.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\msvcp140_2.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe File created C:\Windows\Installer\$PatchCache$\Managed\EDB1701B2F9EC8F4A8F0F08BAB8553DC\4.27.168\vcruntime140_1.dll.DFEFC2FE_EEE6_424C_841B_D4E66F0C84A3 msiexec.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 1652 sc.exe 4432 sc.exe 1140 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4700 956 WerFault.exe 3680 3896 WerFault.exe InstallerGui.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
driverinstalltool_64.exeDrvInst.exeDrvInst.exeDrvInst.exeDrvInst.exedriverinstalltool_64.exeDrvInst.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exedriverinstalltool_64.exeDrvInst.exesvchost.exedriverinstalltool_64.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 driverinstalltool_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs driverinstalltool_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom driverinstalltool_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags driverinstalltool_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags driverinstalltool_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags driverinstalltool_64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe -
Processes:
ie4uinit.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Capabilities ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities\Hidden = "0" ie4uinit.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
driverinstalltool_64.exeDrvInst.exeDrvInst.exeDrvInst.exeie4uinit.exeDrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1430448594-2639229838-973813799-439329657-1197984847-4069167804-1277922394\DisplayName = "windows_ie_ac_001" ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListTTL = "0" ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021494-0000-0000-C000-000000000046}\Enum ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1430448594-2639229838-973813799-439329657-1197984847-4069167804-1277922394 ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\BrowserEmulation ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed driverinstalltool_64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} ie4uinit.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\windows_ie_ac_001 ie4uinit.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
ie4uinit.exemsiexec.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\open\CommandId = "IE.File" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\opennew ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.partial ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\opennew\ = "&Open" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\iexplore.exe\shell\open\command ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.website ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\open\CommandId = "IE.File" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\tn3270\FriendlyTypeName = "@C:\\Windows\\system32\\ieframe.dll,-909" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\FriendlyTypeName = "@C:\\Windows\\system32\\ieframe.dll,-904" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ftp ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE,-17" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\ = "Open in S&ame Window" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\SourceList\Media\6 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\https\DefaultIcon\ = "%SystemRoot%\\system32\\url.dll,0" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithProgIds\mhtmlfile ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\opennew\CommandId = "IE.File" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\shell\open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\ShellEx\ContextMenuHandlers ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\shell\open\command\ = "\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Windows\\system32\\url.dll\",MailToProtocolHandler %l" ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\https\shell\open ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.html\Content Type = "text/html" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\CLSID ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Applications\iexplore.exe\shell\open\CommandId = "IE.File" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\84F3B397EEDF5C441ACF107A20E47FD3 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\84F3B397EEDF5C441ACF107A20E47FD3\EDB1701B2F9EC8F4A8F0F08BAB8553DC msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\DefaultIcon ie4uinit.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\open\command ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.svg\Content Type = "image/svg+xml" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EDB1701B2F9EC8F4A8F0F08BAB8553DC\ProductFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\FriendlyTypeName = "@C:\\Windows\\system32\\ieframe.dll,-913" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE,-32554" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\SourceList\PackageName = "iCUESetup_4.27.168_release.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\DefaultIcon ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\open\MUIVerb = "@C:\\Windows\\system32\\ieframe.dll,-5732" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\opennew\MUIVerb = "@C:\\Windows\\system32\\ieframe.dll,-5731" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\shell\opennew\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" %1" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shell\open\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\shell\open\command ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\EDB1701B2F9EC8F4A8F0F08BAB8553DC\SourceList\Media\10 = ";" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\https\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xhtmlfile\DefaultIcon ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\ShellEx\ContextMenuHandlers\{FBF23B40-E3F0-101B-8488-00AA003E56F8} ie4uinit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\https\EditFlags = "2" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\InternetShortcut\DefaultIcon\ = "%SystemRoot%\\system32\\url.dll,5" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE\" %1" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\opennew\command\DelegateExecute = "{17FE9752-0B5A-4665-84CD-569794602F5C}" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex\ContextMenuHandlers ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\print\command\ = "\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Windows\\system32\\mshtml.dll\",PrintHTML \"%1\"" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mailto\shell ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\EDB1701B2F9EC8F4A8F0F08BAB8553DC msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xhtml\ = "xhtmlfile" ie4uinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\Content Type = "message/rfc822" ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\svgfile\shell\printto\command ie4uinit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Microsoft.Website\shellex\PropertyHandler ie4uinit.exe -
Processes:
Corsair.Service.exeiCUE.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Corsair.Service.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Corsair.Service.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 5c000000010000000400000000080000190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc36200000001000000200000007431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8040000000100000010000000d474de575c39b2d39c8583c5c065498a2000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a iCUE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD iCUE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 0f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f iCUE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 iCUE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 iCUE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 Corsair.Service.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Corsair.Service.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 Corsair.Service.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 iCUE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 iCUE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 iCUE.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
InstallerGui.exeiCUE.exepid process 3896 InstallerGui.exe 2224 iCUE.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
QtWebEngineProcess.exeQtWebEngineProcess.exeQtWebEngineProcess.exeQtWebEngineProcess.exeMsiExec.exemsiexec.exeInstallerGui.exeCorsair.Service.exeiCUEDevicePluginHost.exepid process 4344 QtWebEngineProcess.exe 4344 QtWebEngineProcess.exe 5076 QtWebEngineProcess.exe 4220 QtWebEngineProcess.exe 1844 QtWebEngineProcess.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3300 MsiExec.exe 3960 msiexec.exe 3960 msiexec.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 4412 Corsair.Service.exe 4412 Corsair.Service.exe 4412 Corsair.Service.exe 4412 Corsair.Service.exe 4412 Corsair.Service.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
InstallerGui.exeiCUE.exepid process 3896 InstallerGui.exe 2224 iCUE.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 660 660 660 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 4632 msiexec.exe Token: SeIncreaseQuotaPrivilege 4632 msiexec.exe Token: SeSecurityPrivilege 3960 msiexec.exe Token: SeCreateTokenPrivilege 4632 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4632 msiexec.exe Token: SeLockMemoryPrivilege 4632 msiexec.exe Token: SeIncreaseQuotaPrivilege 4632 msiexec.exe Token: SeMachineAccountPrivilege 4632 msiexec.exe Token: SeTcbPrivilege 4632 msiexec.exe Token: SeSecurityPrivilege 4632 msiexec.exe Token: SeTakeOwnershipPrivilege 4632 msiexec.exe Token: SeLoadDriverPrivilege 4632 msiexec.exe Token: SeSystemProfilePrivilege 4632 msiexec.exe Token: SeSystemtimePrivilege 4632 msiexec.exe Token: SeProfSingleProcessPrivilege 4632 msiexec.exe Token: SeIncBasePriorityPrivilege 4632 msiexec.exe Token: SeCreatePagefilePrivilege 4632 msiexec.exe Token: SeCreatePermanentPrivilege 4632 msiexec.exe Token: SeBackupPrivilege 4632 msiexec.exe Token: SeRestorePrivilege 4632 msiexec.exe Token: SeShutdownPrivilege 4632 msiexec.exe Token: SeDebugPrivilege 4632 msiexec.exe Token: SeAuditPrivilege 4632 msiexec.exe Token: SeSystemEnvironmentPrivilege 4632 msiexec.exe Token: SeChangeNotifyPrivilege 4632 msiexec.exe Token: SeRemoteShutdownPrivilege 4632 msiexec.exe Token: SeUndockPrivilege 4632 msiexec.exe Token: SeSyncAgentPrivilege 4632 msiexec.exe Token: SeEnableDelegationPrivilege 4632 msiexec.exe Token: SeManageVolumePrivilege 4632 msiexec.exe Token: SeImpersonatePrivilege 4632 msiexec.exe Token: SeCreateGlobalPrivilege 4632 msiexec.exe Token: SeCreateTokenPrivilege 4632 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4632 msiexec.exe Token: SeLockMemoryPrivilege 4632 msiexec.exe Token: SeIncreaseQuotaPrivilege 4632 msiexec.exe Token: SeMachineAccountPrivilege 4632 msiexec.exe Token: SeTcbPrivilege 4632 msiexec.exe Token: SeSecurityPrivilege 4632 msiexec.exe Token: SeTakeOwnershipPrivilege 4632 msiexec.exe Token: SeLoadDriverPrivilege 4632 msiexec.exe Token: SeSystemProfilePrivilege 4632 msiexec.exe Token: SeSystemtimePrivilege 4632 msiexec.exe Token: SeProfSingleProcessPrivilege 4632 msiexec.exe Token: SeIncBasePriorityPrivilege 4632 msiexec.exe Token: SeCreatePagefilePrivilege 4632 msiexec.exe Token: SeCreatePermanentPrivilege 4632 msiexec.exe Token: SeBackupPrivilege 4632 msiexec.exe Token: SeRestorePrivilege 4632 msiexec.exe Token: SeShutdownPrivilege 4632 msiexec.exe Token: SeDebugPrivilege 4632 msiexec.exe Token: SeAuditPrivilege 4632 msiexec.exe Token: SeSystemEnvironmentPrivilege 4632 msiexec.exe Token: SeChangeNotifyPrivilege 4632 msiexec.exe Token: SeRemoteShutdownPrivilege 4632 msiexec.exe Token: SeUndockPrivilege 4632 msiexec.exe Token: SeSyncAgentPrivilege 4632 msiexec.exe Token: SeEnableDelegationPrivilege 4632 msiexec.exe Token: SeManageVolumePrivilege 4632 msiexec.exe Token: SeImpersonatePrivilege 4632 msiexec.exe Token: SeCreateGlobalPrivilege 4632 msiexec.exe Token: SeCreateTokenPrivilege 4632 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4632 msiexec.exe Token: SeLockMemoryPrivilege 4632 msiexec.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
msiexec.exeiCUE.exepid process 4632 msiexec.exe 4632 msiexec.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
iCUE.exepid process 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe -
Suspicious use of SetWindowsHookEx 42 IoCs
Processes:
InstallerGui.exeCueLLAccessService.exeCueUniwillService.exeiCUE.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exeiCUEDevicePluginHost.exepid process 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 3896 InstallerGui.exe 5088 CueLLAccessService.exe 1268 CueUniwillService.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 1860 iCUEDevicePluginHost.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 2224 iCUE.exe 1680 iCUEDevicePluginHost.exe 1836 iCUEDevicePluginHost.exe 1208 iCUEDevicePluginHost.exe 4944 iCUEDevicePluginHost.exe 1836 iCUEDevicePluginHost.exe 4128 iCUEDevicePluginHost.exe 3432 iCUEDevicePluginHost.exe 484 iCUEDevicePluginHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exeMsiExec.exeInstallerGui.exedescription pid process target process PID 3960 wrote to memory of 2216 3960 msiexec.exe MsiExec.exe PID 3960 wrote to memory of 2216 3960 msiexec.exe MsiExec.exe PID 2216 wrote to memory of 3896 2216 MsiExec.exe InstallerGui.exe PID 2216 wrote to memory of 3896 2216 MsiExec.exe InstallerGui.exe PID 3896 wrote to memory of 4344 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4344 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 5076 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe PID 3896 wrote to memory of 4220 3896 InstallerGui.exe QtWebEngineProcess.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\iCUESetup_4.27.168_release.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 404 -p 956 -ip 9561⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 956 -s 21361⤵
- Program crash
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding BA0AE8C111638C40032A9BEDE0770BDD U2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\InstallerGui.exe"C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\InstallerGui.exe" "C:\Users\Admin\AppData\Local\Temp\iCUESetup_4.27.168_release.msi" --path-mem-name=B4E0D3C4-AB2D-4F59-B545-B2220C6ECBF0 --path-mem-size=5223⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --use-gl=angle --application-name=CORSAIR%20iCUE%204%20Software --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=4084 /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-databases --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --mojo-platform-channel-handle=3348 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-databases --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=4160 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe"C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-databases --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --mojo-platform-channel-handle=3436 /prefetch:14⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3896 -s 50644⤵
- Program crash
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUE Launcher.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUE Launcher.exe"3⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUE.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software/iCUE.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/ASUS/asus_plugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/Lenovo/CUEPlugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY750s/y750splugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY760/Y760Plugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY760s/y760spluginX64.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/MSI/CueMsiPlugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/MSI/MysticLight_SDK_x64.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/Nvidia/NvidiaPlugin.dll" --verify-only=true5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"5⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_asus_plugin.dll_{4ad499ca-38d1-41cd-9d49-1614a84fa961} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/ASUS/asus_plugin.dll"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_y750splugin.dll_{32e79448-394a-4f41-95eb-629d3dbc5b5d} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY750s/y750splugin.dll"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_y760spluginX64.dll_{16e1d75a-b84c-4cf9-99af-24ddf58677a4} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY760s/y760spluginX64.dll"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_CUEPlugin.dll_{e35dd27a-4492-475b-892a-814c60c135cc} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/Lenovo/CUEPlugin.dll"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_Y760Plugin.dll_{2817bac7-59d2-4389-867b-d3c6262f8e69} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/LenovoY760/Y760Plugin.dll"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F8B38EF65C428E67288237D9EF0840922⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5A25CA8110B4DA9926A1E801678D950A E Global\MSI00002⤵
- Drops file in Windows directory
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeuninstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -force-in-use "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVHidDriver.inf"3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exepurge-alike -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVHidDriver.inf"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeuninstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -force-in-use "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVBusDriver.inf"3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exepurge-alike -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVBusDriver.inf"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeuninstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -force-in-use -temp-down-service=AudioSrv -temp-down-service=hidserv -found-device-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\audio\CorsairGamingAudio.inf"3⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exepurge-alike -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -temp-down-service=AudioSrv -temp-down-service=hidserv -found-device-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\audio\CorsairGamingAudio.inf"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeinstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVHidDriver.inf"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeinstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -rescan "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVBusDriver.inf"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exeinstall -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 -rescan -temp-down-service=AudioSrv -temp-down-service=hidserv -force -install-win32-services -install-kernel-services -register-dlls -found-device-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA3 "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\audio\CorsairGamingAudio.inf"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s "C:\Windows\System32\CorsairGamingAudioPO64.dll"4⤵
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exerescan -reboot-required-event=RebootRequired_0373E6AD_E800_406A_9755_A84A74CFDBA33⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\sc.exe"sc" sdset CorsairLLAService D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;RPWP;;;AU)3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"sc" sdset iCUEDevicePluginHost D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;RPWP;;;AU)3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exe"sc" sdset CorsairService D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)(A;;RPWP;;;AU)3⤵
- Launches sc.exe
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\tools\driverinstalltool_64.exe" install "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\siusbxp\CorsairSiUSBXp.inf"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\ie4uinit.exeie4uinit.exe -show2⤵
- Modifies Installed Components in the registry
- Registers COM server for autorun
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid\CorsairVHidDriver.inf" "9" "4cf6a7c93" "000000000000013C" "WinSta0\Default" "0000000000000154" "208" "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\hid"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "c:\program files\corsair\corsair icue 4 software\driver\hid\corsairvbusdriver.inf" "9" "47e751fe7" "0000000000000154" "WinSta0\Default" "000000000000014C" "208" "c:\program files\corsair\corsair icue 4 software\driver\hid"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "11" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73af05ee353a:CorsairVBusDriver_Device:3.0.88.0:root\corsairbus," "47e751fe7" "0000000000000154"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "0" "CorsairBus\virtualdevice&10\1&79f5d87&0&{e7fd4ace-ee13-11e2-afda-000c29100502}" "" "" "417e64237" "0000000000000000"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\audio\CorsairGamingAudio.inf" "9" "4628b14ab" "0000000000000178" "WinSta0\Default" "000000000000017C" "208" "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\audio"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2836d575-1dc8-a049-aa64-6930d6c3ad1d}\CorsairSiUSBXp.inf" "9" "43e422efb" "000000000000013C" "WinSta0\Default" "0000000000000184" "208" "C:\Program Files\Corsair\CORSAIR iCUE 4 Software\driver\siusbxp"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x488 0x48c1⤵
-
C:\Windows\System32\CorsairGamingAudioCfgService64.exeC:\Windows\System32\CorsairGamingAudioCfgService64.exe1⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\CueLLAccessService.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\CueLLAccessService.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\CueUniwillService.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\CueUniwillService.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.CpuIdRemote64.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.CpuIdRemote64.exe" -d2⤵
- Executes dropped EXE
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.DisplayAdapter.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\Corsair.Service.DisplayAdapter.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 416 -p 3896 -ip 38961⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s hidserv1⤵
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_NvidiaPlugin.dll_{60ac4705-7684-4c56-bc1c-d69ed7c07458} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/Nvidia/NvidiaPlugin.dll"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe"C:\Program Files\Corsair\CORSAIR iCUE 4 Software\iCUEDevicePluginHost.exe" --exec --node-address=iCUE_plugin_CueMsiPlugin.dll_{2d63708a-919a-4504-a906-d33c4a3e4eba} "--path=C:/Program Files/Corsair/CORSAIR iCUE 4 Software/plugins/MSI/CueMsiPlugin.dll"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\InstallerGui.exeFilesize
19.0MB
MD5c2189029154d736788ecb194dd29d6d9
SHA10bfaaeb5e31d98263e58e872f5cd16c725320ee5
SHA2569e9cd4742c2122297c72a0099c88a8108bf5a6cc45bb4e2375d1a98103933ac6
SHA51235c0fb50781825850facc1a2eadc75e4f4143778e397017d4aca41f8cb217d2940dc6d99faaa5d4c9dc47cf3d186e3b6f5506f09bc4d9de8604b7f3f054b2ac0
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\InstallerGuiBootstrap.dllFilesize
293KB
MD582154ecfb8b25884a2790ee1d41e3130
SHA197024324de6a12c5f562eb2e0e9a951a30d81dac
SHA25687471c9fa767fbf7a64cd46821e30f4e1f33c90eb8a7fec65418af3fd2cc3b2c
SHA512c7afee556694e7a4c382325f6ea4c2243b9090de4715b5fa3f80e47fdd7953e774e90f2f691012a1c0ddf90d9a44a518a03359b5f463e6e5f71ed6e02b65ae4a
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\InstallerGuiBootstrap.dllFilesize
293KB
MD582154ecfb8b25884a2790ee1d41e3130
SHA197024324de6a12c5f562eb2e0e9a951a30d81dac
SHA25687471c9fa767fbf7a64cd46821e30f4e1f33c90eb8a7fec65418af3fd2cc3b2c
SHA512c7afee556694e7a4c382325f6ea4c2243b9090de4715b5fa3f80e47fdd7953e774e90f2f691012a1c0ddf90d9a44a518a03359b5f463e6e5f71ed6e02b65ae4a
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\Qt5Core.dllFilesize
5.7MB
MD5817520432a42efa345b2d97f5c24510e
SHA1fea7b9c61569d7e76af5effd726b7ff6147961e5
SHA2568d2ff4ce9096ddccc4f4cd62c2e41fc854cfd1b0d6e8d296645a7f5fd4ae565a
SHA5128673b26ec5421fce8e23adf720de5690673bb4ce6116cb44ebcc61bbbef12c0ad286dfd675edbed5d8d000efd7609c81aae4533180cf4ec9cd5316e7028f7441
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\Qt5Core.dllFilesize
5.7MB
MD5817520432a42efa345b2d97f5c24510e
SHA1fea7b9c61569d7e76af5effd726b7ff6147961e5
SHA2568d2ff4ce9096ddccc4f4cd62c2e41fc854cfd1b0d6e8d296645a7f5fd4ae565a
SHA5128673b26ec5421fce8e23adf720de5690673bb4ce6116cb44ebcc61bbbef12c0ad286dfd675edbed5d8d000efd7609c81aae4533180cf4ec9cd5316e7028f7441
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-console-l1-1-0.dllFilesize
18KB
MD5e5912b05988259dad0d6d04c8a17d19b
SHA1724f4f91041ad595e365b724a0348c83acf12bbb
SHA2569f3608c15c5de2f577a2220ce124b530825717d778f1e3941e536a3ab691f733
SHA512c270a622d7887f4c97232ea898f5380459c565817f0d201cdb081ee82e3002b6e6248753a68da896d3b1327f93e8e8cb0ca0dcaeef324f610e0a1c7b542c6492
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-datetime-l1-1-0.dllFilesize
18KB
MD516789cc09a417d7deb590fffe4ed02dc
SHA14940d5b92b6b80a40371f8df073bf3eb406f5658
SHA2563b68d7ab0641de6b3e81d209b7c0d3896e4ffa76617bbadd01eb54036cdd1b07
SHA51219e4f086cc2137ee60316b0736b3c6b3780578896df9a826edfe004bb74bee8e051c511a84d8a7ea278a5f47c82b9c955394f629ab0bb0740ecb51293d9be7b7
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-debug-l1-1-0.dllFilesize
18KB
MD59476affaac53e6e34405c4001f141805
SHA1e7c8a6c29c3158f8b332eea5c33c3b1e044b5f73
SHA25655574f9e80d313048c245acefd21801d0d6c908a8a5049b4c46253efaf420f89
SHA512f8e3476a09d888caebd50da0ea2debc4006004e72af677919413655ab4595622cac524f1bc6c13406ee341ae0052a19ed83826ad530f652e73b2c65d4fa65680
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-errorhandling-l1-1-0.dllFilesize
18KB
MD5a5883c68d432f593812ab3b755b808db
SHA151cbb7ba47802dc630c2507750432c55f5979c27
SHA256b3715112a7ca4c6cc0efee044bd82444d3267a379e33a3ec118d87e75604204d
SHA51227153e29e99a905fa4c8b3ede078644a3a3f29fdf7b98e387e39c5c60444e326c92afd74da8fee225f7ddf39724a0daef68ba238f3cc64fb7860172b8f29d79a
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-file-l1-1-0.dllFilesize
21KB
MD5241338aef5e2c18c80fb1db07aa8bcdf
SHA19acbeef0ac510c179b319ca69cd5378d0e70504d
SHA25656de091efe467fe23cc989c1ee21f3249a1bdb2178b51511e3bd514df12c5ccb
SHA512b9fd37f01a58594e48fa566c41827b2b9499605d9e55c2178e83ee41c8c5f50a4df2c85efea94ca586ea0ea4a6d984ebb7ca2193e9306fcb853b147b2c76bc2d
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-file-l1-2-0.dllFilesize
18KB
MD549c3ffd47257dbcb67a6be9ee112ba7f
SHA104669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-file-l2-1-0.dllFilesize
18KB
MD5bfffa7117fd9b1622c66d949bac3f1d7
SHA1402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA2561ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-handle-l1-1-0.dllFilesize
18KB
MD5cce27ff9b1e78b61955682788452f785
SHA1a2e2a40cea25ea4fd64b8deaf4fbe4a2db94107a
SHA2568ee2de377a045c52bbb05087ae3c2f95576edfb0c2767f40b13454f2d9f779de
SHA5121fcec1cd70426e3895c48598dfc359839d2b3f2b1e3e94314872a866540353460ec932bf3841e5afe89aa4d6c6fac768e21ae368d68c2bb15f65960f6f5d7d5b
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-heap-l1-1-0.dllFilesize
18KB
MD5cdc266896e0dbe6c73542f6dec19de23
SHA1b4310929ccb82dd3c3a779cab68f1f9f368076f2
SHA25687a5c5475e9c26fabfead6802dac8a62e2807e50e0d18c4bfadcb15ebf5bcbc0
SHA51279a29041699f41938174a6ec9797faf8d6bf7764657d801cb3af15c225f8eab0135d59cfa627bd02dd7459f7b857d62299e4d082586ce690627ebdf1267ebb21
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-interlocked-l1-1-0.dllFilesize
18KB
MD539809cc5dabf769da8871a91a8ed9e69
SHA1f779cdef9ded19402aa72958085213d6671ca572
SHA2565cd00ff4731691f81ff528c4b5a2e408548107efc22cc6576048b0fdce3dfbc9
SHA51283a8246839d28378c6f6951d7593dc98b6caa6dbca5fbd023b00b3b1a9eba0597943838c508493533c2de276c4d2f9107d890e1c9a493ee834351cff5dfd2cab
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-libraryloader-l1-1-0.dllFilesize
19KB
MD55d5fae1a17961d6ee37637f04fe99b8a
SHA147143a66b4a2e2ba019bf1fd07bcca9cfb8bb117
SHA2568e01eb923fc453f927a7eca1c8aa5643e43b360c76b648088f51b31488970aa0
SHA5129db32ec8416320dcb28f874b4679d2d47a5ae56317fdc9d2d65ebb553f1d6345c3dd0024294a671a694337683dd4e77254595a9cdbfe115c80d0ef53516d46aa
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-localization-l1-2-0.dllFilesize
20KB
MD5588bd2a8e0152e0918742c1a69038f1d
SHA19874398548891f6a08fc06437996f84eb7495783
SHA256a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA51232ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-memory-l1-1-0.dllFilesize
18KB
MD56def20ed13972f3c3f08dba8ecf3d6cc
SHA19c03356cf48112563bb845479f40bf27b293e95e
SHA256c2e887a17875d39099d662a42f58c120b9cc8a799afd87a9e49adf3faddd2b68
SHA5125b4d2b1152bed14108dc58d358b1082e27defd1001d36cd72ec6f030a34d6caf9b01c3c1dd8a9ac66d1937fcf86a6fe3469ac93b1e76d933a8f4b51c1f782f65
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-namedpipe-l1-1-0.dllFilesize
18KB
MD5a056d4eeaae37deab8333dcc4c910a93
SHA1cb59f1fe73c17446eb196fc0dd7d944a0cd9d81f
SHA256593fa2aa2474508ad942bbaa0fdc9a1badd81c85b0dff1c43b90a47c23ad5fb7
SHA512c2f811994182ef51d0c011c19336179da69357e5f284f787bcdb54f90c32768a959232a477534f7e62cd3d71a048a13e91b20042e2fe6ab108d606c7c8df9255
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-processenvironment-l1-1-0.dllFilesize
19KB
MD5f3b4ab35a65a8d938c6b60ad59ba6e7f
SHA12745259f4dbbefbf6b570ee36d224abdb18719bc
SHA256ea2972fec12305825162ae3e1ae2b6c140e840be0e7ebb51a7a77b7feeda133a
SHA512a88afb66311494d6c15613c94555ba436cd2f75e11a49a448c9c6776dfba24cda25a44792a1e8b3e680c1ad3ad0574b43ac2328c6e41ff0832139c94b066dbf5
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-processthreads-l1-1-0.dllFilesize
20KB
MD55faf9a33bab1d39dd9f820d34339b3d4
SHA150699041060d14576ed7bacbd44be9af80eb902a
SHA256a1221836731c7e52c42d5809cc02b17c5ec964601631ec15a84201f423da4ac4
SHA51273c25d1338df9aee5211fbb0e1b14e6bd853e31746c63bc46f44810622b09d52ee39b8e8a57c655da63d3d3d4025c2cba4d8673893d022417a2032ba3d935061
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-processthreads-l1-1-1.dllFilesize
18KB
MD5d699333637db92d319661286df7cc39e
SHA10bffb9ed366853e7019452644d26e8e8f236241b
SHA256fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA5126fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-profile-l1-1-0.dllFilesize
17KB
MD57028cf6b6b609cb0e31abd1f618e42d0
SHA1e7e0b18a40a35bd8b0766ac72253de827432e148
SHA2569e98b03a3ca1ebabdceb7ed9c0ceb4912bb68eb68f3e0df17f39c7a55fada31d
SHA512d035ccfd0de316e64187c18e6e5b36e14f615f872c08740ec22ef2c12d592e37d78ab154202926a56ab01d669eb5870dff651280a882d6bf2a700c43dcd25ac2
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-rtlsupport-l1-1-0.dllFilesize
18KB
MD52166fb99debbb1b0649c4685cf630a4a
SHA124f37d46dfc0ef303ef04abf9956241af55d25c9
SHA256cdc4cfebf9cba85b0d3979befdb258c1f2cfcb79edd00da2dfbf389d080e4379
SHA512de27d06b1f306110b42d0ed2642a555862d0ade7e56e5f2908e399f140aa5f43904e08d690bcb0d2f4d11d799ec18fa682db048da57d99cd99891e45add86371
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-string-l1-1-0.dllFilesize
18KB
MD5b7cbc8d977a00a2574e110b01124ed40
SHA1637e4a9946691f76e6deb69bdc21c210921d6f07
SHA256854db7d2085caacf83d6616761d8bdcbacb54a06c9a9b171b1c1a15e7dc10908
SHA512b415ef4092fa62d39941bf529a2032bc8b591c54ed2050ea4730f198899f147539b2c0e97f3c4f14848c71066924c1848ae5f07779a1a47ab4c5e46f02be7258
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-synch-l1-1-0.dllFilesize
20KB
MD56961bf5622ffcd14c16fbfc1296950a4
SHA15584c189216a17228cca6cd07037aaa9a8603241
SHA25650a1542d16b42ecb3edc1edd0881744171ea52f7155e5269ad39234f0ea691de
SHA512a4d0c15acbff4e9140ae4264fa24bd4c65fb2d1052a0b37bf281498f3b641fef563c18115511829a23340c9440f547028d36015ba38cbd51ad0744d44d5ccd87
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-synch-l1-2-0.dllFilesize
18KB
MD547388f3966e732706054fe3d530ed0dc
SHA1a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA25659c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-sysinfo-l1-1-0.dllFilesize
19KB
MD5df50047bbd2cf3a4b0cf0567514b464c
SHA1f20ae25484a1c1b43748a1f0c422f48f092ad2c1
SHA2568310d855398f83cb5b9ca3adeb358da1354557aec5c82c8ef91a29f79a47f620
SHA5125c3bfc2ccb2ee864b99f6709677474327e85889f4c962ea0a1ef9e1e876dc88b1d8e8e0f6c1422f634ff1c84a861c34e52ee07dac7fdde505b508bea80562b9f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-timezone-l1-1-0.dllFilesize
18KB
MD5f62b66f451f2daa8410ad62d453fa0a2
SHA14bf13db65943e708690d6256d7ddd421cc1cc72b
SHA25648eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-core-util-l1-1-0.dllFilesize
18KB
MD5a1952875628359a0632be61ba4727684
SHA11e1a5ab47e4c2b3c32c81690b94954b7612bb493
SHA256a41bede183fa1c70318332d6bc54ef13817aeee6d52b3ab408f95fa532b809f1
SHA5123f86180cc085dc8c9f6d3c72f5ccc0f5a0c9048343edaf62239eb4b038799845388898408ed7e8eac5d015a9bc42ff428f74585f64f5d3467dddb1303baf4f03
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-conio-l1-1-0.dllFilesize
19KB
MD56c88d0006cf852f2d8462dfa4e9ca8d1
SHA149002b58cb0df2ee8d868dec335133cf225657df
SHA256d5960c7356e8ab97d0ad77738e18c80433da277671a6e89a943c7f7257ff3663
SHA512d081843374a43d2e9b33904d4334d49383df04ee7143a8b49600841ece844eff4e8e36b4b5966737ac931ed0350f202270e043f7003bf2748c5418d5e21c2a27
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-convert-l1-1-0.dllFilesize
22KB
MD5d53637eab49fe1fe1bd45d12f8e69c1f
SHA1c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA25683678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA51294d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-environment-l1-1-0.dllFilesize
18KB
MD5c712515d052a385991d30b9c6afc767f
SHA19a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-filesystem-l1-1-0.dllFilesize
20KB
MD5f0d507de92851a8c0404ac78c383c5cd
SHA178fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-heap-l1-1-0.dllFilesize
19KB
MD5f9e20dd3b07766307fccf463ab26e3ca
SHA160b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA51213c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-locale-l1-1-0.dllFilesize
18KB
MD5ab206f2943977256ca3a59e5961e3a4f
SHA19c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-math-l1-1-0.dllFilesize
27KB
MD54dd7a61590d07500704e7e775255cb00
SHA18b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA5121086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-multibyte-l1-1-0.dllFilesize
26KB
MD54e033cfee32edf6be7847e80a5114894
SHA191eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-private-l1-1-0.dllFilesize
69KB
MD550740f0bc326f0637c4166698298d218
SHA10c33cfe40edd278a692c2e73e941184fd24286d9
SHA256adbb658dd1cbecaca7cc1322b51976f30b36ccf0a751f3bad1f29d350b192c9c
SHA512f1331ab1d52fb681f51546168e9736e2f6163e0706955e85ac9e4544d575d50e6eacd90ea3e49cb8b69da34fe0b621b04661f0b6f09f7ce8ceca50308c263d03
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-process-l1-1-0.dllFilesize
19KB
MD5595d79870970565be93db076afbe73b5
SHA1ec96f7beeaec14d3b6c437b97b4a18a365534b9b
SHA256fc50a37acc35345c99344042d7212a4ae88aa52a894cda3dcb9f6db46d852558
SHA512152849840a584737858fc5e15f0d7802786e823a13ec5a9fc30ee032c7681deaf11c93a8cffead82dc5f73f0cd6f517f1e83b56d61d0e770cbb20e1cfff22840
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-runtime-l1-1-0.dllFilesize
22KB
MD58b9b0d1c8b0e9d4b576d42c66980977a
SHA1a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA5124b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-stdio-l1-1-0.dllFilesize
24KB
MD576e0a89c91a28cf7657779d998e679e5
SHA1982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA2560189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-string-l1-1-0.dllFilesize
24KB
MD596da689947c6e215a009b9c1eca5aec2
SHA17f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA5128e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-time-l1-1-0.dllFilesize
20KB
MD56b33b34888ccecca636971fbea5e3de0
SHA1ee815a158baacb357d9e074c0755b6f6c286b625
SHA25600ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\api-ms-win-crt-utility-l1-1-0.dllFilesize
18KB
MD554f27114eb0fda1588362bb6b5567979
SHA1eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA51218d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\concrt140.dllFilesize
302KB
MD5046f9be1a19af1ed07d89f36c105ce30
SHA1e042dcf12df1145e9ef9f7d562f17a0df2000201
SHA256449e6073300d973d3d07f08896140ecdcc1c7fe8f58cff5aa7096cc124cf6393
SHA5122f123bf754e00af68e054c3b41a0fb9f8f53a255daef2144d337020b0d299ae9466ca5d7d1b249ce039e69e762d4ed4b4a13e968ef182223486ae3801b559de2
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\msvcp140.dllFilesize
569KB
MD506ceae72572cf5ae8beb4e9fc8c30c3c
SHA1cfe1f8f4116ebda81a097af6ca7eaa26fd206953
SHA256959c2be421bb7f1c71690cfb4fbc98ab63b63a58a50b458383f89b6ba5c1143a
SHA51224befa9504e649ebef19b1413c41b5a2beee9e83d89ae84fdbf2a0126b3c023d439a60b828918398407109adaed1c6fd59621e8cb65e9017d98b4eccc1d1eea4
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\msvcp140_1.dllFilesize
23KB
MD5e3ff74444c7f1eee64698b71432dfe1f
SHA12859dfd852b72f9f48a355663586e59eed283525
SHA256bcea68627d9e9ec0dfa3602a94cdc8bb615134a57e11beda5a5593ba54b3301a
SHA512777020de33c3c21c16ae3b036bef01ab5dacd32b8419819a3532cae10fb7c0c760e666c0975aa366ce78a9cfba8ae3f9dc884726516aa88eb92dc171f125b5c6
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\msvcp140_2.dllFilesize
181KB
MD5dd3357834997fc5cc2bfe816c8535227
SHA109b41fd5b31034f401eac39c5eaf5972f6c3bf51
SHA2565eb61fff563318c21f14aa1226b1d9b7a1f4f5344869bddd233b6bd8f99d1272
SHA5124c5aef1b766bcae23248b87f6dd422f5c41069d65e8a4027bed40fc41a13be853d5503893266c962db73c241337d8161dd39ab3ab3f7a83512f31e2cff1dee66
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\msvcp140_codecvt_ids.dllFilesize
19KB
MD5677f6585b526b4ee9bf44310054fc909
SHA1df3d495d94cc7fa77e3cc57b0627b331ed24a14b
SHA256cb9c5eb47d68528bfc42a912eb5b99266a29f32f5dd57cb44d9a3b8017f86599
SHA51280201235657e89cb9ebc002defa00ae0936dcc777477938dbf0dde069e45c4188d74f1ce96f3ed42726d326686061e24b234600a7b26a8fb9d937ef9218f9625
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\InstallerGui.exeFilesize
19.0MB
MD5c2189029154d736788ecb194dd29d6d9
SHA10bfaaeb5e31d98263e58e872f5cd16c725320ee5
SHA2569e9cd4742c2122297c72a0099c88a8108bf5a6cc45bb4e2375d1a98103933ac6
SHA51235c0fb50781825850facc1a2eadc75e4f4143778e397017d4aca41f8cb217d2940dc6d99faaa5d4c9dc47cf3d186e3b6f5506f09bc4d9de8604b7f3f054b2ac0
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\InstallerGui.exeFilesize
19.0MB
MD5c2189029154d736788ecb194dd29d6d9
SHA10bfaaeb5e31d98263e58e872f5cd16c725320ee5
SHA2569e9cd4742c2122297c72a0099c88a8108bf5a6cc45bb4e2375d1a98103933ac6
SHA51235c0fb50781825850facc1a2eadc75e4f4143778e397017d4aca41f8cb217d2940dc6d99faaa5d4c9dc47cf3d186e3b6f5506f09bc4d9de8604b7f3f054b2ac0
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\Qt5WebEngine.dllFilesize
371KB
MD51d783ecdbe2cd530d2102b0a14f026e1
SHA1f31e673064894a8bda963e1ebadd1bc96116525a
SHA256c1ef45ae2a37d8882e8b6aced719e3ebe058ccf45f86a917c5bc726646cc732c
SHA512feaab31dce3df93b2d83608c7615d406b82110260a1779e63f9a87423d91824ab8b4067f9eee68cf8cce3f32ba797e6846793d81d7074539a756b0b28b81852b
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\Qt5Widgets.dllFilesize
5.2MB
MD54cd1f8fdcd617932db131c3688845ea8
SHA1b090ed884b07d2d98747141aefd25590b8b254f9
SHA2563788c669d4b645e5a576de9fc77fca776bf516d43c89143dc2ca28291ba14358
SHA5127d47d2661bf8fac937f0d168036652b7cfe0d749b571d9773a5446c512c58ee6bb081fec817181a90f4543ebc2367c7f8881ff7f80908aa48a7f6bb261f1d199
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\qt-dependencies\Qt5Widgets.dllFilesize
5.2MB
MD54cd1f8fdcd617932db131c3688845ea8
SHA1b090ed884b07d2d98747141aefd25590b8b254f9
SHA2563788c669d4b645e5a576de9fc77fca776bf516d43c89143dc2ca28291ba14358
SHA5127d47d2661bf8fac937f0d168036652b7cfe0d749b571d9773a5446c512c58ee6bb081fec817181a90f4543ebc2367c7f8881ff7f80908aa48a7f6bb261f1d199
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\quazip1-qt5.dllFilesize
270KB
MD51a5805e26d42789f5d3e53778445326e
SHA129e8649bfa623461c011096fef802e626bbcc382
SHA25623092e585cc8bb0ea21b19e3f4c2caa9219bf153c6d34d550e903debaaa3567e
SHA5127f120b4d3434ed359c6b3b793cce53c666a7acc5bee3b62b883733c0a19eb3bebf21c029bf985f736154dd390986cfe157ce1f46137a38a23d7c5c1968990f0f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\quazip1-qt5.dllFilesize
270KB
MD51a5805e26d42789f5d3e53778445326e
SHA129e8649bfa623461c011096fef802e626bbcc382
SHA25623092e585cc8bb0ea21b19e3f4c2caa9219bf153c6d34d550e903debaaa3567e
SHA5127f120b4d3434ed359c6b3b793cce53c666a7acc5bee3b62b883733c0a19eb3bebf21c029bf985f736154dd390986cfe157ce1f46137a38a23d7c5c1968990f0f
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\setup_ui_dep.zipFilesize
103.2MB
MD526ea60b2d5d8b04d59be8bb8c76574b0
SHA1d9767c690b5492e10d2431443f21f0532ba09910
SHA256a46ff463210ba2cd0f5ccaf5aa13696d27d21b5b4a50792060643c0a4be2e911
SHA512141d92a101e7f7b5c1a8f9b33d82f2dce9bec174e44925a3203227acb30b7d0fa2efb202e753c7d27d9d8e0a1ce9b83c7255228da0e434ef7a065725f3a57672
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\ucrtbase.dllFilesize
992KB
MD50e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA14189f4459c54e69c6d3155a82524bda7549a75a6
SHA2568a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\vccorlib140.dllFilesize
322KB
MD55cf23f72a27ba74852cd55980469d68d
SHA1fea39f64afc687a47b3e0fb9f8831eff16a35b87
SHA2565aff6efe80668d263eecdf1e2ae98f08ca7161c3053eae514cd64a7118b902d8
SHA512f9f8f59fbe4fc38883305cfe064c4b83b5b9896ad4927ab5887b8584e004fba83c3bd9bfc0aed4a6c2d0a37f381ecf0138b7abfdf1f92ceae172db4f11d3da62
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\vcruntime140.dllFilesize
91KB
MD56a6ff61f089628002171eed4ac6900a4
SHA1dc6679bac5b36356f6d294f00ee44dddb1ce9108
SHA2562aa86a67ce51fba3fbf3d90635332fff61d505e8b9150ad56c98232b3672ae86
SHA512a1386022d13b2631132a0376ed61ca94c168547f61250289e6845edea5e49a7af51c669698b13399a69a086ab2081d87ff8999668b4ca7b6c5134eeeebdcfb38
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\vcruntime140_1.dllFilesize
35KB
MD5be3101d186603f94c84e8d67c65e4682
SHA10a0cabe372657d8a633c764050cc8206e29da0e4
SHA256a1e752b2e2e2d69f29892371a47ad50a56fddf978d8ee09959cebe9780441603
SHA5120cb1d6a05e40c90b36428f7c9c6d83230675e01921a31361e18265981f04a20cc9e838dd2f3c0759b8bb217203415ea43a9aadf0eda5333ab42716aeb2c44494
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\zlib.dllFilesize
131KB
MD5eaa9f0f3b8fac95673be9ba9c1443829
SHA171330455589b3e7a7bf63c4005c0c78edab19f1f
SHA2563a4f58e515dafef80074588e43d4fe8c51e90495d7169dd2ff7fb995fcdce9e7
SHA512f975c75ddd4c06c92f0be124c27bfa70d53d6b0df282044067229d6531b9365ccb21d8f500c8806d8799a22840b18656f1962c60f5989c4feacd4164565d1a32
-
C:\Users\Admin\AppData\Local\Temp\MSI7564\zlib.dllFilesize
131KB
MD5eaa9f0f3b8fac95673be9ba9c1443829
SHA171330455589b3e7a7bf63c4005c0c78edab19f1f
SHA2563a4f58e515dafef80074588e43d4fe8c51e90495d7169dd2ff7fb995fcdce9e7
SHA512f975c75ddd4c06c92f0be124c27bfa70d53d6b0df282044067229d6531b9365ccb21d8f500c8806d8799a22840b18656f1962c60f5989c4feacd4164565d1a32
-
memory/180-231-0x0000000000000000-mapping.dmp
-
memory/376-303-0x0000000000000000-mapping.dmp
-
memory/388-293-0x000001AA6DFE0000-0x000001AA6E0EA000-memory.dmpFilesize
1.0MB
-
memory/388-271-0x0000000000000000-mapping.dmp
-
memory/388-291-0x000001AA6DE80000-0x000001AA6DED0000-memory.dmpFilesize
320KB
-
memory/388-275-0x00007FFAD4B40000-0x00007FFAD5601000-memory.dmpFilesize
10.8MB
-
memory/388-276-0x000001AA6B4D0000-0x000001AA6B4DC000-memory.dmpFilesize
48KB
-
memory/388-280-0x000001AA6D970000-0x000001AA6D9AC000-memory.dmpFilesize
240KB
-
memory/388-282-0x000001AA6DAF0000-0x000001AA6DB02000-memory.dmpFilesize
72KB
-
memory/388-294-0x00007FFAD4B40000-0x00007FFAD5601000-memory.dmpFilesize
10.8MB
-
memory/388-289-0x000001AA6DE00000-0x000001AA6DE28000-memory.dmpFilesize
160KB
-
memory/484-326-0x000001A7E75C0000-0x000001A7E75D0000-memory.dmpFilesize
64KB
-
memory/484-319-0x0000000000000000-mapping.dmp
-
memory/548-235-0x0000000000000000-mapping.dmp
-
memory/1012-234-0x0000000000000000-mapping.dmp
-
memory/1140-287-0x0000000000000000-mapping.dmp
-
memory/1208-315-0x0000000000000000-mapping.dmp
-
memory/1208-322-0x000001E6768F0000-0x000001E676900000-memory.dmpFilesize
64KB
-
memory/1296-227-0x0000000000000000-mapping.dmp
-
memory/1312-310-0x0000000000000000-mapping.dmp
-
memory/1312-311-0x0000021A524E0000-0x0000021A524F0000-memory.dmpFilesize
64KB
-
memory/1440-226-0x0000000000000000-mapping.dmp
-
memory/1652-281-0x0000000000000000-mapping.dmp
-
memory/1680-313-0x0000000000000000-mapping.dmp
-
memory/1680-321-0x000001C2AC9D0000-0x000001C2AC9E0000-memory.dmpFilesize
64KB
-
memory/1760-238-0x0000000000000000-mapping.dmp
-
memory/1836-312-0x0000000000000000-mapping.dmp
-
memory/1836-320-0x000001DD3B0B0000-0x000001DD3B0C0000-memory.dmpFilesize
64KB
-
memory/1844-221-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/1844-217-0x0000000000000000-mapping.dmp
-
memory/1844-220-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/1860-314-0x0000025E867D0000-0x0000025E867E0000-memory.dmpFilesize
64KB
-
memory/1908-308-0x0000000000000000-mapping.dmp
-
memory/2216-132-0x0000000000000000-mapping.dmp
-
memory/2220-277-0x0000000000000000-mapping.dmp
-
memory/2220-278-0x0000000000B90000-0x0000000000B98000-memory.dmpFilesize
32KB
-
memory/2220-288-0x00000000061B0000-0x00000000061D2000-memory.dmpFilesize
136KB
-
memory/2224-301-0x0000016E49BC0000-0x0000016E49BD0000-memory.dmpFilesize
64KB
-
memory/2224-296-0x0000000000000000-mapping.dmp
-
memory/2224-297-0x00007FFAE1C20000-0x00007FFAE2161000-memory.dmpFilesize
5.3MB
-
memory/2224-298-0x00007FFAE2AB0000-0x00007FFAE2EA8000-memory.dmpFilesize
4.0MB
-
memory/2224-299-0x00007FFADA140000-0x00007FFADC8BE000-memory.dmpFilesize
39.5MB
-
memory/2224-300-0x0000016E49BC0000-0x0000016E49BD0000-memory.dmpFilesize
64KB
-
memory/2316-309-0x0000000000000000-mapping.dmp
-
memory/2324-225-0x0000000000000000-mapping.dmp
-
memory/2380-305-0x0000000000000000-mapping.dmp
-
memory/2396-279-0x0000000000000000-mapping.dmp
-
memory/2448-236-0x0000000000000000-mapping.dmp
-
memory/2748-230-0x0000000000000000-mapping.dmp
-
memory/3300-222-0x0000000000000000-mapping.dmp
-
memory/3404-237-0x0000000000000000-mapping.dmp
-
memory/3432-323-0x000001D1B8EA0000-0x000001D1B8EB0000-memory.dmpFilesize
64KB
-
memory/3432-316-0x0000000000000000-mapping.dmp
-
memory/3552-228-0x0000000000000000-mapping.dmp
-
memory/3632-229-0x0000000000000000-mapping.dmp
-
memory/3716-232-0x0000000000000000-mapping.dmp
-
memory/3796-233-0x0000000000000000-mapping.dmp
-
memory/3836-240-0x0000000000000000-mapping.dmp
-
memory/3896-200-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/3896-192-0x0000000000000000-mapping.dmp
-
memory/3896-204-0x0000017B254D0000-0x0000017B256D0000-memory.dmpFilesize
2.0MB
-
memory/3896-202-0x0000017B249E0000-0x0000017B24E20000-memory.dmpFilesize
4.2MB
-
memory/3896-201-0x0000017B1FE30000-0x0000017B1FEC1000-memory.dmpFilesize
580KB
-
memory/3896-198-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/3896-199-0x00007FFAE22E0000-0x00007FFAE2821000-memory.dmpFilesize
5.3MB
-
memory/3896-206-0x0000017B1FE30000-0x0000017B1FEC1000-memory.dmpFilesize
580KB
-
memory/4128-325-0x000001BB39580000-0x000001BB39590000-memory.dmpFilesize
64KB
-
memory/4128-317-0x0000000000000000-mapping.dmp
-
memory/4200-302-0x0000000000000000-mapping.dmp
-
memory/4220-219-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/4220-214-0x0000000000000000-mapping.dmp
-
memory/4220-218-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/4280-241-0x0000000000000000-mapping.dmp
-
memory/4344-207-0x0000000000000000-mapping.dmp
-
memory/4344-209-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/4344-211-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/4384-295-0x0000000000000000-mapping.dmp
-
memory/4412-284-0x0000000006B40000-0x0000000006B4E000-memory.dmpFilesize
56KB
-
memory/4412-249-0x0000000004260000-0x0000000004288000-memory.dmpFilesize
160KB
-
memory/4412-269-0x0000000004200000-0x0000000004212000-memory.dmpFilesize
72KB
-
memory/4412-263-0x0000000004B20000-0x0000000004B2A000-memory.dmpFilesize
40KB
-
memory/4412-243-0x0000000000990000-0x00000000009A8000-memory.dmpFilesize
96KB
-
memory/4412-244-0x0000000003F40000-0x0000000003F62000-memory.dmpFilesize
136KB
-
memory/4412-285-0x0000000006B70000-0x0000000006B8C000-memory.dmpFilesize
112KB
-
memory/4412-270-0x0000000005F70000-0x0000000005FAC000-memory.dmpFilesize
240KB
-
memory/4412-286-0x0000000006F70000-0x0000000006F78000-memory.dmpFilesize
32KB
-
memory/4412-262-0x0000000004BF0000-0x0000000004C26000-memory.dmpFilesize
216KB
-
memory/4412-261-0x0000000004B90000-0x0000000004BA2000-memory.dmpFilesize
72KB
-
memory/4412-265-0x0000000004E30000-0x0000000004ED6000-memory.dmpFilesize
664KB
-
memory/4412-290-0x0000000007040000-0x00000000070B6000-memory.dmpFilesize
472KB
-
memory/4412-266-0x0000000005600000-0x0000000005C18000-memory.dmpFilesize
6.1MB
-
memory/4412-292-0x00000000070E0000-0x00000000070FE000-memory.dmpFilesize
120KB
-
memory/4412-245-0x0000000004020000-0x00000000040D0000-memory.dmpFilesize
704KB
-
memory/4412-267-0x0000000005C60000-0x0000000005C6A000-memory.dmpFilesize
40KB
-
memory/4412-268-0x0000000006080000-0x000000000618A000-memory.dmpFilesize
1.0MB
-
memory/4412-260-0x0000000004B30000-0x0000000004B4C000-memory.dmpFilesize
112KB
-
memory/4412-259-0x0000000004C30000-0x0000000004CC8000-memory.dmpFilesize
608KB
-
memory/4412-258-0x0000000004B50000-0x0000000004B88000-memory.dmpFilesize
224KB
-
memory/4412-257-0x0000000004AF0000-0x0000000004B0A000-memory.dmpFilesize
104KB
-
memory/4412-256-0x0000000004AC0000-0x0000000004AF0000-memory.dmpFilesize
192KB
-
memory/4412-255-0x0000000004A70000-0x0000000004A86000-memory.dmpFilesize
88KB
-
memory/4412-254-0x0000000004670000-0x00000000046D6000-memory.dmpFilesize
408KB
-
memory/4412-246-0x0000000003F70000-0x0000000003F78000-memory.dmpFilesize
32KB
-
memory/4412-247-0x0000000003FB0000-0x0000000003FCE000-memory.dmpFilesize
120KB
-
memory/4412-253-0x0000000004550000-0x0000000004560000-memory.dmpFilesize
64KB
-
memory/4412-248-0x0000000003FF0000-0x0000000003FFC000-memory.dmpFilesize
48KB
-
memory/4412-264-0x0000000004CD0000-0x0000000004CF6000-memory.dmpFilesize
152KB
-
memory/4412-274-0x0000000006A60000-0x0000000006AB0000-memory.dmpFilesize
320KB
-
memory/4412-252-0x0000000004570000-0x000000000458A000-memory.dmpFilesize
104KB
-
memory/4412-250-0x0000000004590000-0x00000000045C4000-memory.dmpFilesize
208KB
-
memory/4412-273-0x0000000006360000-0x0000000006388000-memory.dmpFilesize
160KB
-
memory/4412-272-0x0000000005FC0000-0x0000000005FCE000-memory.dmpFilesize
56KB
-
memory/4412-251-0x00000000045D0000-0x00000000045F8000-memory.dmpFilesize
160KB
-
memory/4432-283-0x0000000000000000-mapping.dmp
-
memory/4504-239-0x0000000000000000-mapping.dmp
-
memory/4664-223-0x0000000000000000-mapping.dmp
-
memory/4840-307-0x0000000000000000-mapping.dmp
-
memory/4872-224-0x0000000000000000-mapping.dmp
-
memory/4944-324-0x000001DF87110000-0x000001DF87120000-memory.dmpFilesize
64KB
-
memory/4944-318-0x0000000000000000-mapping.dmp
-
memory/4968-306-0x0000000000000000-mapping.dmp
-
memory/5024-304-0x0000000000000000-mapping.dmp
-
memory/5076-216-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/5076-210-0x0000000000000000-mapping.dmp
-
memory/5076-213-0x00007FFAE0CE0000-0x00007FFAE10D8000-memory.dmpFilesize
4.0MB
-
memory/5088-242-0x0000029C5E780000-0x0000029C5E790000-memory.dmpFilesize
64KB