Analysis
-
max time kernel
143s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 17:09
Static task
static1
Behavioral task
behavioral1
Sample
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe
Resource
win7-20220812-en
General
-
Target
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe
-
Size
948KB
-
MD5
8502657b096736c8702537c8aade74b0
-
SHA1
43a833012e407d2c0c25464e0b7a276d80fd9103
-
SHA256
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51
-
SHA512
06b80fa0773d33166753598069eeb9c8396e107600b3eba443c5c2024eed1f8e666950098479721925d7b5fef39e275860624cb93f220ef77b0ba19fc0a975be
-
SSDEEP
24576:785kQiVhqMOGPksJwaj1Frn6GgHH/VLGLtT+iqKDbg1:IBANwS1hAHf4TDqK/g1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Modifies system executable filetype association 2 TTPs 3 IoCs
Processes:
360safe.exeregsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext\ = "{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext\ = "{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}" regsvr32.exe -
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Processes:
resource yara_rule C:\Program Files (x86)\360\360Safe\deepscan\cloudcom2.dll cryptone -
Downloads MZ/PE file
-
Drops file in Drivers directory 8 IoCs
Processes:
360safe.exezhudongfangyu.exedescription ioc process File created C:\Windows\system32\drivers\360AntiHacker64.sys 360safe.exe File created C:\Windows\system32\drivers\BAPIDRV64.SYS 360safe.exe File created C:\Windows\system32\drivers\360FsFlt.sys zhudongfangyu.exe File opened for modification C:\Windows\system32\drivers\360FsFlt.sys zhudongfangyu.exe File created C:\Windows\system32\drivers\efimon.sys zhudongfangyu.exe File created C:\Windows\system32\drivers\360netmon.sys 360safe.exe File created C:\Windows\system32\drivers\360Box64.sys 360safe.exe File created C:\Windows\system32\drivers\360Camera64.sys 360safe.exe -
Executes dropped EXE 3 IoCs
Processes:
360safe.exezhudongfangyu.exezhudongfangyu.exepid process 1396 360safe.exe 1912 zhudongfangyu.exe 556 zhudongfangyu.exe -
Registers COM server for autorun 1 TTPs 8 IoCs
Processes:
regsvr32.exe360safe.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\InprocServer32\ = "C:\\Program Files (x86)\\360\\360Safe\\Utils\\shell360ext64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32\ = "C:\\Program Files (x86)\\360\\360Safe\\Utils\\shell360ext64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A148181-CEB9-4F5E-B5F2-CDC5B68BD3A8}\InprocServer32 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A148181-CEB9-4F5E-B5F2-CDC5B68BD3A8}\InprocServer32\ = "C:\\Program Files (x86)\\360\\360Safe\\safemon\\360UDiskGuard64.dll" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\InprocServer32 regsvr32.exe -
Sets service image path in registry 2 TTPs 3 IoCs
Processes:
360safe.exezhudongfangyu.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\360Box64\ImagePath = "system32\\DRIVERS\\360Box64.sys" 360safe.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ZhuDongFangYu\ImagePath = "\"C:\\Program Files (x86)\\360\\360Safe\\deepscan\\zhudongfangyu.exe\"" zhudongfangyu.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\BAPIDRV\ImagePath = "\\SystemRoot\\System32\\Drivers\\BAPIDRV64.SYS" 360safe.exe -
Processes:
resource yara_rule behavioral1/memory/1448-55-0x0000000002040000-0x00000000030CE000-memory.dmp upx behavioral1/memory/1448-57-0x0000000002040000-0x00000000030CE000-memory.dmp upx behavioral1/memory/1448-61-0x0000000002040000-0x00000000030CE000-memory.dmp upx -
Loads dropped DLL 47 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe360safe.exeregsvr32.exezhudongfangyu.exezhudongfangyu.exepid process 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1584 regsvr32.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1396 360safe.exe 1912 zhudongfangyu.exe 1912 zhudongfangyu.exe 1912 zhudongfangyu.exe 556 zhudongfangyu.exe 556 zhudongfangyu.exe 556 zhudongfangyu.exe 1396 360safe.exe 556 zhudongfangyu.exe 1396 360safe.exe 556 zhudongfangyu.exe 556 zhudongfangyu.exe 556 zhudongfangyu.exe 1396 360safe.exe 1396 360safe.exe -
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
360safe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360Safetray = "\"C:\\Program Files (x86)\\360\\360Safe\\safemon\\360Tray.exe\" /start" 360safe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process File opened (read-only) \??\H: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\I: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\M: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\O: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\S: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\G: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\W: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\X: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\Y: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\Z: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\K: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\Q: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\T: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\U: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\V: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\E: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\F: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\J: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\L: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\N: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\P: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File opened (read-only) \??\R: 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
360safe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B69F34DD-F0F9-42DC-9EDD-957187DA688D} 360safe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\NoExplorer = "1" 360safe.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process File opened for modification \??\PhysicalDrive0 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process File opened for modification C:\autorun.inf 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Drops file in System32 directory 1 IoCs
Processes:
360safe.exedescription ioc process File created C:\Windows\SysWOW64\360SoftMgr.cpl 360safe.exe -
Drops file in Program Files directory 21 IoCs
Processes:
360safe.exezhudongfangyu.exe36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process File created C:\Program Files (x86)\360\360Safe\MiniUI.dll 360safe.exe File opened for modification C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg-journal zhudongfangyu.exe File opened for modification C:\Program Files (x86)\360\360Safe\updatecfg.ini 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninst\filelist.xml 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\UninstallRootDirFileList.xml 360safe.exe File created C:\Program Files (x86)\360\360Safe\{1708D1DC-F1F8-4267-A57A-D1CDFC6BF573}.tf 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\filelist.xml 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninst\Register.xml 360safe.exe File opened for modification C:\Program Files (x86)\360\360Safe\AntiArp\dpath.ini 360safe.exe File created C:\Program Files (x86)\360\360Safe\safemon\7z.dll 360safe.exe File created C:\Program Files (x86)\360\360Safe\{49866394-1937-45f4-8A56-B69F2E82AF1C}.tf 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninst\360safe.setup 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninst\Plugin.xml 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\360safe.setup 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\Plugin.xml 360safe.exe File created C:\Program Files (x86)\360\360Safe\config\uninstbackup\Register.xml 360safe.exe File opened for modification C:\Program Files (x86)\360\360Safe\safemon\param.ini 360safe.exe File opened for modification C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg zhudongfangyu.exe File created C:\Program Files (x86)\360\360Safe\{013DBA46-DD62-451d-9D7B-2CEDEC8EA691}.tf 360safe.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe File created C:\Program Files (x86)\360\360Safe\config\uninst\UninstallRootDirFileList.xml 360safe.exe -
Drops file in Windows directory 1 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
360safe.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\TypeLib\Version = "1.0" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7418AFE6-6A10-479B-99FA-4AE0D39026A9}\1.0\0\win32\ = "C:\\Program Files (x86)\\360\\360Safe\\SoftMgr\\360SpeedTime.dll" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\TypeLib 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583} 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZHUSHOU360\Shell 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Safemon.NavigatMon\ = "SafeMon Class" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ = "IShellContextMenu" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\TypeLib 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SpeedTimeImpl.SpeedTimeImpl.1\ = "SpeedTimeImpl Class" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583}\TypeLib 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZHUSHOU360\ 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{451A36CF-D7AA-477D-AAD8-6AB2E2F043A1}\ = "shell360ext" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32\ = "{26CD0715-0722-479B-A8C7-29A911171774}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\InprocServer32\ThreadingModel = "Apartment" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7418AFE6-6A10-479B-99FA-4AE0D39026A9}\1.0\0\win32 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\shell360ext.DLL\AppID = "{451A36CF-D7AA-477D-AAD8-6AB2E2F043A1}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{338CE0CA-987B-4CC9-8297-5430E7DCFD2A}\1.0\0\win64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A148181-CEB9-4F5E-B5F2-CDC5B68BD3A8}\InprocServer32\ = "C:\\Program Files (x86)\\360\\360Safe\\safemon\\360UDiskGuard64.dll" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\Safe360Ext 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A148181-CEB9-4F5E-B5F2-CDC5B68BD3A8} 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7A148181-CEB9-4F5E-B5F2-CDC5B68BD3A8}\ = "我的U盘 (A:)" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32\ThreadingModel = "Both" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32\ = "{26CD0715-0722-479B-A8C7-29A911171774}" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SpeedTimeImpl.SpeedTimeImpl.1 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZHUSHOU360 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{26CD0715-0722-479B-A8C7-29A911171774}\ProxyStubClsid32 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Safemon.NavigatMon.1\CLSID 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7418AFE6-6A10-479B-99FA-4AE0D39026A9}\1.0\HELPDIR 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZHUSHOU360\DefaultIcon 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D} 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\TypeLib\ = "{BB67E9B5-A1A3-4206-A443-DE93D592682C}" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SpeedTimeImpl.SpeedTimeImpl.1\CLSID 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\Safe360Ext 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7418AFE6-6A10-479B-99FA-4AE0D39026A9}\1.0\0 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583}\ProxyStubClsid32 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583}\TypeLib\ = "{7418AFE6-6A10-479B-99FA-4AE0D39026A9}" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\ = "ShellContextMenu Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{338CE0CA-987B-4CC9-8297-5430E7DCFD2A}\1.0\0\win64\ = "C:\\Program Files (x86)\\360\\360Safe\\Utils\\shell360ext64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Safe360Ext\ = "{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}" 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\VersionIndependentProgID\ = "Safemon.NavigatMon" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26CD0715-0722-479B-A8C7-29A911171774} 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27AD6078-180A-4924-BB11-9C3DA8A42C05}\TypeLib 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\ = "SafeMon Class" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\VersionIndependentProgID 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7C0F6D57-E799-4C8A-A319-8E2B4D724CF0}\InprocServer32 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B69F34DD-F0F9-42DC-9EDD-957187DA688D}\ProgID 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SpeedTimeImpl.SpeedTimeImpl 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27AD6078-180A-4924-BB11-9C3DA8A42C05}\VersionIndependentProgID\ = "SpeedTimeImpl.SpeedTimeImpl" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{066F24B7-D820-4176-8B55-058A8F1BA583}\TypeLib 360safe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Safemon.NavigatMon\CurVer\ = "Safemon.NavigatMon.1" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{338CE0CA-987B-4CC9-8297-5430E7DCFD2A}\1.0 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26CD0715-0722-479B-A8C7-29A911171774}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27AD6078-180A-4924-BB11-9C3DA8A42C05}\TypeLib\ = "{7418AFE6-6A10-479B-99FA-4AE0D39026A9}" 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{27AD6078-180A-4924-BB11-9C3DA8A42C05}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} 360safe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7418AFE6-6A10-479B-99FA-4AE0D39026A9} 360safe.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exepid process 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe -
Suspicious behavior: LoadsDriver 5 IoCs
Processes:
pid process 464 464 464 464 464 -
Suspicious use of AdjustPrivilegeToken 26 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe360safe.exezhudongfangyu.exedescription pid process Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeManageVolumePrivilege 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Token: SeDebugPrivilege 1396 360safe.exe Token: SeDebugPrivilege 1396 360safe.exe Token: SeDebugPrivilege 1396 360safe.exe Token: SeDebugPrivilege 556 zhudongfangyu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe360safe.exedescription pid process target process PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1812 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1396 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe 360safe.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1396 wrote to memory of 1584 1396 360safe.exe regsvr32.exe PID 1448 wrote to memory of 1232 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe taskhost.exe PID 1448 wrote to memory of 1320 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Dwm.exe PID 1448 wrote to memory of 1384 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe Explorer.EXE PID 1448 wrote to memory of 1184 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1448 wrote to memory of 1168 1448 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe DllHost.exe PID 1396 wrote to memory of 1912 1396 360safe.exe zhudongfangyu.exe PID 1396 wrote to memory of 1912 1396 360safe.exe zhudongfangyu.exe PID 1396 wrote to memory of 1912 1396 360safe.exe zhudongfangyu.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe"C:\Users\Admin\AppData\Local\Temp\36ef019e36c07eb2c3bb4c45dabecc750569dcb17d1f7f5867133018ba319c51.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\360safe.exe"C:\Users\Admin\AppData\Local\Temp\360safe.exe" /S /D=C:\Program Files (x86)\360\360Safe3⤵
- Modifies system executable filetype association
- Drops file in Drivers directory
- Executes dropped EXE
- Registers COM server for autorun
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\360Safe\Utils\shell360ext64.dll"4⤵
- Modifies system executable filetype association
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe" /InstallAndStart4⤵
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"C:\Program Files (x86)\360\360Safe\deepscan\zhudongfangyu.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Modify Existing Service
1Change Default File Association
1Registry Run Keys / Startup Folder
3Browser Extensions
1Bootkit
1Defense Evasion
Modify Registry
9Bypass User Account Control
1Disabling Security Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\360\360Safe\360base.dllFilesize
832KB
MD50f93ed1e750a7806db1cd17654fc31aa
SHA10c7342d73ad99db46f29fed921e8102a188990ea
SHA2561115ae93fa5bf6562a9dd849417a7ed05eaa09a9722f1e12435a986cb797309b
SHA512d79f74d4521db2b83b16c104633e288f638c54cda8d798d2873942494751bc41169c78b779b09dc2a31405be1ef4d4d5662c5bb394ce29cdbf5c70e1b5c243ac
-
C:\Program Files (x86)\360\360Safe\360bps.datFilesize
588B
MD5f8b890c315bebc5290145e34ca9ccd9b
SHA15f9a25fa359f52d407b7fece13f4d4b7a2489e5c
SHA2562485f94cf556d86a564c31907af85750f1371b8fc51c8bb18b96e3ddfd44261a
SHA5124cc95dbd253c78d4464490cc6e80775d2d50974630693ec1aeeaca96ace92f31a7cc97aeb9f44963084e09a60ea471992aa6747ef1bbf8ae2912153904915352
-
C:\Program Files (x86)\360\360Safe\360conf.dllFilesize
261KB
MD54aa45b19e6669dc1e83bfaa963adcef4
SHA1030539b89c8c18c5b6334793068188584e1b3dda
SHA256317a56b95923421c00af94d619016191e1f340f5706468e5d357205bea556493
SHA512cb515fc1cee245e1cfd70b9d47528baf60baec07007b365e72b9658dee8de3c6063ca61c78133128849e1425a87ab383820bf607165891bf0cbb7344822b545a
-
C:\Program Files (x86)\360\360Safe\360util.dllFilesize
415KB
MD59df4786954e418035c88be83229297bd
SHA1b26ecb3909b595805480bca3040a9d5cf413c971
SHA25615b087146c0e5eb8edd19f1ec6e400a456ed53c0d3366cedf30951f77756322d
SHA512d8fa1a95d0c0b13681630fea4e21abc8b8183614380aede48de1fee86b68521ae55e938d4bdcf63864fce3dc30febb9ae7bd7331b75aebccd17b3b3fb8fec06a
-
C:\Program Files (x86)\360\360Safe\Utils\shell360ext64.dllFilesize
284KB
MD5f943a2f00703a8b90aa039fb2c23526b
SHA1f48ddcdc863b121daa8bd3c3c99fbef8e9a71960
SHA25631a998200e93b47bd57413ff2303a37630ea6a3b2c07bb9a7c22dfd393747bc9
SHA5120c2bca8050e261543b5308b1cad058e48e5da68e33ce178c42538c896ec59f85f2d6868f190ea83ce721ef5895d0a08c09ac727fe6a01f3369652c8ff1daa01e
-
C:\Program Files (x86)\360\360Safe\deepscan\360FsFlt.sysFilesize
206KB
MD568a1fdbccad2c3f99e989c3615463e70
SHA14d56fa21b6bc4c66aa56eeba32499ac1b84dcfe1
SHA256b2c94729b8a3d8b505ec4eb7d1b58bd3a2e67e4443a3a2e49a2a609f8653baae
SHA512261e4ee08db37368c393b064fd576a417562aed141d6cce67dddb231dd680e355d47519ebd53ff8597429b684bf2e029a8349fd3f2917170435af28f889cc7b9
-
C:\Program Files (x86)\360\360Safe\deepscan\360MalwareSection.dllFilesize
258KB
MD5a5f9bacd465457627fd1cd95499e7eed
SHA1ee96f587ac9762e913799b441149ea9139922694
SHA256493167c142cfa5253d662ed42546c22273b44e45e7aeb6a9dbdfd68fec4b68b6
SHA512cd8d4bbece6c4e0460af31899e647c1c5fbc2e3cfd1d0d45ae6cf034f0e8f2391547b616e4eece66fd4d02aec60746958a86c80e5889a71f029430b7dce85d12
-
C:\Program Files (x86)\360\360Safe\deepscan\360netcfg.exeFilesize
257KB
MD568fd969f07e52068a9a3bf324141e70f
SHA13c7f00c9e63808b9ba1bceb622226a0276bb85a6
SHA256521a9190c053b402ab8d36366271a3768f016f9ab8fc903911939191442bee00
SHA512bc9c672d8a2ff364f8ceefc9b7e89df98e2844d921ee77c4a295233b3e18f68f88dbaf817f41c53c6263898df019e6edbba13e1ecffe087ae931440eae9a1365
-
C:\Program Files (x86)\360\360Safe\deepscan\APKCheck.dllFilesize
181KB
MD5a5686208301f0f766d02d32af0d9f64f
SHA10fe4a19867ec2b0be70ec6b0fed48c375f741c94
SHA2560074aa1931429bac34404ab126d07aec416a809bee71b8b33b19575acf89e3e3
SHA512b2ea7f31ad935b3cc955cdff35788a1ce4f26072d8ad0e470dc12ca0d587bc0dc846e3170660d5ff6406ac073041721e6aa44876bb4bda439b835cc2b1ef768e
-
C:\Program Files (x86)\360\360Safe\deepscan\BAPI.dllFilesize
189KB
MD5e3b8032686dcfbddc2ca9553702af2b6
SHA14bfbf6079977f0e9d825b8064015ded71e19e30d
SHA25606670fa213766154982bb1b5140ef7cb08f8eb76b369ff638be8d9068bc90d1c
SHA51250d86ce09bc61db1861c6f4728caa7d5b705bb5e1ade9f2f7551f49f43d8d31480f7c851217509d78d9a72b4d79d31d42e92d1c6e92ccba0dc968179bcc747ec
-
C:\Program Files (x86)\360\360Safe\deepscan\BAPIDRV.sysFilesize
168KB
MD509a5fd97eb15217a390f8501f51df1e0
SHA1703e333b7b599868cbdbb7ddba5cdb36f6eb0d2d
SHA256c1422dd68392db29f8dc40179e09c2f809501c102b3a1f7a379555c5a48d5b5b
SHA5121e516359ef2b369bb8bea233af30d7e93969c5dbafbacd5ffc807018b3d17018ae4cd25cc757e6f4537d92754f339316a97f6417aaa3ed2e7d10897a8294d26f
-
C:\Program Files (x86)\360\360Safe\deepscan\BAPIDRV64.sysFilesize
185KB
MD53a652b4833e91d4e5cb26777c3ce96b8
SHA10778b3cedc67626f5b0ae3efa78f47ed75cb6d02
SHA2566c83d544cfb71c918d69e842efd3d04a8e502755052bd2e560dcbe14b60c7bb5
SHA51268ef3fb6d495a9cac1e14eb49123234401082ea6e86beb87b9752b010e29899bf167eeb92bbdb74f7afc7529b6016b2a4434971e53bb01ae2fab795c4e2d0555
-
C:\Program Files (x86)\360\360Safe\deepscan\CQhCltHttpW.dllFilesize
453KB
MD5c4403695b3330d2895dec3d5fdac4f2c
SHA1d361316bfc1c7fa9c9bd70ddd26268a8afcac64f
SHA2568383cdc1810551eabf714d03e646d4f8e65edb8c6a04ced60269f1ac0d61ea25
SHA512141e7e36ac234c083f4fcd25a03ecf3c85cd4d09417950d4fa6ca997ef61f99f91c8b9ac67a509952dcdae40a009f245fc02d6d6569d77b9c38625ff85a57068
-
C:\Program Files (x86)\360\360Safe\deepscan\CheckSM.dllFilesize
289KB
MD5fa252c0549142c84b5155b5705707967
SHA1249b96cc27ca350beb560d4cf13f8be66e9ee7dd
SHA25660b53aa3bbf5474d8213c4c92c97f27b191fe27e7e735f6fd6064f7a311f5e84
SHA512e4236247e6bf1b89a9383612a4daa41e69879dd5724ac304adb6e0d66e6c4ee654c02fcacfd793325b787235d7d0bd783456b0fb987ebe6d125e8c1f394fd522
-
C:\Program Files (x86)\360\360Safe\deepscan\CheckSM.exeFilesize
158KB
MD5c9175b80b4f5c87fe5e1138d9d2e2433
SHA11f83422c6ce601314ecd76ba22c12485f12f0d7d
SHA256360b9a936ecce2deaded9e6767719074f0181db50aea12d2a486424dc1955394
SHA512ae931d6d826499d95e02befabc9feede0cb5e6e62b060a61a081a477d669cccc2822da628d7bf2cb026fee42d5e643a68aef279132900b19200d25fa6534e0bf
-
C:\Program Files (x86)\360\360Safe\deepscan\CloudEngine.dllFilesize
574KB
MD593a8f51ac86ab467b8756768fdf42751
SHA1e06e883459498ddc0a895c3a2931a61578acbea8
SHA256ae186bc003cf450628c6fe3ecbfecac9aadb4e43300c5a1276844340f365fe39
SHA5128c7b023ced302f4aa416865b0d357a83ccdb6fda0aa8ec9eade38662a4add0a9699a24a8e8f99975843ae422fd15abae2f6fc7dbcfaf36d19da7ac67bea3371d
-
C:\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exeFilesize
280KB
MD599aee225c1d6b2e4bc1dbbd8f8711b39
SHA1737f37e12126bdeefc553f6177e7a940219c2e54
SHA256eda2f6f22565d4004497eff9a54a2ad52858b9b3a72d2593159f0131a5ed2af0
SHA512fbb26893c539a0fb4283cccca49e7267d0d5dedc11f891d17f372f39732083e658595a95be8e75132f27e61872e52dc4d11585397102b37e4e700c5b39d3f8fd
-
C:\Program Files (x86)\360\360Safe\deepscan\art.datFilesize
14KB
MD564aeb1fbeff797a07fef71a0ffc657aa
SHA14c23b388eb192982325e00c5e648aacbdec46cdf
SHA256742a1d6d27ddd46a7ba349d5ecd986dd63d03d41d5e88b9480b56704311c4bfa
SHA512e35b7921b488d33849789877463c2b383a5fd33f5f562f69719b3e08d1d5f2f9e562ce16144dd5dc36b51e87c7813e818505b4f5177edc90d7beb94cc7eb37ba
-
C:\Program Files (x86)\360\360Safe\deepscan\ave\360ave.defFilesize
296KB
MD5ff3167ca5134af77b67ec217923b6caa
SHA1983b6305da110301c7644342883a77ff5e1421b0
SHA25630e15d6c90e4421df81ddf3c80d4ab2c6e1d505dc8ca7b0501e38e0ed7e9de45
SHA5121e947e50e1115197d3c0ad43c402d65a1a2d8f84cced90eef9c1a03684569ce64f645f3d9dcdfa1f6920e0ee7ca0dc403991d10f0a2d73f46ad17ebf72d7e833
-
C:\Program Files (x86)\360\360Safe\deepscan\ave\AVEI.dllFilesize
232KB
MD5f622e193261736c3cc33c785349254cc
SHA11e967375fa1d2a7d20f13852548e7298184c1e41
SHA256ba6dc479a8669d039fc4ae37631dda8a8001b5cf7bf2e366b37a0884a7280500
SHA512ed8720b7a9e5c7e1aab139b6da3d7ee1d1618e2575cbcf081cca31e6953d05510dfe4f34ad7411fd0eb5c132fc509e5c5c3de96da380941df7d636a3ee60705c
-
C:\Program Files (x86)\360\360Safe\deepscan\ave\AVEngine.dllFilesize
777KB
MD5ec28bf05165106c734e8cb90b56e289f
SHA106a4b2da893d71a02ee1ac7b0d29ab0d823fc493
SHA2566c39512ce5ad1353012b695831dda9bf94592143f78f44cf7eb32dea2d065633
SHA5126215013cd83a22d3feacc3036e192a4bbd4506428913bfc2862f685e2adeae47c148425a886d2c62798a29284b1792f2e0cc201ffc28e5b1d9d2d68393a90a5c
-
C:\Program Files (x86)\360\360Safe\deepscan\ave\UpFltr.defFilesize
739B
MD508c5fec8e71e340ccdd81477cc947034
SHA1426f5236bfa3658874636c7507d608b6e8b73fbd
SHA25647b29e26ce039ac9db4e11966d03a894db6f8a9127cd7d7180bd3874ebd0008e
SHA512b81813473ff75fb17235827e7226017e00fb9c5e6aeaf80bf44b4e72ca15b9c0258d86f49d93f9d6bb1b4433f8a89d16d9717053e949e9aa0f84f3b38021742d
-
C:\Program Files (x86)\360\360Safe\deepscan\ave\plave.defFilesize
1KB
MD5c1fd0227c0b4cd72b434666c1d5b837b
SHA167c6496884264d2f95025d02d0b126e82a002633
SHA256d1543208817eeec0c112e603e7eca296f956f23408cca0318f992604897fa97f
SHA512e4aaaeb6cf4d52648361b119ccb2d4af0503f2d5442dde0bf19da638f81495872db537662db25cc8d5606d43c08bba52d5998d9b9f4967648c0df1eda05f16c2
-
C:\Program Files (x86)\360\360Safe\deepscan\cloudcom2.dllFilesize
768KB
MD50f24a6af32257c85874006760fd583eb
SHA1254e120be44cd9cf84c27befaadcc2b512bccf4c
SHA2568c3dd43233904a3f075680df4a3a05e58b42af6eefa074a8e91792d6ffd55140
SHA512728d5800ac6a7681b261802f9d3ffd82f84b23dcbec622c5705aef52a8e66b80559e4eab0779cf0f99099bd8bd1039bec9a75a84bc0d7bdf395a32e5327d7479
-
C:\Program Files (x86)\360\360Safe\deepscan\cloudsec2.dllFilesize
1.1MB
MD5dcdf836664f9709182f85c5cf1a58ccb
SHA14863e598c50c8598cc195a6961adc786e5b80511
SHA2567bbbf5cb03a45ea5732bbf5b19933567592f7b9f23513f6a896527b469b51577
SHA51299a7a56305a1bf9f34c56f56e8fd13befd974454187e5fd0bd97b814e6bd74519abe3e6890c42c00d0e43f99ed6b63e9d6ddb5c69119ddfb7f56478fa487e263
-
C:\Program Files (x86)\360\360Safe\deepscan\cpr.datFilesize
5KB
MD528aec6d4c570799332f4fddf87da2eb9
SHA13e21d9f61b03d0c16165ad4a0f269c1dfcbde317
SHA2568cdd8a54004a08f673adbd1c9a73ec8d3bd41e99e68e8d8786b286d410a43aa0
SHA512be1e75cf9ee68c62a1fe246ca3bd57b75fafbaba56224dde627def0a2384535cf0d5cb757aa16059a6f2a4af55ec6600f9363ae9f5970c1f071a71a20bdae2fe
-
C:\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
C:\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
\Program Files (x86)\360\360Safe\360Base.dllFilesize
832KB
MD50f93ed1e750a7806db1cd17654fc31aa
SHA10c7342d73ad99db46f29fed921e8102a188990ea
SHA2561115ae93fa5bf6562a9dd849417a7ed05eaa09a9722f1e12435a986cb797309b
SHA512d79f74d4521db2b83b16c104633e288f638c54cda8d798d2873942494751bc41169c78b779b09dc2a31405be1ef4d4d5662c5bb394ce29cdbf5c70e1b5c243ac
-
\Program Files (x86)\360\360Safe\360Conf.dllFilesize
261KB
MD54aa45b19e6669dc1e83bfaa963adcef4
SHA1030539b89c8c18c5b6334793068188584e1b3dda
SHA256317a56b95923421c00af94d619016191e1f340f5706468e5d357205bea556493
SHA512cb515fc1cee245e1cfd70b9d47528baf60baec07007b365e72b9658dee8de3c6063ca61c78133128849e1425a87ab383820bf607165891bf0cbb7344822b545a
-
\Program Files (x86)\360\360Safe\360Safe.exeFilesize
1.2MB
MD55f05e5474389920c4cfaf0574006cd95
SHA1230c251ebc52179cc540f0848dd3bac536007563
SHA2564ac1265cc680d68c7310ef03e9d832fbbbd859439c318f4782145d2ff280212f
SHA512e0366837c748601a76216297ff13b255df6411b031d7224d05c366b6067af3a00391eb7b51826027a8a075aa7dab55a32e3ebafcb967bfee9a40c51964c05963
-
\Program Files (x86)\360\360Safe\360Safe.exeFilesize
1.2MB
MD55f05e5474389920c4cfaf0574006cd95
SHA1230c251ebc52179cc540f0848dd3bac536007563
SHA2564ac1265cc680d68c7310ef03e9d832fbbbd859439c318f4782145d2ff280212f
SHA512e0366837c748601a76216297ff13b255df6411b031d7224d05c366b6067af3a00391eb7b51826027a8a075aa7dab55a32e3ebafcb967bfee9a40c51964c05963
-
\Program Files (x86)\360\360Safe\360Safe.exeFilesize
1.2MB
MD55f05e5474389920c4cfaf0574006cd95
SHA1230c251ebc52179cc540f0848dd3bac536007563
SHA2564ac1265cc680d68c7310ef03e9d832fbbbd859439c318f4782145d2ff280212f
SHA512e0366837c748601a76216297ff13b255df6411b031d7224d05c366b6067af3a00391eb7b51826027a8a075aa7dab55a32e3ebafcb967bfee9a40c51964c05963
-
\Program Files (x86)\360\360Safe\360Util.dllFilesize
415KB
MD59df4786954e418035c88be83229297bd
SHA1b26ecb3909b595805480bca3040a9d5cf413c971
SHA25615b087146c0e5eb8edd19f1ec6e400a456ed53c0d3366cedf30951f77756322d
SHA512d8fa1a95d0c0b13681630fea4e21abc8b8183614380aede48de1fee86b68521ae55e938d4bdcf63864fce3dc30febb9ae7bd7331b75aebccd17b3b3fb8fec06a
-
\Program Files (x86)\360\360Safe\SoftMgr\360SpeedTime.dllFilesize
128KB
MD57b2e10e7885598d396e461c39b46b976
SHA15e46b06d3318e8d227561145f75fca035798a5fd
SHA2565af53df6b02b1d28f6fa937088c5ec5e4d2cd4a482b3f3836e9c97101e1311ec
SHA512680e5dc63c76767d006c3b49f15181bf166d7615ea4337621f2ae94ddf378e6f5cb31975c85bc480efa984d73135a71a367b259372c20d622a3f92d37f5c5968
-
\Program Files (x86)\360\360Safe\SoftMgr\SoftManager.exeFilesize
2.6MB
MD5bd3d26425ca92d6793cdef53798763a1
SHA1fcd554efbbb7cd248d3c9ef3c994ae8db5605330
SHA256bcfd584b3ab8aae166d7285d3e07598f46e01a11a1ad7089c8b07e71942f28b5
SHA5129c89397da333d52de63cb87f8e13bf7f1bce5e852d6736c5e2086a0a7aad597db4d22edd310676e8359c503d611ae9d7717f92b3a9bf5512c007c07381d6272b
-
\Program Files (x86)\360\360Safe\SoftMgr\SoftManager.exeFilesize
2.6MB
MD5bd3d26425ca92d6793cdef53798763a1
SHA1fcd554efbbb7cd248d3c9ef3c994ae8db5605330
SHA256bcfd584b3ab8aae166d7285d3e07598f46e01a11a1ad7089c8b07e71942f28b5
SHA5129c89397da333d52de63cb87f8e13bf7f1bce5e852d6736c5e2086a0a7aad597db4d22edd310676e8359c503d611ae9d7717f92b3a9bf5512c007c07381d6272b
-
\Program Files (x86)\360\360Safe\SoftMgr\SoftManager.exeFilesize
2.6MB
MD5bd3d26425ca92d6793cdef53798763a1
SHA1fcd554efbbb7cd248d3c9ef3c994ae8db5605330
SHA256bcfd584b3ab8aae166d7285d3e07598f46e01a11a1ad7089c8b07e71942f28b5
SHA5129c89397da333d52de63cb87f8e13bf7f1bce5e852d6736c5e2086a0a7aad597db4d22edd310676e8359c503d611ae9d7717f92b3a9bf5512c007c07381d6272b
-
\Program Files (x86)\360\360Safe\Utils\shell360ext.dllFilesize
242KB
MD5635134a8fc1b6061db6a8278f9b5c898
SHA178302c4b5d6bf42bb73df25fcc9ce0e4973046ad
SHA25688c8259848b837fbcf22c5911c6a05ba7a7f06427b451c523677a6267fdc1b6d
SHA5124ac78183453bc7590f2d1f3beed24f102a44cb9f48c914fd73e4aedb25dd1a43eacdea199ad171cfeff863e432036d5cd9d1025a3d481525574e65fe3a7df973
-
\Program Files (x86)\360\360Safe\Utils\shell360ext64.dllFilesize
284KB
MD5f943a2f00703a8b90aa039fb2c23526b
SHA1f48ddcdc863b121daa8bd3c3c99fbef8e9a71960
SHA25631a998200e93b47bd57413ff2303a37630ea6a3b2c07bb9a7c22dfd393747bc9
SHA5120c2bca8050e261543b5308b1cad058e48e5da68e33ce178c42538c896ec59f85f2d6868f190ea83ce721ef5895d0a08c09ac727fe6a01f3369652c8ff1daa01e
-
\Program Files (x86)\360\360Safe\deepscan\ZhuDongFangYu.exeFilesize
280KB
MD599aee225c1d6b2e4bc1dbbd8f8711b39
SHA1737f37e12126bdeefc553f6177e7a940219c2e54
SHA256eda2f6f22565d4004497eff9a54a2ad52858b9b3a72d2593159f0131a5ed2af0
SHA512fbb26893c539a0fb4283cccca49e7267d0d5dedc11f891d17f372f39732083e658595a95be8e75132f27e61872e52dc4d11585397102b37e4e700c5b39d3f8fd
-
\Program Files (x86)\360\360Safe\deepscan\qutmload.dllFilesize
74KB
MD5c551e84052d7e7eece3f4902606641b7
SHA115fe77889f1b8f1d0be2707847cae11dcb13e603
SHA256ff4aff869358e8725b3012892e5676d4e33518b218a1ef86c30c71ff4d22e104
SHA512cd9c53e66b3066ce4e990c56324d9b4048f34f6c971f81a73ae8010971f7eb02efefff8b24c829537377aa2c32cbc5a482880bf220c85aa2111d2b1432dd6b13
-
\Program Files (x86)\360\360Safe\ipc\360Box.dllFilesize
40KB
MD5ce272856f989bb4059f2fe54bf9a7745
SHA19b74b0d8ca37d9cbe4ebe4bcec7c1fe0a808be51
SHA2563378319c0e1968c11962588f17da25944a458ba06c323aa2a5134587d8612c85
SHA5122647dd4d4d8d66ac464b037dfe6d2a87d37546535fa940fc3c28412ce1aea91a230d259a3748e0fdcaf64291a02dd6f3cbf09e56b72deb1d0b3e685cb958ed37
-
\Program Files (x86)\360\360Safe\ipc\DrvUtility.dllFilesize
211KB
MD5220dc2db3ea9b6cc2240411cb7263ad9
SHA1dd5448dd03dd2af73fea69f9a21468bac8e49666
SHA2565b12546f50bdd4445943bf9e986ac8e44d20d22e041953645109cdec72e69a84
SHA51238aafe0836d32e7645d9dcebd51e40bfc4dbb6fdaf1145d22a302749ce3f0590986cb5354782e8c213a7a7ed9d55bf621785f35b1dd19041a11ee9dcd38038eb
-
\Program Files (x86)\360\360Safe\ipc\X64For32Lib.dllFilesize
50KB
MD50c7e45e1beb3532c74be17b12725bfe6
SHA1df59c0519105e0b30351b2ba824f383a602c8c49
SHA2569700b215ea9f04cbb180eda8e719c1d3f4e8785f232eb344a03a57abb1a8c30d
SHA51266a3e37d1318d8c4255ad8c555c7e350a7e5a584616f9c5dc8399dbec7ad7905f4404fbcf4f985a540bc7de9c0e59a70c4a1e94ac2d49bf553f953cf5d900607
-
\Program Files (x86)\360\360Safe\ipc\sbmon.dllFilesize
308KB
MD541f24e7c658eecec67c8319b18e37f97
SHA1c50265726c358dbfc7beea410792e2517b65c590
SHA2565f27d66e717c3b0de60787592cb173fc941b958663ed93dbbdd5fdf8c77a5541
SHA512634a37e4f281423eb71c28b207be72566e210380598a1d3b2273e6b6cb6c6a81981a1d1f2187cf97711195c1e76acdcd60ae63bc0d7698bc29e42806fa29409f
-
\Program Files (x86)\360\360Safe\mobilemgr\SoftUpdateM.dllFilesize
171KB
MD5d012608e506cd5369fa2b094dbed5e48
SHA1597df52d0623e1a03aa78c8534cdfae4c6e8db89
SHA2564e99c381cbe7bb420504280374a7c96a1b93aef226d0bf1ef93e0660b015a63a
SHA51236f845d471b2acfbab815c46c706329be054693f2aceafce32d87b83dc7dfd0dfc430d82c3f85a125adab44feb9d2bf1b33905d326d6548c64f8584ce328e795
-
\Program Files (x86)\360\360Safe\mobilemgr\np360MMPlugIn.dllFilesize
147KB
MD54a2a47e4ec5ebbcd417c5547e4db3658
SHA128416993f3134e92f06833ed3dec0fc20bd830af
SHA256f63ea99019dcf7ad983f9e6457d12b2fa4769c7a712fe92777694a05ec92427f
SHA512c9d59121620819e7c1e01d286edbc3546e1c8b9e2a6b0b366f44feaaa20f8d0bff7f99e82fb565f292eb99a59b2a663bf130640a069356cc24a97cd2a792a0b3
-
\Program Files (x86)\360\360Safe\netmon\360netctrl.dllFilesize
349KB
MD5ca1b5f74233fb771a4cbb130ef26bfa1
SHA1299d72512169f29f609d6f4f9430a9d798d753d3
SHA2563a54c7983376b26e81423f3f76367589a2900c7e36624eae82d654874c15d8ad
SHA512c2bbdb310a82c99d98b21169bcd3d7e4785a360180692a7fe6f218d623c8161474c002f894e3c90ba41dd22053e772e3eeba048bf49d4f4dda0d6e46e842dc42
-
\Program Files (x86)\360\360Safe\netmon\netmstart.dllFilesize
123KB
MD5e8e9dc79f71ef5360e5cc003ff1abfd7
SHA1c54f1b05950f0349787eb12a1cf9d9eeb1194da0
SHA2563ed8e0a60a8507d1b74f1e52387310f1f5a3ccab08d3d78404c936b39d12019f
SHA51204b68e67e379f52b2f4c84d358e6288929e8acb002d08fb4bdad0169fa031bf0367f5ee91769929ec0bb031976b64b8d01a52cd085cf5458f275b022a29a9fe9
-
\Program Files (x86)\360\360Safe\safemon\360hipsPopWnd.dllFilesize
3.3MB
MD5df7bd7d18361c1eb065c8b1488332073
SHA16e380dce97d7cc2fc216ce2ddc54b0c4ae7e0558
SHA25668fc5b7d5edb78fa5da8df617ac8c3ab3d9956fb7b359ede2e672a2f5189735b
SHA512a5300af097e1c6cd74e96ce38b017e03d1b850ea030dbed10c314ac4d8b369c1181aa8e8c0265af8c802007b03a48135d160906afe07c7997e18caa25c751243
-
\Program Files (x86)\360\360Safe\safemon\360hipsPopWnd.dllFilesize
3.3MB
MD5df7bd7d18361c1eb065c8b1488332073
SHA16e380dce97d7cc2fc216ce2ddc54b0c4ae7e0558
SHA25668fc5b7d5edb78fa5da8df617ac8c3ab3d9956fb7b359ede2e672a2f5189735b
SHA512a5300af097e1c6cd74e96ce38b017e03d1b850ea030dbed10c314ac4d8b369c1181aa8e8c0265af8c802007b03a48135d160906afe07c7997e18caa25c751243
-
\Program Files (x86)\360\360Safe\safemon\360procmon.dllFilesize
395KB
MD55ac8a07d67fb7c0728e98fc22d62ab07
SHA1471ccedd4237931f29cd4cb88138dd25967978a4
SHA256ff9888777cd287c10cda15430186daed68df0db584c37a761dc227bb204ef121
SHA512920c6776ed6a5ec1db6772b5947d48855d0bcf82aff2d793f5a802a5ee3d0a976c1a13f0aa97eff663c87aecc9c987cdaf5921370bbd7e429600e3e2d103d28b
-
\Program Files (x86)\360\360Safe\safemon\360realpro.exeFilesize
648KB
MD58851045daf2845de327af2b323505caa
SHA17565b953d264f558f67bbe5ca4f17f99066805f9
SHA256c345f1e4b8e5b7d2a4b39d444b856b05d6c9bc7d7f7f4c00119bd874403fd046
SHA51270aa25a0c4895a0747edcc680e41a09ce7bb882a951326c315baae06006ec366babdb8aa5d321afe33fe01ca005e0fd5236b9b241db251ce05455e44cf484c92
-
\Program Files (x86)\360\360Safe\safemon\Netm.tpiFilesize
1.3MB
MD56be0eb090994324b0aae612781d49250
SHA1aa20abefee7b758c11d0d4a368c04a2810c63486
SHA2569f225899f09266e0ed70b45977f55bacc1327de2f60488226082b89e5e20ac25
SHA512c42c4f3e5ecca7dd6c3e11b0a2bc9c89da193024021b7b097e6c928fd538c4ad4832e835a414f3894a72e2a2b077b91b948776059f775adee25a565dbf75cc07
-
\Program Files (x86)\360\360Safe\safemon\safemon.dllFilesize
1.2MB
MD50bb1ce4b44df0245d8bbcbe6b42d0d35
SHA1fbe0a6ef640472c0defadffdbf2c6be7ae10c95e
SHA256779851046e8bc36bb370d8a906bfe81547048f5bb7fb602a7fd44e52d9e820ec
SHA512778f018efffd795c5a106458e2e18bfe8c8b60b4f445b37077bce0d4c03d38e72548ecc123d93526a4b953f148203af3294fb0e17fe322f88da05fd40bff72fa
-
\Program Files (x86)\360\360Safe\uninst.exeFilesize
1.6MB
MD507b84dc610a8b38f031dd6ba4072b332
SHA1adbf36751e632d8b59001967e33567cfa6633402
SHA256929393ccc6fbcc1d8533e99ba422f5a98e085d135c7a861d478e0bdbb6c3e6a8
SHA512c7c5e1e63cdda9f3490ec99837b7b202c4bdd78ff575488afc34857bccaa9422ddb98d5ea830fa63414a626fc01bfbff19857219ceddd7823fe75bb313b018d0
-
\Users\Admin\AppData\Local\Temp\3608612.tmp360net.dllFilesize
53KB
MD5400370e02fdcb2baaa9420e4cdc88916
SHA12194248a77f3e06558d8576f76078963f29c2c1e
SHA256093147cacd4ff5b8777dd9802738955a9812add0b7bcfae022aa5ad11f06340d
SHA5121a45db6da425373097e3df03baf17e29a6135fc92acafca075995abe0586baabad93f61936b7217c9da19fc12d3bf16f934cf0f3c03ed808a3773ae45e192212
-
\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
\Users\Admin\AppData\Local\Temp\360safe.exeFilesize
52.3MB
MD5b364a3a4585dfbdea756a2dccd500d61
SHA1067368007f6bd565fb84115b3c6eb61bd23114e8
SHA256eb8e6c445127ca4b3f69a968080edb31c4ff4f4eb556c21ec315f679494ea86c
SHA5128206e4ab569ade7b75995b9a0978449e08e54ef8cd78ad6148fa09e8337158d229e74931483507bb4989fa1e13342aeb3afca2c70721fa3ed17d3e4f3bb6ff3c
-
\Users\Admin\AppData\Local\Temp\{4598DF67-6AF7-48b0-A77D-7C1D275FDEB6}.tmpFilesize
1.5MB
MD5788fdb1eec3cbee53f8a32b0cb8090fd
SHA146cd2585fbb49bf23013e86ac87a53bcad400dd1
SHA2565c137adacc123f92620b57de1b9b1511cb0f12c2e1873b35940c2d015f511e8d
SHA512c08c613e990a16cf53064fd76217d744da1e0997ad889a04e5dc4c8fd0edbe60dd235e2c3c51b5d850961ea44babfbf4b5d9b9b10ee0bba070c700c45c8eff60
-
\Users\Admin\AppData\Local\Temp\{707444C7-8C11-45c1-8119-01C28B4DAC14}.tmpFilesize
1.1MB
MD5e74067bfda81cd82fe3a5fc2fdb87e2b
SHA1de961204751d9af1bab9c2a9ba16edc7a4ae7388
SHA256898bf5db34d9997b3d90b87091f34ae4e3e9cf34b6f2ae7fb8fd86e8a1bb684e
SHA512c0b1d851d97df2635b865d7f0a252881eef622363e08190e1f45ec308fdbd81f94ece53a6c2b1b36c38fcb82c2b8262f31a936a399cee567631b9146cf3ef60a
-
memory/556-151-0x0000000000E10000-0x0000000000E5B000-memory.dmpFilesize
300KB
-
memory/1396-76-0x0000000002E20000-0x0000000003A6A000-memory.dmpFilesize
12.3MB
-
memory/1396-77-0x0000000002E20000-0x0000000003A6A000-memory.dmpFilesize
12.3MB
-
memory/1396-92-0x0000000003AB0000-0x0000000003B0F000-memory.dmpFilesize
380KB
-
memory/1396-68-0x0000000000000000-mapping.dmp
-
memory/1396-149-0x0000000003EE0000-0x0000000003F0C000-memory.dmpFilesize
176KB
-
memory/1396-110-0x0000000003D30000-0x0000000003D84000-memory.dmpFilesize
336KB
-
memory/1448-60-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1448-63-0x0000000004D70000-0x0000000004D72000-memory.dmpFilesize
8KB
-
memory/1448-62-0x0000000000800000-0x0000000000802000-memory.dmpFilesize
8KB
-
memory/1448-61-0x0000000002040000-0x00000000030CE000-memory.dmpFilesize
16.6MB
-
memory/1448-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB
-
memory/1448-59-0x0000000000800000-0x0000000000802000-memory.dmpFilesize
8KB
-
memory/1448-57-0x0000000002040000-0x00000000030CE000-memory.dmpFilesize
16.6MB
-
memory/1448-56-0x0000000000400000-0x0000000000530000-memory.dmpFilesize
1.2MB
-
memory/1448-55-0x0000000002040000-0x00000000030CE000-memory.dmpFilesize
16.6MB
-
memory/1584-97-0x000007FEFC371000-0x000007FEFC373000-memory.dmpFilesize
8KB
-
memory/1584-96-0x0000000000000000-mapping.dmp
-
memory/1912-147-0x00000000002A0000-0x00000000002A2000-memory.dmpFilesize
8KB
-
memory/1912-117-0x0000000000000000-mapping.dmp