Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 15:03
Static task
static1
Behavioral task
behavioral1
Sample
549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe
Resource
win10v2004-20220901-en
General
-
Target
549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe
-
Size
31.5MB
-
MD5
825c74709ea3d2f5f19ba58f4d995cba
-
SHA1
d43f1c0983f212ea808fa73b2921b5c0fb0ac42a
-
SHA256
549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e
-
SHA512
ffa696d104047ff9243b1aa4179f8c3762615e33cb7eadf5e9b439e5263dda458227a0a12437810383a80961f745f78e64b4985aa67c65ef7fcd82cde447c063
-
SSDEEP
786432:haXj+hzDp2e6W3dJzZji9iRKpL+f3WmB3f0AUKX:haz+jvX3bzZjUL+Pr3fhD
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
Processes:
G0724_s_804390000.execmd.exedescription ioc process File created C:\Windows\system32\DRIVERS\bd0001.sys G0724_s_804390000.exe File created C:\Windows\system32\DRIVERS\bd0002.sys G0724_s_804390000.exe File created C:\Windows\system32\DRIVERS\BDMNetMon.sys G0724_s_804390000.exe File created C:\Windows\system32\DRIVERS\BDArKit.sys G0724_s_804390000.exe File created C:\windows\SysWOW64\drivers\BrowserSafe.sys cmd.exe File opened for modification C:\windows\SysWOW64\drivers\BrowserSafe.sys cmd.exe -
Executes dropped EXE 21 IoCs
Processes:
9e_BaiduAn_ID=34975,BWS=804423166,.exeunstall.exe9EPostService.exe9EPostService.exeBrowserSafe.exeG0724_s_804390000.exeBDABrowserProtect.exeBaiduProtect_Setup.exeBDABrowserProtect.exeBDDownloader.exeBDDownloader.exebddownloader.exeBaiduAn.exeBaiduAn.exeBaiduAnSvc.exeBaiduAnSvc.exeBaiduAnTray.exeBDALeakfixer.exeBDASWAcc.exeBaiduAnBugRpt.exeBaiduAnUpdate.exepid process 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 900 unstall.exe 4204 9EPostService.exe 2260 9EPostService.exe 3636 BrowserSafe.exe 3260 G0724_s_804390000.exe 4280 BDABrowserProtect.exe 4256 BaiduProtect_Setup.exe 1908 BDABrowserProtect.exe 2528 BDDownloader.exe 1396 BDDownloader.exe 4028 bddownloader.exe 3636 BaiduAn.exe 4248 BaiduAn.exe 2176 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 2004 BaiduAnTray.exe 3304 BDALeakfixer.exe 1368 BDASWAcc.exe 400 BaiduAnBugRpt.exe 4784 BaiduAnUpdate.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Registers COM server for autorun 1 TTPs 6 IoCs
Processes:
regsvr32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\InprocServer32\ = "C:\\Program Files (x86)\\Baidu\\BaiduAn\\2.3.0.2225\\BDSWShellExt64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\InProcServer32\ = "C:\\Program Files (x86)\\Baidu\\BaiduAn\\2.3.0.2225\\BDSWShellExt64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\InProcServer32\ThreadingModel = "Both" regsvr32.exe -
Sets service image path in registry 2 TTPs 8 IoCs
Processes:
G0724_s_804390000.exeBaiduAnSvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bd0001\ImagePath = "system32\\DRIVERS\\bd0001.sys" G0724_s_804390000.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bd0002\ImagePath = "system32\\DRIVERS\\bd0002.sys" G0724_s_804390000.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BDMNetMon\ImagePath = "system32\\DRIVERS\\BDMNetMon.sys" G0724_s_804390000.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BDArKit\ImagePath = "system32\\DRIVERS\\BDArKit.sys" G0724_s_804390000.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bd0001\ImagePath = "system32\\DRIVERS\\bd0001.sys" BaiduAnSvc.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\bd0002\ImagePath = "system32\\DRIVERS\\bd0002.sys" BaiduAnSvc.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BDMNetMon\ImagePath = "system32\\DRIVERS\\BDMNetMon.sys" BaiduAnSvc.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\BDArKit\ImagePath = "system32\\DRIVERS\\BDArKit.sys" BaiduAnSvc.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BDDownloader.exebddownloader.exeBaiduAnTray.exe549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation BDDownloader.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation bddownloader.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation BaiduAnTray.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe -
Loads dropped DLL 64 IoCs
Processes:
9e_BaiduAn_ID=34975,BWS=804423166,.exeG0724_s_804390000.exeBDABrowserProtect.exeBaiduProtect_Setup.exeBDABrowserProtect.exeBDDownloader.exeregsvr32.exeBaiduAn.exepid process 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 4280 BDABrowserProtect.exe 4256 BaiduProtect_Setup.exe 4256 BaiduProtect_Setup.exe 4280 BDABrowserProtect.exe 4280 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 1908 BDABrowserProtect.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 2528 BDDownloader.exe 2528 BDDownloader.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 2084 regsvr32.exe 3636 BaiduAn.exe 3636 BaiduAn.exe 3636 BaiduAn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BaiduAnSvc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BaiduAnTray = "\"C:\\Program Files (x86)\\Baidu\\BaiduAn\\2.3.0.2225\\BaiduAnTray.exe\" -stmd=3" BaiduAnSvc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 6 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
BaiduAnSvc.exeBaiduAnSvc.exeG0724_s_804390000.exeBaiduAnTray.exeBDALeakfixer.exeBaiduAnUpdate.exedescription ioc process File opened for modification \??\PhysicalDrive0 BaiduAnSvc.exe File opened for modification \??\PhysicalDrive0 BaiduAnSvc.exe File opened for modification \??\PhysicalDrive0 G0724_s_804390000.exe File opened for modification \??\PhysicalDrive0 BaiduAnTray.exe File opened for modification \??\PhysicalDrive0 BDALeakfixer.exe File opened for modification \??\PhysicalDrive0 BaiduAnUpdate.exe -
Drops file in Program Files directory 64 IoCs
Processes:
G0724_s_804390000.exeBDABrowserProtect.exedescription ioc process File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\ad.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\bdmtrayplugins\BDMSusPlugin.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDMPatcherPlugins\BDMConnect.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SOTraceConfig.xml G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SORegCleanerConfig.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SORegCleanerScript.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\RTPPlugins\HIPS.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDBrowserProtecter.png BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\DriverManager.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnTray.exe G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SOSilentCleanerConfig.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSWManager\sw_extlist.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\BDMTray\TrayPlugin.rdb G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\HotPlugin.bnr G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\ProtectConfig.xml BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDABrowserProtect.exe BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\SysRepLib.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMUpdate.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnSvc.exe G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Tips\win8_1_num_3_speed.png G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Tips\win8_1_num_4_speed.png G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\licenses\license.txt G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SOCleanerPreScan.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\bdmtrayplugins\BDMTrayTipsPlugin.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\RTPPlugins\BDMSOAccServicePlugin.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\bdmantivirus\BDMAVEng.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\Unknownfile.rdb G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\bdmswmanagerplugins\BDMSWManagerView.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMSkin.dll BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMSkin.dll G0724_s_804390000.exe File opened for modification C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\vatl.msi G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\BDMProcessRunningTime.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SOCleanerCheckItem.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDASWAcc.exe G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDSWShellExt.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\bdmkvscanplugin\BDMKVScanPlugin.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMReport.dll BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\bdmantivirus\scan_mgr_config.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Tips\win8_1_num_6_speed.png G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\app.ico G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMSWParseDetect.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSysFixer\SysFixerLuaScript.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\bdmantivirus\kav_compatible.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\Softmgr.rdb G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDLogicUtils.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\GCCommunicate.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDMCoolyPlugins\BDMCoolyContainerConfig.xml G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMNet.dll BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\Skins\Default\CommonRes.rdb BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\Mainpage.rdb G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\hips.xml G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\KVCommonRes.rdb G0724_s_804390000.exe File opened for modification C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\GlobalPluginInfo.xml G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDKitUtils.dll BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Default\SysAccelerator.rdb G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\Skins\Tips\win8_1_second_speed.png G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMDownload.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BaiduProtect_Setup.exe BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMStringUtils.dll BDABrowserProtect.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSOManager\SOGarbageConfig.xml G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\FTSWManager\sw_acc.dat G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\licenses\directui license.txt G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDMSafePlugins\BDMSysFixerPlugin.dll G0724_s_804390000.exe File created C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\bdmantivirus\systemfile.dat G0724_s_804390000.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe nsis_installer_1 C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe nsis_installer_2 C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe nsis_installer_1 C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe nsis_installer_2 -
Kills process with taskkill 7 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4996 taskkill.exe 4464 taskkill.exe 5088 taskkill.exe 3500 taskkill.exe 4180 taskkill.exe 1400 taskkill.exe 2524 taskkill.exe -
Processes:
9e_BaiduAn_ID=34975,BWS=804423166,.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main 9e_BaiduAn_ID=34975,BWS=804423166,.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main 9e_BaiduAn_ID=34975,BWS=804423166,.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
9e_BaiduAn_ID=34975,BWS=804423166,.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.919yi.cn/?id=34975&m=7A46CE8ECE48&s=M416f005df75517c96835a61a83a9b5ae" 9e_BaiduAn_ID=34975,BWS=804423166,.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.919yi.cn/?id=34975&m=7A46CE8ECE48&s=M416f005df75517c96835a61a83a9b5ae" 9e_BaiduAn_ID=34975,BWS=804423166,.exe -
Modifies registry class 64 IoCs
Processes:
bddownloader.exeG0724_s_804390000.exeregsvr32.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\Version = "1.0" bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command\ = "\"C:\\Program Files (x86)\\Baidu\\BaiduAn\\2.3.0.2225\\BDAFileHelper.exe\" -file=\"%1\"" G0724_s_804390000.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\BDSWShellExt.DLL regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091}\1.0\0\win64 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BDDownloadProxy.Downloader.1\CLSID\ = "{91B5E4DE-4C97-41CD-9F94-84BFAABB7371}" bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BDSWShellExt.BDSWShellExtMenu\CLSID\ = "{11292110-6F8D-4D56-863C-44902A1E7880}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\FLAGS bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\HELPDIR\ bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\Version = "1.0" bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\NumMethods\ = "6" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Unknown\shell\openas\command\DelegateExecute G0724_s_804390000.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B5E4DE-4C97-41CD-9F94-84BFAABB7371}\ProgID bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E} bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\ = "IDownloader_2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BDSWShellExt.BDSWShellExtMenu.1\CLSID\ = "{11292110-6F8D-4D56-863C-44902A1E7880}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BDSWShellExt.BDSWShellExtMenu\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\ProgID\ = "BDSWShellExt.BDSWShellExtMenu.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ABDSWShellExt regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091}\1.0\0\win64\ = "C:\\Program Files (x86)\\Baidu\\BaiduAn\\2.3.0.2225\\BDSWShellExt64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BDDownloadProxy.Downloader.1 bddownloader.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\NumMethods\ = "3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ = "IDownloader" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\VersionIndependentProgID\ = "BDSWShellExt.BDSWShellExtMenu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\ABDSWShellExt\ = "{11292110-6F8D-4D56-863C-44902A1E7880}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091}\1.0\0 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Interface regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BDDownloadProxy.Downloader.1\CLSID bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0 bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1} bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BDDownloadProxy.Downloader\CLSID\ = "{91B5E4DE-4C97-41CD-9F94-84BFAABB7371}" bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E}\ProxyStubClsid32 bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\TypeLib\ = "{DA624F8F-98BF-4B03-AD11-A12D07119E81}" bddownloader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\InProcServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{11292110-6F8D-4D56-863C-44902A1E7880}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{91B5E4DE-4C97-41CD-9F94-84BFAABB7371}\ProgID\ = "BDDownloadProxy.Downloader.1" bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6B3732AA-F6D4-4F16-9E22-49EDC52C9514}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BDSWShellExt.BDSWShellExtMenu\CurVer\ = "BDSWShellExt.BDSWShellExtMenu.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9FC9D48D-C233-4FAB-99C1-46CE5A3AD105}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BDDownloadProxy.Downloader\CLSID bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E7270EC6-0113-4A78-B610-E501D0A9E48E} bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DA624F8F-98BF-4B03-AD11-A12D07119E81}\1.0\HELPDIR bddownloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA} bddownloader.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\WOW6432Node\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7044CE4B-FE34-4DD1-A0FA-157E1E179ECA}\NumMethods regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{A8B81847-1462-4756-9D4A-F506BC5361CD} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{70891BDB-3BE3-45A9-96B6-184ABA962091} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{51BEE30D-EEC8-4BA3-930B-298B8E759EB1}\ = "DownloadProxy" bddownloader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
G0724_s_804390000.exeBDABrowserProtect.exeBaiduAnSvc.exepid process 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 3260 G0724_s_804390000.exe 4280 BDABrowserProtect.exe 4280 BDABrowserProtect.exe 4280 BDABrowserProtect.exe 4280 BDABrowserProtect.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe 3680 BaiduAnSvc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
BaiduAnTray.exepid process 2004 BaiduAnTray.exe -
Suspicious behavior: LoadsDriver 19 IoCs
Processes:
pid process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious use of AdjustPrivilegeToken 39 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeG0724_s_804390000.exeBDABrowserProtect.exeBaiduAnSvc.exeBaiduAnTray.exeBDALeakfixer.exedescription pid process Token: SeDebugPrivilege 2524 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 4464 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 3500 taskkill.exe Token: SeDebugPrivilege 4180 taskkill.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 3260 G0724_s_804390000.exe Token: SeDebugPrivilege 4280 BDABrowserProtect.exe Token: SeDebugPrivilege 4280 BDABrowserProtect.exe Token: SeLoadDriverPrivilege 3260 G0724_s_804390000.exe Token: SeLoadDriverPrivilege 3680 BaiduAnSvc.exe Token: SeLoadDriverPrivilege 3680 BaiduAnSvc.exe Token: 33 2004 BaiduAnTray.exe Token: SeIncBasePriorityPrivilege 2004 BaiduAnTray.exe Token: 33 2004 BaiduAnTray.exe Token: SeIncBasePriorityPrivilege 2004 BaiduAnTray.exe Token: 33 3304 BDALeakfixer.exe Token: SeIncBasePriorityPrivilege 3304 BDALeakfixer.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
Processes:
BaiduAnTray.exepid process 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe -
Suspicious use of SendNotifyMessage 53 IoCs
Processes:
BaiduAnTray.exepid process 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe 2004 BaiduAnTray.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
Processes:
9e_BaiduAn_ID=34975,BWS=804423166,.exeunstall.execmd.execmd.exe9EPostService.execmd.exeBrowserSafe.exeG0724_s_804390000.exeBDABrowserProtect.exeBaiduProtect_Setup.exeBDDownloader.exeBDDownloader.exebddownloader.exeBaiduAn.exeBaiduAn.exeBaiduAnSvc.exeBaiduAnTray.exeBDALeakfixer.exeBDASWAcc.exeBaiduAnBugRpt.exeBaiduAnUpdate.exepid process 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 900 unstall.exe 396 cmd.exe 5008 cmd.exe 4204 9EPostService.exe 844 cmd.exe 3636 BrowserSafe.exe 3260 G0724_s_804390000.exe 4280 BDABrowserProtect.exe 4256 BaiduProtect_Setup.exe 2528 BDDownloader.exe 1396 BDDownloader.exe 4028 bddownloader.exe 3636 BaiduAn.exe 4248 BaiduAn.exe 2176 BaiduAnSvc.exe 2004 BaiduAnTray.exe 3304 BDALeakfixer.exe 1368 BDASWAcc.exe 1368 BDASWAcc.exe 1368 BDASWAcc.exe 400 BaiduAnBugRpt.exe 4784 BaiduAnUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe9e_BaiduAn_ID=34975,BWS=804423166,.execmd.execmd.exeG0724_s_804390000.exeBDABrowserProtect.exeBDDownloader.exeBDDownloader.exedescription pid process target process PID 3536 wrote to memory of 4584 3536 549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe 9e_BaiduAn_ID=34975,BWS=804423166,.exe PID 3536 wrote to memory of 4584 3536 549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe 9e_BaiduAn_ID=34975,BWS=804423166,.exe PID 3536 wrote to memory of 4584 3536 549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe 9e_BaiduAn_ID=34975,BWS=804423166,.exe PID 4584 wrote to memory of 900 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe unstall.exe PID 4584 wrote to memory of 900 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe unstall.exe PID 4584 wrote to memory of 900 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe unstall.exe PID 4584 wrote to memory of 396 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 396 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 396 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 396 wrote to memory of 2524 396 cmd.exe taskkill.exe PID 396 wrote to memory of 2524 396 cmd.exe taskkill.exe PID 396 wrote to memory of 2524 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4996 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4996 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4996 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4464 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4464 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4464 396 cmd.exe taskkill.exe PID 396 wrote to memory of 5088 396 cmd.exe taskkill.exe PID 396 wrote to memory of 5088 396 cmd.exe taskkill.exe PID 396 wrote to memory of 5088 396 cmd.exe taskkill.exe PID 396 wrote to memory of 3500 396 cmd.exe taskkill.exe PID 396 wrote to memory of 3500 396 cmd.exe taskkill.exe PID 396 wrote to memory of 3500 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4180 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4180 396 cmd.exe taskkill.exe PID 396 wrote to memory of 4180 396 cmd.exe taskkill.exe PID 396 wrote to memory of 1400 396 cmd.exe taskkill.exe PID 396 wrote to memory of 1400 396 cmd.exe taskkill.exe PID 396 wrote to memory of 1400 396 cmd.exe taskkill.exe PID 4584 wrote to memory of 5008 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 5008 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 5008 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 4204 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 9EPostService.exe PID 4584 wrote to memory of 4204 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 9EPostService.exe PID 4584 wrote to memory of 4204 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe 9EPostService.exe PID 4584 wrote to memory of 844 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 844 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 4584 wrote to memory of 844 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe cmd.exe PID 844 wrote to memory of 3636 844 cmd.exe BrowserSafe.exe PID 844 wrote to memory of 3636 844 cmd.exe BrowserSafe.exe PID 844 wrote to memory of 3636 844 cmd.exe BrowserSafe.exe PID 4584 wrote to memory of 3260 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe G0724_s_804390000.exe PID 4584 wrote to memory of 3260 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe G0724_s_804390000.exe PID 4584 wrote to memory of 3260 4584 9e_BaiduAn_ID=34975,BWS=804423166,.exe G0724_s_804390000.exe PID 3260 wrote to memory of 3580 3260 G0724_s_804390000.exe cacls.exe PID 3260 wrote to memory of 3580 3260 G0724_s_804390000.exe cacls.exe PID 3260 wrote to memory of 3580 3260 G0724_s_804390000.exe cacls.exe PID 3260 wrote to memory of 4280 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 3260 wrote to memory of 4280 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 3260 wrote to memory of 4280 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 4280 wrote to memory of 4256 4280 BDABrowserProtect.exe BaiduProtect_Setup.exe PID 4280 wrote to memory of 4256 4280 BDABrowserProtect.exe BaiduProtect_Setup.exe PID 4280 wrote to memory of 4256 4280 BDABrowserProtect.exe BaiduProtect_Setup.exe PID 3260 wrote to memory of 1908 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 3260 wrote to memory of 1908 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 3260 wrote to memory of 1908 3260 G0724_s_804390000.exe BDABrowserProtect.exe PID 3260 wrote to memory of 2528 3260 G0724_s_804390000.exe BDDownloader.exe PID 3260 wrote to memory of 2528 3260 G0724_s_804390000.exe BDDownloader.exe PID 3260 wrote to memory of 2528 3260 G0724_s_804390000.exe BDDownloader.exe PID 2528 wrote to memory of 1396 2528 BDDownloader.exe BDDownloader.exe PID 2528 wrote to memory of 1396 2528 BDDownloader.exe BDDownloader.exe PID 2528 wrote to memory of 1396 2528 BDDownloader.exe BDDownloader.exe PID 1396 wrote to memory of 4028 1396 BDDownloader.exe bddownloader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe"C:\Users\Admin\AppData\Local\Temp\549f05d9c10be5e43c6b2eb0a370b048ccf98a0a1f05f02280b541f20aa7304e.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe"C:\9e_BaiduAn_ID=34975,BWS=804423166,.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\unstall.exeC:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\unstall.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\9EÈí¼þ°²×°ÓÅ»¯.bat3⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im 2345Update.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im 2345SafeGuard.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im 2345Safe.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im QQPCTray.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im BaiduSdTray.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im BaiduAnTray.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /t /im "SoftWare SVC.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\9ENetwork\Uninst.bat""3⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\9ENetwork\9EPostService.exe"C:\Program Files (x86)\9ENetwork\9EPostService.exe" -install3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\9EService.bat3⤵
- Drops file in Drivers directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\BrowserSafe.exe"BrowserSafe.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\G0724_s_804390000.exeC:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\G0724_s_804390000.exe /supplyid=8044231663⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exe"cacls" "C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225" /T /E /C /G SYSTEM:F4⤵
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDABrowserProtect.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDABrowserProtect.exe" /supplyid=804423166 /installmode=2 /S /D=C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BaiduProtect_Setup.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BaiduProtect_Setup.exe" /S5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDABrowserProtect.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDABrowserProtect.exe" --exit=1 --lockbrowser=iexplore.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDDownloader.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDDownloader.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BDDownloader_Installer\1.0.107.0[2022-11-29-21-42-7]\BDDownloader.exe"C:\Users\Admin\AppData\Local\Temp\BDDownloader_Installer\1.0.107.0[2022-11-29-21-42-7]\BDDownloader.exe" /install5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\program files (x86)\common files\baidu\bddownload\107\bddownloader.exe"C:\program files (x86)\common files\baidu\bddownload\107\bddownloader.exe" -RegServer6⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="百度高速下载器" dir=in program="C:\program files (x86)\common files\baidu\bddownload\107\bddownloader.exe" description="C:\program files (x86)\common files\baidu\bddownload\107\bddownloader.exe" action=allow7⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\program files (x86)\common files\baidu\bddownload\107\bdcomproxy.dll"7⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAn.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAn.exe" -mod=BDCooly.dll -install4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAn.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAn.exe" -mod=BDCooly.dll -oldv= -newv=2.3.0.22254⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnSvc.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnSvc.exe" -s4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\RegSvr32.exe"RegSvr32.exe" /s "C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDSWShellExt.dll"4⤵
-
C:\Windows\SysWOW64\RegSvr32.exe"RegSvr32.exe" /s "C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDSWShellExt64.dll"4⤵
-
C:\Windows\system32\regsvr32.exe/s "C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDSWShellExt64.dll"5⤵
- Registers COM server for autorun
- Modifies registry class
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnTray.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnTray.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDALeakfixer.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDALeakfixer.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDASWAcc.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDASWAcc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnBugRpt.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnBugRpt.exe" /BSOD5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnUpdate.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnUpdate.exe" ##DisplayType=0;AppUpdate=1;VersionUpdate=1;ModuleUpdate=1;UpdateSource=4;5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\9ENetwork\9EPostService.exe"C:\Program Files (x86)\9ENetwork\9EPostService.exe"1⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnSvc.exe"C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BaiduAnSvc.exe" -r1⤵
- Executes dropped EXE
- Sets service image path in registry
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\9e_BaiduAn_ID=34975,BWS=804423166,.exeFilesize
31.9MB
MD56dcf00aaaa3dbf72a292d2658e7dc73b
SHA1a29ebde73b237224cab5874768d615630128e372
SHA256cacdd0eaa2f82130dfe25c1e9da2d3f79e13b378d5d47689e0d300b24289245e
SHA512dc40c7dc814716aee57a1ee7834fa738d69995930ccfdd16f1255019d0a22b9684ad01395cea0e3792fbfa97e13d88e341496e3d83d963e1639550ffc76dc58e
-
C:\9e_BaiduAn_ID=34975,BWS=804423166,.exeFilesize
31.9MB
MD56dcf00aaaa3dbf72a292d2658e7dc73b
SHA1a29ebde73b237224cab5874768d615630128e372
SHA256cacdd0eaa2f82130dfe25c1e9da2d3f79e13b378d5d47689e0d300b24289245e
SHA512dc40c7dc814716aee57a1ee7834fa738d69995930ccfdd16f1255019d0a22b9684ad01395cea0e3792fbfa97e13d88e341496e3d83d963e1639550ffc76dc58e
-
C:\Program Files (x86)\9ENetwork\9EPostService.exeFilesize
337KB
MD5f2a894e4a554b97cbdac7e0a04331334
SHA1c7004b63f4d677201f339e4ec086ede76eedf73f
SHA256020756fcefe510aecb136d0d8225a4cd76c97a0201ecb1530c3e9ff6bc346bba
SHA51235a94c2cd4b837a287b367f2572cd579ccf7827e29e0f19c3085665e27ec0f8df760af2f1b6feb3fe3471f3397589bf8bab4a1083903745844c3933c4ad4005b
-
C:\Program Files (x86)\9ENetwork\9EPostService.exeFilesize
337KB
MD5f2a894e4a554b97cbdac7e0a04331334
SHA1c7004b63f4d677201f339e4ec086ede76eedf73f
SHA256020756fcefe510aecb136d0d8225a4cd76c97a0201ecb1530c3e9ff6bc346bba
SHA51235a94c2cd4b837a287b367f2572cd579ccf7827e29e0f19c3085665e27ec0f8df760af2f1b6feb3fe3471f3397589bf8bab4a1083903745844c3933c4ad4005b
-
C:\Program Files (x86)\9ENetwork\9EPostService.exeFilesize
337KB
MD5f2a894e4a554b97cbdac7e0a04331334
SHA1c7004b63f4d677201f339e4ec086ede76eedf73f
SHA256020756fcefe510aecb136d0d8225a4cd76c97a0201ecb1530c3e9ff6bc346bba
SHA51235a94c2cd4b837a287b367f2572cd579ccf7827e29e0f19c3085665e27ec0f8df760af2f1b6feb3fe3471f3397589bf8bab4a1083903745844c3933c4ad4005b
-
C:\Program Files (x86)\9ENetwork\Uninst.batFilesize
25B
MD5df11eb2122a389000fb19f7c272850e7
SHA1d7c65b844d63d3524e42297d816c60740f4794d8
SHA25652707973cc664a5338c16e010748d868817c1aedd33b9b87add5e6a72d4c32d9
SHA512d0c6e9a4101db6b2b1d80037051ef6d50fd5e100fb10ec49ea7054b42a9f6b5fa26b456525e15dd502120c7b5d3910e107998ce65a0501cbcdf0e19abf796ac9
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMBase.dllFilesize
984KB
MD58510dbad9915b8452f917a22a3fc30fb
SHA1870e6ab05aafccaedd684ab39beee92eb472cf50
SHA256b6278214f402b4ff088e01916e33f0eecca19a20ef5b677d9a3842189d5f1017
SHA51201afb2c8d812cc9b330c202ceab776b6bafa7e3662404cb4b2ec8d60260c8d06c16f9fc0748fb812a3930d67483642966c16dd1b159e6ab06db999572514a7af
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMBase.dllFilesize
984KB
MD58510dbad9915b8452f917a22a3fc30fb
SHA1870e6ab05aafccaedd684ab39beee92eb472cf50
SHA256b6278214f402b4ff088e01916e33f0eecca19a20ef5b677d9a3842189d5f1017
SHA51201afb2c8d812cc9b330c202ceab776b6bafa7e3662404cb4b2ec8d60260c8d06c16f9fc0748fb812a3930d67483642966c16dd1b159e6ab06db999572514a7af
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMNet.dllFilesize
928KB
MD50ee2e2dff23d076bee63e299ceac47eb
SHA10af5230c837cb42fb77b846907f04833579fb8cd
SHA25689eea787902992634bc52c16f9fcefb88010c17e2a817149a4d0f3647e65dfd4
SHA512b8411dd274a3bbd320e1b01a36440c0f0901a841d597e54ae71dc1c51e321c6bcc8d3574314595ee444ba13924c07fc75d0d53c1b61ef92536ee4ff4879264e1
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\BDMNet.dllFilesize
928KB
MD50ee2e2dff23d076bee63e299ceac47eb
SHA10af5230c837cb42fb77b846907f04833579fb8cd
SHA25689eea787902992634bc52c16f9fcefb88010c17e2a817149a4d0f3647e65dfd4
SHA512b8411dd274a3bbd320e1b01a36440c0f0901a841d597e54ae71dc1c51e321c6bcc8d3574314595ee444ba13924c07fc75d0d53c1b61ef92536ee4ff4879264e1
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDABrowserProtect.exeFilesize
5.5MB
MD57623fdd5816aca66af09ac8f591a3058
SHA1e1a71a6f71bc277afe160dcdf894cb81a1a92736
SHA256dc0fb6953c61010675372b48265f63ddc01f22807abc5a93b9cc72c43a2b74cc
SHA512b1e6532041502b3b92b208f563b17825b2817a6ec182ee4500f70b883f4f79c9b3ef0be745a73bf24d15e49ade2f34e98cc5cd1cb79a5ef84c5e130e5bd4e0d3
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BDABrowserProtect.exeFilesize
5.5MB
MD57623fdd5816aca66af09ac8f591a3058
SHA1e1a71a6f71bc277afe160dcdf894cb81a1a92736
SHA256dc0fb6953c61010675372b48265f63ddc01f22807abc5a93b9cc72c43a2b74cc
SHA512b1e6532041502b3b92b208f563b17825b2817a6ec182ee4500f70b883f4f79c9b3ef0be745a73bf24d15e49ade2f34e98cc5cd1cb79a5ef84c5e130e5bd4e0d3
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDABrowserProtect.exeFilesize
1.0MB
MD5a98eb284b0cf469e247ff98e30a7460d
SHA194c792412e0aa0e00cd0401490b36907304ad61f
SHA256eff6db1c95de535aa7e747983accee0d79b25ff1be24d0d7141d1bb2b928b993
SHA5122b686383e6cffe1489f4543936e154fe04354427daef5bbe177a4590ed82871ecddfb78ba51aa9aa03066a81e46d07b3f6fda8b49f0395fdd0bec9375abb97f5
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDKitUtils.dllFilesize
39KB
MD5d7e2d7763eb5e92d57fb776ccc0278bb
SHA128659519fa2c0763a5bfa47abea29df28fb40065
SHA2569d54d320203090d9fe94026732b80655c549190e6bd81c79959dcab8b7d8dd99
SHA5121efd269217fa0ae1fdca37cc2d42dd4d5f6f4ee6180faff6cffeb937df71bcaaf90aac3dcaf9a5f08b507b63e8293bb6f3b5caa12a006d6113c3dd340ab029e9
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDKitUtils.dllFilesize
39KB
MD5d7e2d7763eb5e92d57fb776ccc0278bb
SHA128659519fa2c0763a5bfa47abea29df28fb40065
SHA2569d54d320203090d9fe94026732b80655c549190e6bd81c79959dcab8b7d8dd99
SHA5121efd269217fa0ae1fdca37cc2d42dd4d5f6f4ee6180faff6cffeb937df71bcaaf90aac3dcaf9a5f08b507b63e8293bb6f3b5caa12a006d6113c3dd340ab029e9
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDLogicUtils.dllFilesize
692KB
MD51b212299fa27be3739e16ae6f19e5738
SHA1771d33a025982cf69e4bee2dc7925015fb3c8254
SHA256467888d57f5e6aa79d3f23618b63bf5289e6e279aa140d2a25b790f7ac4cd811
SHA512b42e6a46d7d237bd5f4c6980187de2bf05fb9552bc4ab6aa1a84b7dd308426c8d54f7eb35e6263c0ccbd4770c9b6b59ab92a9b1b8310a1cba0cf84ea90e8feb8
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDLogicUtils.dllFilesize
692KB
MD51b212299fa27be3739e16ae6f19e5738
SHA1771d33a025982cf69e4bee2dc7925015fb3c8254
SHA256467888d57f5e6aa79d3f23618b63bf5289e6e279aa140d2a25b790f7ac4cd811
SHA512b42e6a46d7d237bd5f4c6980187de2bf05fb9552bc4ab6aa1a84b7dd308426c8d54f7eb35e6263c0ccbd4770c9b6b59ab92a9b1b8310a1cba0cf84ea90e8feb8
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMBase.dllFilesize
984KB
MD59485c7a17d1425589e0339647cc2ab9a
SHA190c029cf2c8991e1a87e8a507aa1e346b3895535
SHA256215f9920b9f97115ea567e0b3779747ee1bc1cd434abef389376e2cabc38aa40
SHA5127ba2fe28e3e47cbfeb571a6c4a863296b13098e7e2e417022c770962bca040da967dc1a285c11e3a123dcf19ace0981d0e6e5a688a12035309779feea4b0f418
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMBase.dllFilesize
984KB
MD59485c7a17d1425589e0339647cc2ab9a
SHA190c029cf2c8991e1a87e8a507aa1e346b3895535
SHA256215f9920b9f97115ea567e0b3779747ee1bc1cd434abef389376e2cabc38aa40
SHA5127ba2fe28e3e47cbfeb571a6c4a863296b13098e7e2e417022c770962bca040da967dc1a285c11e3a123dcf19ace0981d0e6e5a688a12035309779feea4b0f418
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMFrameWork.dllFilesize
264KB
MD50eb728a51f538d09e0c2752d6390ad2e
SHA11fffe2b8af17f47b397e07fbdf3d8f2b06dce8d1
SHA2564006b2a8ff29f63bbe157b1d87099af73a9668ea6cb7b319f957c94c3a6444f7
SHA5120292e69f78862c1d98f64a0168161956a45616e26d88fedc7b2c05908c76428d5506ddfcdacf435e9c8645a89d119c0a6b8bbf2eed8c24f1a86cc7c0af4118d3
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMFrameWork.dllFilesize
264KB
MD50eb728a51f538d09e0c2752d6390ad2e
SHA11fffe2b8af17f47b397e07fbdf3d8f2b06dce8d1
SHA2564006b2a8ff29f63bbe157b1d87099af73a9668ea6cb7b319f957c94c3a6444f7
SHA5120292e69f78862c1d98f64a0168161956a45616e26d88fedc7b2c05908c76428d5506ddfcdacf435e9c8645a89d119c0a6b8bbf2eed8c24f1a86cc7c0af4118d3
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMMsg.dllFilesize
48KB
MD56dc5fab8de67f10a0a14d81302909594
SHA1eaa4006c705c32718e6bdcbc2b0cf7d6371bf95d
SHA256d6293270381c17224f29dd3995086283070a1bc897426195c78907a94a4d8991
SHA512bed7972e9ed6afe2f40ce4bcc68ed883a131018f4b831a3bcef603e8eb6bccddcbd9ff3f72f51dd5fa472ec26be2a0085d2273bce5e4eead14cb775b6da3c01c
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMMsg.dllFilesize
48KB
MD56dc5fab8de67f10a0a14d81302909594
SHA1eaa4006c705c32718e6bdcbc2b0cf7d6371bf95d
SHA256d6293270381c17224f29dd3995086283070a1bc897426195c78907a94a4d8991
SHA512bed7972e9ed6afe2f40ce4bcc68ed883a131018f4b831a3bcef603e8eb6bccddcbd9ff3f72f51dd5fa472ec26be2a0085d2273bce5e4eead14cb775b6da3c01c
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMSkin.dllFilesize
992KB
MD59f4fee85ee5683080047b4045f36f75a
SHA1cffbb50081a3647d9c8c35277c5711efb3926284
SHA256397a885c812b049a95ae718480ab4ebab12c67155cb5699265cfc3513c8371b4
SHA512d9c663cc2a9daf585d22cba114c1c272397efb4b7c5d365ab17486f673a4594c984dbe08107a02db932aa5d568ffeb5e8e45314b2ebdcb236b50285f3ff581c8
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMSkin.dllFilesize
992KB
MD59f4fee85ee5683080047b4045f36f75a
SHA1cffbb50081a3647d9c8c35277c5711efb3926284
SHA256397a885c812b049a95ae718480ab4ebab12c67155cb5699265cfc3513c8371b4
SHA512d9c663cc2a9daf585d22cba114c1c272397efb4b7c5d365ab17486f673a4594c984dbe08107a02db932aa5d568ffeb5e8e45314b2ebdcb236b50285f3ff581c8
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMStringUtils.dllFilesize
64KB
MD59659dd2c92c97a922be16560b0a5313b
SHA121ee8591569bca24ce331e14e9d40ada741a63ae
SHA25608f2a6064d0ba9f883a2784b952a793dc77624ea2cd44815575d744b6ba91242
SHA512220490a92aabeeedb51d4370f7d940c8bb68b5158b59d64871af18648844c7faf16e09ef510e0715451a5e8248f3b49b294e44d96e9b472d4b233acfe2bff2fe
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMStringUtils.dllFilesize
64KB
MD59659dd2c92c97a922be16560b0a5313b
SHA121ee8591569bca24ce331e14e9d40ada741a63ae
SHA25608f2a6064d0ba9f883a2784b952a793dc77624ea2cd44815575d744b6ba91242
SHA512220490a92aabeeedb51d4370f7d940c8bb68b5158b59d64871af18648844c7faf16e09ef510e0715451a5e8248f3b49b294e44d96e9b472d4b233acfe2bff2fe
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BDMTinyXml.dllFilesize
176KB
MD529f858ba03ce5b0cdcda9bae74632aaf
SHA1486492d77fdef6a2ce15198b3ca88e80382e2cb3
SHA256a00ba95a5796a81c1d17469ac3628c970e4299c61f16c68d3e9e12103b8d787b
SHA5129f634247df5d24005029b3d2648266d05718f7266c09348af19ae932d91e15b56b0d731728256e7df60f0cec1a80fd6dde8ace04ff0e6f5727ef5e9d13c6a2da
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BaiduProtect_Setup.exeFilesize
3.1MB
MD57d1931c7d4f92f8357667719e6073116
SHA1080f6c906c9feedff44713f9ebf0867d3208b226
SHA256d6118cc75232d498f802a86bca7086a5e2c4b7edca018ad7e58cd941b14c3863
SHA5122daa8abf346848c744cb4c7e21c3a8bf88d9cd22af42974931e4b20df2393f5415ea95772d33bf27dd00e258f85f8bae34e923a127f18250e9ee0d2563b880e8
-
C:\Program Files (x86)\Baidu\BaiduAn\2.3.0.2225\plugins\BrowserProtect\BaiduProtect_Setup.exeFilesize
3.1MB
MD57d1931c7d4f92f8357667719e6073116
SHA1080f6c906c9feedff44713f9ebf0867d3208b226
SHA256d6118cc75232d498f802a86bca7086a5e2c4b7edca018ad7e58cd941b14c3863
SHA5122daa8abf346848c744cb4c7e21c3a8bf88d9cd22af42974931e4b20df2393f5415ea95772d33bf27dd00e258f85f8bae34e923a127f18250e9ee0d2563b880e8
-
C:\Users\Admin\AppData\Local\Temp\nso2A4E.tmp\BDMSkin.dllFilesize
1.2MB
MD5468e0ee03a56de50eec1c052fca6633e
SHA15436557a567ba1d4aa6780fd0cf3fc81174200fa
SHA2561ca614c64baa61191b1c8381d068391aeaa7fe61f81a84242d4a1a3055bf2e30
SHA51276e1b8529a7e0aaaf0af378bddf437b565f69d78811f9cb2cb8c3b32955769c8f3bc25ff4162f7ab8d88e2f279f5f1222b85b54ae5c03458a7b3f9d11f3ba376
-
C:\Users\Admin\AppData\Local\Temp\nso2A4E.tmp\BDMSkin.dllFilesize
1.2MB
MD5468e0ee03a56de50eec1c052fca6633e
SHA15436557a567ba1d4aa6780fd0cf3fc81174200fa
SHA2561ca614c64baa61191b1c8381d068391aeaa7fe61f81a84242d4a1a3055bf2e30
SHA51276e1b8529a7e0aaaf0af378bddf437b565f69d78811f9cb2cb8c3b32955769c8f3bc25ff4162f7ab8d88e2f279f5f1222b85b54ae5c03458a7b3f9d11f3ba376
-
C:\Users\Admin\AppData\Local\Temp\nso2A4E.tmp\InstallHelper.dllFilesize
1.1MB
MD5b9af526c02bf5ffcde9fa97ac9fbb410
SHA1b32ac9cd86f9154cfda2c0feda3abba8935dd86e
SHA2569155be77e89ca7e3aca22783b7f84be274118e6e95b83c016d488e528f3aa4d4
SHA51209c96a8ecddb09cd0cca579eec434c1ade2d05556b529c4e69ed0448df9cf24b4c50b5bab20eed9fac98ec31d5f774faa6809a56219c01df5a31b1d058d3fd37
-
C:\Users\Admin\AppData\Local\Temp\nso2A4E.tmp\System.dllFilesize
19KB
MD535d7b29c3ed690a8b0cd323917677b42
SHA1ad74d2babe09f94838e408c8f9f77b6b56c644f5
SHA256714bd22a836a7f164b848541b8bf8ac80a20ff38e10e412bf9ef518620a80b8c
SHA512abc6f37b7306de737adf998607e81304ecc1589ac8e3164651b237def11b424a190e84608f4f6ce44a63ce225d93be7c617a736c82fb6b9077c5222c2e17b67d
-
C:\Users\Admin\AppData\Local\Temp\nso2A4E.tmp\nsExec.dllFilesize
14KB
MD55c8c57de64daea7d3098261c76888067
SHA15b69091e79a6611e97e12aa208283315f64b4231
SHA256d39434e9e0388d4b8e1b0b57b6fef81544f9a9db64c4de2211077b08d13ce853
SHA512b6a19d428214b5f88fe985f8f2cb0cb412542267d67141daf958f5c78a930e993dca288a95ea2417c9355dfee9c6e556ac17150c1eb843ae3c2e6f7ea9475693
-
C:\Users\Admin\AppData\Local\Temp\nst5BFD.tmp\InstallHelper.dllFilesize
259KB
MD5c43b117a2e73c52537b599a921928c8f
SHA189000b81161e9e9108b31996550983334b993fbb
SHA25616e77610644fa909f3ca3f88e87dafaac0d111623d82b5c6ed1b481b6aed7ac3
SHA51241cb5f459020c92a3e3590bbb66eff6834c848db60d83708bb061353dd165f3037694f2e026e17a85397799e3d006d8ea31024cad6a3eba362b5b0d14201bd77
-
C:\Users\Admin\AppData\Local\Temp\nst5BFD.tmp\System.dllFilesize
19KB
MD5f52eb281e29da8065e18805617ac2cbc
SHA1341481101614a595f0f8e6c1212a5a3b5e6ea426
SHA25621805996ea8b483e5c722a80897b51af9a42636af0b27bed86560825bd079cc6
SHA512f8649371d3575c37bbd246c27acdf61a6c8c52642b53e8bf3eec042a6d363855d17ccf6cfed9e586b66164565a3fb8c56939a15e907d3517e5f511fda3bb8dce
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\9EService.batFilesize
102B
MD5331743b4f8d22620f1ae92c81ceebcc1
SHA19df307c5ccde2513d28cf84ad567cf1bddfc2643
SHA256e1e9de188ddcc83781cce6399f12b246908cc4e4d807b014f8ec46abd550747e
SHA51219e7f21125d3fefa2da739c944d8ff93641ad0859c838b2aaecf5c00e29f8cc137ad82c0218531a1627ec6cd0b2946359509c3a0847b5b00e937164570509b46
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\9EÈí¼þ°²×°ÓÅ»¯.batFilesize
272B
MD5a09204b2cbd497696c179fe039d093aa
SHA14200b0bc2bbf78c6016a22c52a828e08127c6c9d
SHA2565eff4bc25680d9f9cedded6a1b5887d9a5bee870ad600788846e548e567c3250
SHA5122225b9c1d6b300cf0ca37a67750553b707af7ec3d8603b7b8af9ffd486ca2f3f670c146ed4c848756a2b8afee2835e251067de8bffb7a0663ca28fdea3bd3aa4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\BrowserSafe.exeFilesize
59KB
MD5fc64aca920320598d669cacacb6b8a76
SHA1ed73b2a623a089884eef51aec9f3ff112fc207dc
SHA256f96208c3006653c372accdf53ba148419486eb4555fedcb3af20f9308bc0fe2f
SHA5125f49b0adbc64104e4b87596f4fc31cbf81241ab31e16e78c8845ba56f6efff9040ac9905ad2b23c1f38b60cff4fa4d8f205a57c416fa959ff0202839e05f41e4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\BrowserSafe.exeFilesize
59KB
MD5fc64aca920320598d669cacacb6b8a76
SHA1ed73b2a623a089884eef51aec9f3ff112fc207dc
SHA256f96208c3006653c372accdf53ba148419486eb4555fedcb3af20f9308bc0fe2f
SHA5125f49b0adbc64104e4b87596f4fc31cbf81241ab31e16e78c8845ba56f6efff9040ac9905ad2b23c1f38b60cff4fa4d8f205a57c416fa959ff0202839e05f41e4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\BrowserSafe.sysFilesize
13KB
MD5d833d5b4eaa59a95ee31a9a0b3b4dbe2
SHA1360ceadbb15c48dadf6b15ff4bcfd9e2240b4af6
SHA2568699400e9de5397242486e170a57d3f91cc3907d2c521490d76d4c4325b902a1
SHA512468c1e1a293164585ec6a3473ab710ec2f75df187a93de48be77391b20aeed0060f0025dacd0c4b458b89c758470a4da0fbba47b701348fb2a70477aef2cfa28
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\G0724_s_804390000.exeFilesize
31.3MB
MD51bdcf635141bb798a3abe0b7d4b4f5a4
SHA176d5b1842e9624b2fdf43df8fd7ac84d49aac2e3
SHA256d202069ec298680f8b8e20346e10e9fba23b4619b182181c9afc4a988424c4f0
SHA5127d86240ea12235bc9be8825f9492508d77517314f5032544ef6e7adb2cbe90321a760fc15e5b97c2aafc2ef1e3c1188965cce12f9b446d4935944356f0ce8b2e
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\G0724_s_804390000.exeFilesize
31.3MB
MD51bdcf635141bb798a3abe0b7d4b4f5a4
SHA176d5b1842e9624b2fdf43df8fd7ac84d49aac2e3
SHA256d202069ec298680f8b8e20346e10e9fba23b4619b182181c9afc4a988424c4f0
SHA5127d86240ea12235bc9be8825f9492508d77517314f5032544ef6e7adb2cbe90321a760fc15e5b97c2aafc2ef1e3c1188965cce12f9b446d4935944356f0ce8b2e
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\Md5dll.dllFilesize
8KB
MD5a7d710e78711d5ab90e4792763241754
SHA1f31cecd926c5d497aba163a17b75975ec34beb13
SHA2569b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2
SHA512f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\Md5dll.dllFilesize
8KB
MD5a7d710e78711d5ab90e4792763241754
SHA1f31cecd926c5d497aba163a17b75975ec34beb13
SHA2569b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2
SHA512f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\System.dllFilesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\unstall.exeFilesize
48KB
MD58e246d4564feebf4092e5b8e80f7a81c
SHA1cbe6081e8d9727457cb7cf025467c054e775864c
SHA2564996502d49b42f62248cc907613baf622b866830064f20d974f172ebfb9653b7
SHA512c216fac77efefcd814f06ba3fd0cc20c36b7f8c0a74fee9386c4918badf1a52b8fc6f8733c11ce09da9f74b68e709c8122ddfdeefb99cd087fa6513274c9cd54
-
C:\Users\Admin\AppData\Local\Temp\nsw16D5.tmp\unstall.exeFilesize
48KB
MD58e246d4564feebf4092e5b8e80f7a81c
SHA1cbe6081e8d9727457cb7cf025467c054e775864c
SHA2564996502d49b42f62248cc907613baf622b866830064f20d974f172ebfb9653b7
SHA512c216fac77efefcd814f06ba3fd0cc20c36b7f8c0a74fee9386c4918badf1a52b8fc6f8733c11ce09da9f74b68e709c8122ddfdeefb99cd087fa6513274c9cd54
-
C:\Users\Admin\AppData\Local\Temp\nsw5872.tmp\System.dllFilesize
19KB
MD535d7b29c3ed690a8b0cd323917677b42
SHA1ad74d2babe09f94838e408c8f9f77b6b56c644f5
SHA256714bd22a836a7f164b848541b8bf8ac80a20ff38e10e412bf9ef518620a80b8c
SHA512abc6f37b7306de737adf998607e81304ecc1589ac8e3164651b237def11b424a190e84608f4f6ce44a63ce225d93be7c617a736c82fb6b9077c5222c2e17b67d
-
C:\Users\Admin\AppData\Local\Temp\nsw5872.tmp\System.dllFilesize
19KB
MD535d7b29c3ed690a8b0cd323917677b42
SHA1ad74d2babe09f94838e408c8f9f77b6b56c644f5
SHA256714bd22a836a7f164b848541b8bf8ac80a20ff38e10e412bf9ef518620a80b8c
SHA512abc6f37b7306de737adf998607e81304ecc1589ac8e3164651b237def11b424a190e84608f4f6ce44a63ce225d93be7c617a736c82fb6b9077c5222c2e17b67d
-
C:\Users\Admin\AppData\Local\Temp\nsw5872.tmp\bpInstallHelper.dllFilesize
212KB
MD5b0a0c7ededd303fd466c707b76da9078
SHA1de2edbf7c703b1b33f507e290755bc25236d0e32
SHA256deba7901ef9a886a34842dd57c4c0d97490d10da3565166127b6bf1ae914395a
SHA512aed599cfef1d54e587b4505c34025b21f61347e540ff20899e98c9017466664d031d971446d8838845e4de26a2752258b8ba5ba1c7512a8dd7e3565778645f0a
-
memory/396-143-0x0000000000000000-mapping.dmp
-
memory/400-429-0x0000000000000000-mapping.dmp
-
memory/844-166-0x0000000000000000-mapping.dmp
-
memory/900-138-0x0000000000000000-mapping.dmp
-
memory/1368-428-0x0000000000000000-mapping.dmp
-
memory/1396-235-0x0000000000000000-mapping.dmp
-
memory/1400-151-0x0000000000000000-mapping.dmp
-
memory/1476-299-0x0000000000000000-mapping.dmp
-
memory/1736-237-0x0000000000000000-mapping.dmp
-
memory/1908-196-0x0000000000000000-mapping.dmp
-
memory/2004-361-0x0000000000000000-mapping.dmp
-
memory/2084-238-0x0000000000000000-mapping.dmp
-
memory/2176-293-0x0000000000000000-mapping.dmp
-
memory/2524-145-0x0000000000000000-mapping.dmp
-
memory/2528-224-0x0000000000000000-mapping.dmp
-
memory/2888-316-0x0000000000000000-mapping.dmp
-
memory/3260-220-0x0000000006060000-0x0000000006155000-memory.dmpFilesize
980KB
-
memory/3260-227-0x0000000005F70000-0x0000000006058000-memory.dmpFilesize
928KB
-
memory/3260-181-0x0000000005220000-0x000000000534D000-memory.dmpFilesize
1.2MB
-
memory/3260-174-0x0000000000000000-mapping.dmp
-
memory/3260-231-0x0000000005A21000-0x0000000005A27000-memory.dmpFilesize
24KB
-
memory/3260-219-0x0000000006061000-0x0000000006110000-memory.dmpFilesize
700KB
-
memory/3260-221-0x0000000006160000-0x000000000618A000-memory.dmpFilesize
168KB
-
memory/3260-233-0x00000000060F6000-0x0000000006106000-memory.dmpFilesize
64KB
-
memory/3260-223-0x0000000006190000-0x000000000619E000-memory.dmpFilesize
56KB
-
memory/3260-215-0x0000000005F70000-0x0000000006058000-memory.dmpFilesize
928KB
-
memory/3260-225-0x0000000005A10000-0x0000000005A2B000-memory.dmpFilesize
108KB
-
memory/3304-407-0x0000000000000000-mapping.dmp
-
memory/3500-149-0x0000000000000000-mapping.dmp
-
memory/3580-184-0x0000000000000000-mapping.dmp
-
memory/3636-252-0x0000000003CF0000-0x0000000003DE8000-memory.dmpFilesize
992KB
-
memory/3636-247-0x0000000002AB0000-0x0000000002B64000-memory.dmpFilesize
720KB
-
memory/3636-169-0x0000000000000000-mapping.dmp
-
memory/3636-264-0x00000000032F0000-0x00000000033D8000-memory.dmpFilesize
928KB
-
memory/3636-239-0x0000000000000000-mapping.dmp
-
memory/3636-240-0x0000000002371000-0x000000000240E000-memory.dmpFilesize
628KB
-
memory/3636-241-0x0000000002370000-0x0000000002492000-memory.dmpFilesize
1.1MB
-
memory/3636-242-0x0000000002970000-0x0000000002A24000-memory.dmpFilesize
720KB
-
memory/3636-243-0x0000000002A20000-0x0000000002A4C000-memory.dmpFilesize
176KB
-
memory/3636-245-0x0000000002511000-0x0000000002515000-memory.dmpFilesize
16KB
-
memory/3636-246-0x0000000002A70000-0x0000000002A9A000-memory.dmpFilesize
168KB
-
memory/3636-262-0x0000000002F30000-0x0000000003030000-memory.dmpFilesize
1024KB
-
memory/3636-248-0x0000000002B70000-0x0000000002C64000-memory.dmpFilesize
976KB
-
memory/3636-260-0x0000000004030000-0x00000000040B8000-memory.dmpFilesize
544KB
-
memory/3636-254-0x0000000003DF0000-0x0000000003E06000-memory.dmpFilesize
88KB
-
memory/3636-256-0x00000000040F0000-0x000000000423A000-memory.dmpFilesize
1.3MB
-
memory/3636-258-0x0000000004000000-0x000000000401B000-memory.dmpFilesize
108KB
-
memory/4028-236-0x0000000000000000-mapping.dmp
-
memory/4048-305-0x0000000000000000-mapping.dmp
-
memory/4180-150-0x0000000000000000-mapping.dmp
-
memory/4204-158-0x0000000000000000-mapping.dmp
-
memory/4248-269-0x0000000002CF0000-0x0000000002DA4000-memory.dmpFilesize
720KB
-
memory/4248-287-0x0000000004610000-0x0000000004698000-memory.dmpFilesize
544KB
-
memory/4248-276-0x0000000002DB0000-0x0000000002EA5000-memory.dmpFilesize
980KB
-
memory/4248-275-0x0000000002730000-0x000000000275A000-memory.dmpFilesize
168KB
-
memory/4248-273-0x0000000002701000-0x0000000002705000-memory.dmpFilesize
16KB
-
memory/4248-272-0x0000000002DB1000-0x0000000002E60000-memory.dmpFilesize
700KB
-
memory/4248-274-0x0000000002EB0000-0x0000000002FA4000-memory.dmpFilesize
976KB
-
memory/4248-279-0x0000000004150000-0x0000000004248000-memory.dmpFilesize
992KB
-
memory/4248-281-0x0000000004250000-0x0000000004266000-memory.dmpFilesize
88KB
-
memory/4248-283-0x00000000044C0000-0x000000000460A000-memory.dmpFilesize
1.3MB
-
memory/4248-285-0x0000000004460000-0x000000000447B000-memory.dmpFilesize
108KB
-
memory/4248-267-0x0000000002BC0000-0x0000000002CE2000-memory.dmpFilesize
1.1MB
-
memory/4248-289-0x0000000003390000-0x0000000003490000-memory.dmpFilesize
1024KB
-
memory/4248-291-0x0000000003750000-0x0000000003838000-memory.dmpFilesize
928KB
-
memory/4248-266-0x0000000000000000-mapping.dmp
-
memory/4256-189-0x0000000000000000-mapping.dmp
-
memory/4280-185-0x0000000000000000-mapping.dmp
-
memory/4464-147-0x0000000000000000-mapping.dmp
-
memory/4584-132-0x0000000000000000-mapping.dmp
-
memory/4784-435-0x0000000000000000-mapping.dmp
-
memory/4996-146-0x0000000000000000-mapping.dmp
-
memory/5008-154-0x0000000000000000-mapping.dmp
-
memory/5088-148-0x0000000000000000-mapping.dmp