HWiNFO_Monitor_Setup.exe
This report is generated from a file or URL submitted to this webservice
on April 10th 2026 22:34:39 (UTC) and action script
Heavy Anti-Evasion
Guest System:
Windows 11 64 bit, Professional, 10.0 (build 22621),
Report generated by Falcon Sandbox © Hybrid Analysis
Incident Response
Risk Assessment
- Remote Access
- Reads terminal service related keys (often RDP related)
- Spyware
- Found a string that may be used as part of an injection method
- Persistence
- Writes data to a remote process
MITRE ATT&CK™ Techniques Detection
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Malicious Indicators 1
-
Installation/Persistence
-
Writes data to a remote process
- details
- "HWiNFO_Monitor_Setup.exe" wrote 00000004 bytes to a remote process "%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp" (Handle: 580)
- source
- API Call
- relevance
- 6/10
- ATT&CK ID
- T1055 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes data to a remote process
-
Suspicious Indicators 24
-
Anti-Detection/Stealthiness
-
Tries to save executable or command in registry
- details
-
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "DISPLAYICON"; Value: "%PROGRAMFILES%\CPUID\HWiNFO\HWiNFO.exe")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "UNINSTALLSTRING"; Value: ""%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "QUIETUNINSTALLSTRING"; Value: ""%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe" /SILENT") - source
- Registry Access
- relevance
- 7/10
- ATT&CK ID
- T1547 (Show technique in the MITRE ATT&CK™ matrix)
-
Tries to save executable or command in registry
-
External Systems
-
Sample was identified as malicious by at least one Antivirus engine
- details
- 9/26 Antivirus vendors marked sample as malicious (34% detection rate)
- source
- External System
-
Sample was identified as malicious by at least one Antivirus engine
-
General
-
Opened the service control manager
- details
- "HWiNFO_Monitor_Setup.tmp" called "OpenSCManagerW" requesting access rights "0X80000000"
- source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1569.002 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads configuration files (.ini files)
- details
-
"HWiNFO_Monitor_Setup.tmp" reads file "%PROGRAMFILES%\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Desktop\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Documents\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Music\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Pictures\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Videos\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\Downloads\desktop.ini"
"HWiNFO_Monitor_Setup.tmp" reads file "C:\Users\%USERNAME%\OneDrive\desktop.ini" - source
- API Call
- relevance
- 4/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Opened the service control manager
-
Installation/Persistence
-
Drops executable files
- details
-
"is-96Q5IE2WSZ.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp]- [targetUID: 00000000-00004792]
"HWiNFO_Monitor_Setup.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp]- [targetUID: 00000000-00001392]
"is-DZZ74NCPUI.tmp" has type "PE32+ executable for MS Windows 5.02 (GUI) x86-64 5 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp]- [targetUID: 00000000-00004792]
"is-FNEYTLL0RX.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 10 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp]- [targetUID: 00000000-00004792]
"is-6A6AUP6767.tmp" has type "PE32+ executable for MS Windows 6.00 (DLL) x86-64 7 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp]- [targetUID: 00000000-00004792]
"_setup64.tmp" has type "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections"- Location: [%TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp]- [targetUID: 00000000-00004792] - source
- Binary File
- relevance
- 10/10
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes a PE file header to disc
- details
-
"HWiNFO_Monitor_Setup.exe" wrote 15360 bytes starting with PE header signature to file "%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...
"HWiNFO_Monitor_Setup.tmp" wrote 6144 bytes starting with PE header signature to file "C:\Users\%USERNAME%\AppData\Local\Temp\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...
"HWiNFO_Monitor_Setup.tmp" wrote 16384 bytes starting with PE header signature to file "C:\Program Files\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ... - source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops executable files
-
Pattern Matching
-
YARA signature match - Anti-Debugging (PEB)
- details
- YARA signature for anti-debugging matched on file "is-DZZ74NCPUI.tmp"
- source
- YARA Signature
- relevance
- 3/10
- ATT&CK ID
- T1622 (Show technique in the MITRE ATT&CK™ matrix)
-
YARA signature match - Anti-Debugging (PEB)
-
Remote Access Related
-
Reads terminal service related keys (often RDP related)
- details
- "HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\TERMINAL SERVER"; Key: "GLASSSESSIONID")
- source
- Registry Access
- relevance
- 10/10
- ATT&CK ID
- T1021.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads terminal service related keys (often RDP related)
-
Spyware/Information Retrieval
-
Calls an API possibly used to take screenshots
- details
-
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "52"
"cy": "39"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "3010998"
"cx": "52"
"cy": "39"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "240"
"cy": "459"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "147"
"cy": "147"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "256"
"cy": "256"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "32"
"cy": "32"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "48"
"cy": "48"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "108c0"
"cx": "495"
"cy": "17"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "101093d"
"cx": "16"
"cy": "16"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "2501071a"
"cx": "82"
"cy": "23"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "22010a58"
"cx": "516"
"cy": "21"}
"HWiNFO_Monitor_Setup.tmp" called "CreateCompatibleBitmap" with parameters {"hdc": "2501071a"
"cx": "516"
"cy": "21"} - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1113 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to enumerate services
- details
-
"HWiNFO_Monitor_Setup.tmp" called "EnumServicesStatusExW" with parameters {"hSCManager": "13a3808"
"dwServiceType": "48"
"dwServiceState": "1"} - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1007 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to find and list the Windows drive types
- details
-
"HWiNFO_Monitor_Setup.exe" called "GetDriveTypeW" with parameter C:\ (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "GetDriveTypeW" with parameter C:\ (UID: 00000000-00004792) - source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API possibly used to take screenshots
-
System Destruction
-
Opens file with deletion access rights
- details
-
"HWiNFO_Monitor_Setup.exe" opened "C:\Users\%USERNAME%\AppData\Local\Temp\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-6A6AUP6767.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-DZZ74NCPUI.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-BJKFJATABB.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\unins000.dat" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-TI156WG2Y2.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\unins000.exe" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-FNEYTLL0RX.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Program Files\CPUID\HWiNFO\is-F54G98LCMX.tmp" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.pif" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.url" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.lnk" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.pif" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.url" with delete access
"HWiNFO_Monitor_Setup.tmp" opened "C:\Users\%USERNAME%\AppData\Local\Temp\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp" with delete access - source
- API Call
- relevance
- 7/10
- ATT&CK ID
- T1070.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens file with deletion access rights
-
System Security
-
Deletes registry keys
- details
-
"HWiNFO_Monitor_Setup.tmp" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "REGFILESHASH"; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "REGFILES0000"; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "SEQUENCE"; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "SESSIONHASH"; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "DELETEVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "OWNER"; Value: "") - source
- Registry Access
- relevance
- 3/10
- ATT&CK ID
- T1070 (Show technique in the MITRE ATT&CK™ matrix)
-
Deletes registry keys
-
Unusual Characteristics
-
Drops PE files with different extensions
- details
-
"is-96Q5IE2WSZ.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp]- [targetUID: 00000000-00004792]
"HWiNFO_Monitor_Setup.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp]- [targetUID: 00000000-00001392]
"is-DZZ74NCPUI.tmp" has type "PE32+ executable for MS Windows 5.02 (GUI) x86-64 5 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp]- [targetUID: 00000000-00004792]
"is-FNEYTLL0RX.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 10 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp]- [targetUID: 00000000-00004792]
"is-6A6AUP6767.tmp" has type "PE32+ executable for MS Windows 6.00 (DLL) x86-64 7 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp]- [targetUID: 00000000-00004792]
"_setup64.tmp" has type "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections"- Location: [%TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp]- [targetUID: 00000000-00004792] - source
- Binary File
- relevance
- 5/10
- ATT&CK ID
- T1036 (Show technique in the MITRE ATT&CK™ matrix)
-
Sample/File contains another embedded binary
- details
- Found multiple string (Indicator: This program cannot be run in DOS mode) in file %PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp at offset 3566010
- source
- Binary File
- relevance
- 3/10
- ATT&CK ID
- T1027.009 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops PE files with different extensions
-
Hiding 9 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 134
-
Anti-Detection/Stealthiness
-
Calls an API typically used to find a resource in a module
- details
-
"HWiNFO_Monitor_Setup.exe" called "FindResourceW" with parameter "11111" - (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "FindResourceW" with parameter "57632124" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindResourceW" with parameter "57542860" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindResourceW" with parameter "57511300" - (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to load a resource in memory
- details
-
"HWiNFO_Monitor_Setup.exe" called "LoadResource with parameter {'hModule': '0', 'hResInfo': '15692784'}" (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "LoadResource with parameter {'hModule': '11272192', 'hResInfo': '15575968'}" (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadResource with parameter {'hModule': '11272192', 'hResInfo': '15576128'}" (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to remove a directory
- details
-
"HWiNFO_Monitor_Setup.exe" called "RemoveDirectoryW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "RemoveDirectoryW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp\_isetup (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RemoveDirectoryW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1070.004 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to delay execution by waiting for signal/timeout (API string)
- details
- Found reference to API "GetTickCount64" (Indicator: "GetTickCount64"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1497.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to load/free library (API string)
- details
- Found reference to API "LoadLibraryEx failed" (Indicator: "LoadLibrary"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1055.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Found PE header in memory
- details
- Found PE header "MZ" - Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
- source
- Memory Dumps
- relevance
- 1/10
- ATT&CK ID
- T1055 (Show technique in the MITRE ATT&CK™ matrix)
-
Observed a high volume of repeated registry API calls (API Hammering)
- details
-
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST")
"HWiNFO_Monitor_Setup.tmp" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\PROFILELIST")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{B97D20BB-F46A-4C97-BA10-5E3608430854}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "QUERYVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\USER SHELL FOLDERS")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{82A5EA35-D9CD-47C5-9629-E15D2F714E6E}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\USER SHELL FOLDERS")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{DFDF76A2-C82A-4D63-906A-5644AC457385}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{D65231B0-B2F1-4857-A4CE-A8E7C6EA7D27}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{F38BF404-1D43-42F2-9305-67DE0B28FC23}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{A77F5D77-2E2B-44C3-A6A2-ABA601054A51}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\FOLDERDESCRIPTIONS\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\PROPERTYBAG")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION")
"HWiNFO_Monitor_Setup.tmp" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION") - source
- Registry Access
- relevance
- 7/10
- ATT&CK ID
- T1497 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries process information
- details
-
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957313856 [PID: 1392]
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957320105 [PID: 1392]
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957571804 [PID: 1392]
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957578034 [PID: 1392]
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957773913 [PID: 1392]
"HWiNFO_Monitor_Setup.exe" queried SystemProcessInformation at 00000000-00001392-00000C15-2957780448 [PID: 1392]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959181542 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959188300 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959529836 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959536449 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959869442 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2959876379 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2961219908 [PID: 4792]
"HWiNFO_Monitor_Setup.tmp" queried SystemProcessInformation at 00000000-00004792-00000C15-2961226740 [PID: 4792] - source
- API Call
- relevance
- 4/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Renames files
- details
-
"HWiNFO_Monitor_Setup.tmp" renamed original file"%PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-6A6AUP6767.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\CRYPTBASE.dll"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-DZZ74NCPUI.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\HWMonitor.exe"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-BJKFJATABB.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\hwm_readme.txt"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-TI156WG2Y2.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-FNEYTLL0RX.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"
"HWiNFO_Monitor_Setup.tmp" renamed original file"C:\Program Files\CPUID\HWiNFO\is-F54G98LCMX.tmp" to "%PROGRAMFILES%\CPUID\HWiNFO\unins000.msg" - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1036 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to find a resource in a module
-
Anti-Reverse Engineering
-
Contains ability to check debugger is running (API string)
- details
- Found reference to API "GetTickCount64" (Indicator: "GetTickCount"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1622 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to check debugger is running (API string)
-
Cryptographic Related
-
Able to use Microsoft's Enhanced Cryptographic Provider
- details
-
Found api reference "TStrongRandom: BCryptGenRandom failed (0x%x)" (Indicator: "BCryptGenRandom"; File: "HWiNFO_Monitor_Setup.exe")
Found api reference "TStrongRandom: BCryptGenRandom failed (0x%x)" (Indicator: "CryptGenRandom"; File: "HWiNFO_Monitor_Setup.exe")
Found api reference "TStrongRandom: Failed to get address of BCryptGenRandom" (Indicator: "BCryptGenRandom"; File: "HWiNFO_Monitor_Setup.exe")
Found api reference "TStrongRandom: Failed to get address of BCryptGenRandom" (Indicator: "CryptGenRandom"; File: "HWiNFO_Monitor_Setup.exe")
Found api reference "CryptDecodeObject" (Indicator: "CryptDecodeObject"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "PFXImportCertStore" (Indicator: "PFXImportCertStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertGetNameStringW" (Indicator: "CertGetNameStringW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertNameToStrW" (Indicator: "CertNameToStrW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertFreeCertificateContext" (Indicator: "CertFreeCertificateContext"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertDuplicateCertificateContext" (Indicator: "CertDuplicateCertificateContext"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertCloseStore" (Indicator: "CertCloseStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertOpenSystemStoreW" (Indicator: "CertOpenSystemStoreW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertOpenStore" (Indicator: "CertOpenStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertFindChainInStore" (Indicator: "CertFindChainInStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found api reference "CertFindCertificateInStore" (Indicator: "CertFindCertificateInStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1573 (Show technique in the MITRE ATT&CK™ matrix)
-
Sample file has high entropy (likely encrypted/compressed content)
- details
- Sample file "sample.bin" has high entropy 7.86731
- source
- Binary File
- relevance
- 1/10
- ATT&CK ID
- T1027 (Show technique in the MITRE ATT&CK™ matrix)
-
Shows ability to obfuscate file or information
- details
-
The analysis contains indicators for crypto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings
Matched sigs: Able to use Microsoft's Enhanced Cryptographic Provider
Matched sigs: Sample file has high entropy (likely encrypted/compressed content) - source
- Indicator Combinations
- relevance
- 1/10
- ATT&CK ID
- T1027 (Show technique in the MITRE ATT&CK™ matrix)
-
XOR operations in executable file detected
- details
-
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 699259; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 741476; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1164332; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3921379; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3922831; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3923787; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3930005; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3931343; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3931509; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3938099; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3938793; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3941323; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3950851; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3958243; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3959501; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3970853; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3974261; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3982081; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3985535; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3989401; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4000657; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4005253; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4010237; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4016491; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4020631; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4024097; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4024835; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4033807; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4034531; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4042663; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4047577; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4057123; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4060791; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4062015; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4063019; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4064123; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4064641; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4065731; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4076463; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4082095; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4092555; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4103499; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4106209; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4108093; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4112171; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4112299; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4117563; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4120575; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4127193; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4131411; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4135873; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4136213; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4143545; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4148227; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4154487; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4159627; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4166591; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4174763; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4184705; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4188345; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4189789; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4191577; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4199813; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4202691; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4206047; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4208091; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4210129; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4212147; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4214167; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4216191; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4218207; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4220079; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4223283; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4224603; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4226695; code bytes = 30d0
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 221902; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 504937; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1323166; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1323269; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1815724; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 2996636; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122403; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122436; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122469; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122502; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122665; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3122907; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3924703; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3937469; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3954563; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3960289; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3961019; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3986731; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4000767; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4012193; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4015495; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4015993; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4023663; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4024187; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4057287; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4062101; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4086419; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4120601; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4129839; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4134513; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4142369; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4149963; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4184401; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4187347; code bytes = 33c1
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 176401; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 176428; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 176863; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 176890; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177139; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177163; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177390; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177471; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177494; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177518; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177546; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 177570; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1194089; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1492777; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1520252; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1524686; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1527682; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1537986; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1562124; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1638199; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1694952; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1706985; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 1972684; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 2867236; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 2947205; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 2969461; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 2982645; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3016454; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3026828; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3050607; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3282001; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3282019; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3338794; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3339159; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3401794; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3403392; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3403422; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3403442; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3462663; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3462726; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3462763; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3462781; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3463112; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3463130; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3470413; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3888832; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3914770; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3915310; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3917400; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3921360; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3922174; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3923774; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3926446; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3930642; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3934072; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3936760; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3938064; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3940238; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3941286; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3943476; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3949534; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3949870; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3958216; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3960846; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3965672; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3967774; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3970290; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3987908; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3988482; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3993468; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3994844; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3997046; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3998088; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 3999064; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4008996; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4009608; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4019656; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4021846; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4024796; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4026504; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4033768; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4034492; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4042632; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4051668; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4055224; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4057084; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4063008; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4063520; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4070788; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4078032; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4082084; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4084354; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4085020; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4090258; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4099724; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4105706; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4108630; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4108902; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4111010; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4112168; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4112472; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4113090; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4114844; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4118082; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4121582; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4125744; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4131102; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4142196; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4144196; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4148188; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4152120; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4154448; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4158144; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4159588; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4163992; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4164757; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4170246; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4176882; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4184036; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4184666; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4191548; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4199318; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4202682; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4206008; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4208052; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4210094; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4212108; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4214128; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4216152; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4218168; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4220040; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4222464; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4223244; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4224584; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4226656; code bytes = 8030
Found XOR loop in file "is-96Q5IE2WSZ.tmp" at offset 4228591; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 699259; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 741476; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1164332; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3921379; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3922831; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3923787; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3930005; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3931343; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3931509; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3938099; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3938793; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3941323; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3950851; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3958243; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3959501; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3970853; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3974261; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3982081; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3985535; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3989401; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4000657; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4005253; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4010237; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4016491; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4020631; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4024097; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4024835; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4033807; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4034531; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4042663; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4047577; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4057123; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4060791; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4062015; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4063019; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4064123; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4064641; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4065731; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4076463; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4082095; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4092555; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4103499; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4106209; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4108093; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4112171; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4112299; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4117563; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4120575; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4127193; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4131411; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4135873; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4136213; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4143545; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4148227; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4154487; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4159627; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4166591; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4174763; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4184705; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4188345; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4189789; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4191577; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4199813; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4202691; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4206047; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4208091; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4210129; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4212147; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4214167; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4216191; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4218207; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4220079; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4223283; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4224603; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4226695; code bytes = 30d0
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 221902; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 504937; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1323166; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1323269; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1815724; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 2996636; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122403; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122436; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122469; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122502; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122665; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3122907; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3924703; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3937469; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3954563; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3960289; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3961019; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3986731; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4000767; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4012193; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4015495; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4015993; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4023663; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4024187; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4057287; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4062101; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4086419; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4120601; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4129839; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4134513; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4142369; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4149963; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4184401; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4187347; code bytes = 33c1
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 176401; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 176428; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 176863; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 176890; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177139; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177163; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177390; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177471; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177494; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177518; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177546; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 177570; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1194089; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1492777; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1520252; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1524686; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1527682; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1537986; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1562124; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1638199; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1694952; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1706985; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 1972684; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 2867236; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 2947205; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 2969461; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 2982645; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3016454; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3026828; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3050607; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3282001; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3282019; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3338794; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3339159; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3401794; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3403392; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3403422; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3403442; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3462663; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3462726; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3462763; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3462781; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3463112; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3463130; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3470413; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3888832; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3914770; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3915310; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3917400; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3921360; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3922174; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3923774; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3926446; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3930642; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3934072; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3936760; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3938064; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3940238; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3941286; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3943476; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3949534; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3949870; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3958216; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3960846; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3965672; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3967774; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3970290; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3987908; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3988482; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3993468; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3994844; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3997046; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3998088; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 3999064; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4008996; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4009608; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4019656; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4021846; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4024796; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4026504; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4033768; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4034492; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4042632; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4051668; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4055224; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4057084; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4063008; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4063520; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4070788; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4078032; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4082084; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4084354; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4085020; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4090258; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4099724; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4105706; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4108630; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4108902; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4111010; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4112168; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4112472; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4113090; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4114844; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4118082; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4121582; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4125744; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4131102; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4142196; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4144196; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4148188; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4152120; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4154448; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4158144; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4159588; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4163992; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4164757; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4170246; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4176882; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4184036; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4184666; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4191548; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4199318; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4202682; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4206008; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4208052; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4210094; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4212108; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4214128; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4216152; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4218168; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4220040; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4222464; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4223244; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4224584; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4226656; code bytes = 8030
Found XOR loop in file "HWiNFO_Monitor_Setup.tmp" at offset 4228591; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 479802; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 480469; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 810207; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 810303; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 810391; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 810553; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 2449796; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3414123; code bytes = 30d0
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 1774801; code bytes = 33c1
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3377314; code bytes = 33c1
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3452484; code bytes = 33c1
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3590052; code bytes = 33c1
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 664180; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 1852183; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 2433128; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 2433232; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3413624; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3414098; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3418760; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3420445; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3458832; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3460517; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3469992; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3481735; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3488876; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3490556; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3491320; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3491512; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3491736; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3492376; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3492824; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3495239; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3498936; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3499320; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3508984; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3522672; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3542372; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3558342; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3562484; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3565656; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3593270; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3597412; code bytes = 8030
Found XOR loop in file "is-DZZ74NCPUI.tmp" at offset 3609052; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 188696; code bytes = 30d0
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 949264; code bytes = 30d0
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2717408; code bytes = 30d0
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 192662; code bytes = 33c1
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1027898; code bytes = 33c1
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1028001; code bytes = 33c1
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1364301; code bytes = 33c1
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2680657; code bytes = 33c1
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 160972; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 160999; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 161409; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 161436; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 161675; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 161699; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 161924; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 162005; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 162028; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 162052; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 162080; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 162104; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 326436; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 500151; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1174481; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1184416; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1205711; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1208630; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1218745; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1378561; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 1667551; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2032472; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2048205; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2053319; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2162890; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2162923; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2167890; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2168509; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2168525; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2168558; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2168572; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2170327; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2170343; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2170376; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2170390; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2174721; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2175051; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2176100; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2217203; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2550014; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2735204; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2736596; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 2865355; code bytes = 8030
Found XOR loop in file "is-FNEYTLL0RX.tmp" at offset 3122140; code bytes = 8030
Found XOR loop in file "is-6A6AUP6767.tmp" at offset 533952; code bytes = 30d0
Found XOR loop in file "is-6A6AUP6767.tmp" at offset 439360; code bytes = 8030
Found XOR loop in file "is-6A6AUP6767.tmp" at offset 963648; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 755909; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 762999; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 764865; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 766895; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 768399; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 771607; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 776639; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 781525; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 786599; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 787259; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 792173; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 793887; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 802709; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 803705; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 811263; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 813307; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 815335; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 817359; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 819391; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 961037; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1045993; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1325404; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1403388; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1418151; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1487697; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1511480; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1574770; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1591128; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1633318; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1686028; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 1771895; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2007940; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2143218; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2151934; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2360084; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2367520; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2375505; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2438463; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2465472; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2486740; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2552417; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2643710; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2805967; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2860459; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2874403; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2923823; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 2964166; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3062858; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3105285; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3115064; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3216630; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3238879; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3280973; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3285102; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3315692; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3352144; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3437273; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3544107; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3613543; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3622519; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3634285; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3847872; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3905151; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 3906223; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4005872; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4024789; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4034878; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4094751; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4119218; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4162752; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 4164346; code bytes = 30d0
Found XOR loop in file "sample.bin" at offset 148958; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 752899; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 761217; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 771727; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 778499; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 806769; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 808217; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 808455; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 932346; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 954599; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 989074; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1009913; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1097428; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1235911; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1285610; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1348182; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1429592; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1468469; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1488468; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1507806; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1508961; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1529936; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1532606; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1540949; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1554256; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1656166; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1861757; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 1921171; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2097203; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2122837; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2144492; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2181384; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2367207; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2422789; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2538554; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2926432; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3321737; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3399519; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3411674; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3485299; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3525605; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3535711; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3651258; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3744576; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3801689; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3809967; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3920664; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3924715; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3959792; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 3975787; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 4078106; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 4083312; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 4087038; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 4212696; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 4213127; code bytes = 33c1
Found XOR loop in file "sample.bin" at offset 2269815; code bytes = 30040e
Found XOR loop in file "sample.bin" at offset 123033; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 123060; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 123495; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 123522; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 123771; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 123795; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124022; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124103; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124126; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124150; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124178; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 124202; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 749586; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 750128; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 751558; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 754110; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 755078; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 759888; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 764524; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 766186; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 768360; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 771062; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 782546; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 785202; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 786580; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 790972; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 794464; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 795584; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 799486; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 799892; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 801602; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 806088; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 808780; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 811224; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 813268; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 815302; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 817320; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 819352; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 955778; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1089588; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1119448; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1132158; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1192661; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1262545; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1266912; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1300370; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1324613; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1840597; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1902685; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 1955585; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2039429; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2055364; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2077582; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2162749; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2168316; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2186934; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2224371; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2247421; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2276010; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2279940; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2311778; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2607108; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2655184; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2696907; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 2918579; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3053243; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3057320; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3121208; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3225369; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3256519; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3261868; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3276049; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3305939; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3359380; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3359475; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3381364; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3440723; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3444596; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3451053; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3462306; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3480562; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3636730; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3637823; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3689867; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3887261; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3888312; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3941039; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 3996554; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 4055476; code bytes = 8030
Found XOR loop in file "sample.bin" at offset 4203864; code bytes = 8030 - source
- Binary File
- ATT&CK ID
- T1027.005 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to use Microsoft's Enhanced Cryptographic Provider
-
Environment Awareness
-
Able to detect virtual machine (string)
- details
- Found string "1%PROGRAMFILES%\vmware\vmware tools\vmtoolsd.exe" (Source: "00000000-00004792.00000000.253882.013BC000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1497 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to identify sandbox environment running process
- details
- Found string "1%PROGRAMFILES%\vmware\vmware tools\vmtoolsd.exe" (Indicator: "vmtoolsd.exe"; Source: "00000000-00004792.00000000.253882.013BC000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1497 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to identify virtual environment by using user activity (API string)
- details
-
file/memory contains long string with (Indicator: "GetCommandLine"; File: "_setup64.tmp")
Found string "GetCommandLineW" (Indicator: "GetCommandLine"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1497.002 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to list processes on remote desktop session host
- details
-
Found reference to API "ProcessIdToSessionId" (Indicator: "ProcessIdToSessionId"; Source: "00000000-00004792-00000C2C-2963067208")
Found reference to API "ProcessIdToSessionId" (Indicator: "ProcessIdToSessionId"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to query security token membership for user discovery (API string)
- details
-
Found reference to API "CheckTokenMembership" (Indicator: "CheckTokenMembership"; File: "HWiNFO_Monitor_Setup.exe")
file/memory contains long string with (Indicator: "AllocateAndInitializeSid"; File: "_setup64.tmp")
Found reference to API "FreeSid" (Indicator: "FreeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API "AllocateAndInitializeSid" (Indicator: "AllocateAndInitializeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1033 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to query volume/memory size (API string)
- details
-
Found reference to API "GetDiskFreeSpaceExW" (Indicator: "GetDiskFreeSpace"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API "GetDiskFreeSpaceExW" (Indicator: "GetDiskFreeSpaceEx"; File: "HWiNFO_Monitor_Setup.exe") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to retrieve information about the current system (API string)
- details
- Found system information discovery API: "GetNativeSystemInfo" in "00000000-00004792.00000000.253882.00E89000.00000004.mdmp"
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to retrieve system language (API string)
- details
-
Found reference to API "GetUserDefaultUILanguage" (Indicator: "GetUserDefaultUILanguage"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API "GetKeyboardLayoutList" (Indicator: "GetKeyboardLayoutList"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1614.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to visualize and control listed components (API string)
- details
-
Found reference to API "SendMessageA" (Indicator: "sendmessage"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "EnumWindows" (Indicator: "enumwindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "EnumChildWindows" (Indicator: "enumchildwindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "PostMessageW" (Indicator: "postmessage"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "SendMessageW" (Indicator: "sendmessage"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "SendMessageTimeoutW" (Indicator: "sendmessage"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1055.015 (Show technique in the MITRE ATT&CK™ matrix)
-
Attempts to call APIs commonly associated with anti-analysis and evasion techniques
- details
- "HWiNFO_Monitor_Setup.tmp" called "GetTickCount" with parameters (UID: 00000000-00004792)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1497 (Show technique in the MITRE ATT&CK™ matrix)
-
Attempts to call APIs to gather system and hardware detail
- details
-
"HWiNFO_Monitor_Setup.exe" called "GetSystemInfo" with parameters (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "QueryPerformanceCounter" (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "GetSystemMetrics" with parameters (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "EnumDisplayMonitors" with parameters (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetSystemInfo" with parameters (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "QueryPerformanceCounter" (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Attempts to invoke APIs commonly associated with credential theft and data exfiltration functionality
- details
- "HWiNFO_Monitor_Setup.exe" called "NtQueryInformationToken" with parameters (UID: 00000000-00001392)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1003 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API possibly used to retrieve a handle to the foreground window
- details
- "HWiNFO_Monitor_Setup.tmp" called "GetForegroundWindow" (UID: 00000000-00004792)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to enumerate active windows
- details
-
"HWiNFO_Monitor_Setup.tmp" called "EnumWindows" with parameter "19920692" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "EnumWindows" with parameter "263004" - (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get active windows title
- details
-
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "1f043e04340433043e0442043e0432043a04300420003a04200043044104420430043d043e0432043a043504" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "1f0440043e043304400430043c043c043004200043044104420430043d043e0432043a04380420003f043e04340433043e044204300432043b043804320430043504420441044f0420003a04200043044104420430043d043e0432043a04350420004800570069004e0046004f0020004d006f006e00690074006f00720020003d043004200032043004480420003a043e043c043f044c044e044204350440042e00" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "1e0442043c0435043d043004" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "23044104420430043d043e0432043a043004" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "1f043e04360430043b04430439044104420430042c0020003f043e0434043e04360434043804420435042c0020003f043e043a04300420004800570069004e0046004f0020004d006f006e00690074006f007200200043044104420430043d043e0432043804420441044f0420003d043004200032043004480420003a043e043c043f044c044e044204350440042e00" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "21043e043704340430043d043804350420003f0430043f043e043a042e002e002e00" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "21043e044504400430043d0435043d0438043504200038043d0444043e0440043c043004460438043804200034043b044f0420003404350438043d044104420430043b043b044f044604380438042e002e002e00" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "2004300441043f0430043a043e0432043a04300420004404300439043b043e0432042e002e002e00" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "%PROGRAMFILES%\CPUID\HWiNFO\CRYPTBASE.dll" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "%PROGRAMFILES%\CPUID\HWiNFO\HWMonitor.exe" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "%PROGRAMFILES%\CPUID\HWiNFO\hwm_readme.txt" - (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetWindowTextW" with parameter "%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat" - (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get handle of currently active window
- details
- "HWiNFO_Monitor_Setup.tmp" called "GetActiveWindow" (UID: 00000000-00004792)
- source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get product type
- details
-
"HWiNFO_Monitor_Setup.exe" called "RtlGetNtProductType" with parameter 01000000 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetNtProductType" with parameter 01000000 (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to get system version information
- details
-
"HWiNFO_Monitor_Setup.exe" called "RtlGetVersion" with parameter 140100000a000000000000005d5800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "RtlGetVersion" with parameter 1c0100000a000000000000005d5800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "RtlGetVersion" with parameter 000000000a000000000000005d5800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 140100000a000000000000005d5800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 1c0100000a000000000000005d5800000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 1c0100000a000000000000005d580000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc77b277b4f3b677e600000020fb2f010400000000fb2f010c00000024fb2f01648607004c011200000000009ef3b6773c010000709f377712f4b677c4010000000000000c00000010c7d68e40fb2f01839f3777c40100003ffb2f0100000000a4fb2f015eabe400c401000058fb2f014c0164860000000000000000000000000000000000000000f8b3e6000001d5d798fb2f01f0555a757a6fac00ddadac0094fb2f01 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "RtlGetVersion" with parameter 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 (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to retrieve local language
- details
- "HWiNFO_Monitor_Setup.exe" called "GetLocaleInfoW" with parameter "1033" - (UID: 00000000-00001392)
- source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1614 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains a Wine emulator-related string
- details
- "wine_get_version" (Indicator: "wine_get_version"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 5/10
- ATT&CK ID
- T1497.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to determine if process is running under WOW64 (API string)
- details
- Found reference to API "IsWow64Process" (Indicator: "IsWow64Process"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to perform scheduled transfer (API string)
- details
- Found reference to API "GetSystemTimes" (Indicator: "GetSystemTime"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1029 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to read software policies
- details
-
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "TRANSPARENTENABLED")
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "AUTHENTICODEENABLED")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "TRANSPARENTENABLED") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve machine time (API string)
- details
- Found reference to API "GetSystemTimes" (Indicator: "GetSystemTime"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1124 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve machine timezone (API string)
- details
- Found reference to API "GetTimeZoneInformationForYear" (Indicator: "GetTimeZoneInformation"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1124 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve network parameters of a computer (API string)
- details
- Found reference to API "WNetGetConnectionW" (Indicator: "NetGetConnection"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1016 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve open application windows (API string)
- details
-
Found reference to API "EnumWindows" (Indicator: "EnumWindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "GetActiveWindow" (Indicator: "GetActiveWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "GetWindowTextW" (Indicator: "GetWindowText"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "5841280554,8160,109,,GetWindowTextW,user32.dll,"01:06:04.703",RX=0,PX=0" (Indicator: "GetWindowText"; Source: "00000000-00004792.00000000.253882.013ED000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve the OS information (API string)
- details
- Found reference to API "5720624326,8160,3024,,RtlGetVersion,NTDLL.dll,"01:06:04.656",RX=0,PX=0" (Indicator: "GetVersion"; Source: "00000000-00004792.00000000.253882.013ED000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains reference to Borland Delphi related registry entry
- details
- "Software\Borland\Delphi\Locales" (Indicator: "\borland\delphi\locales") in Source: HWiNFO_Monitor_Setup.exe
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries for Borland Delphi related registry entry
- details
-
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKCU\SOFTWARE\BORLAND\DELPHI\LOCALES"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "OPEN"; Path: "HKCU\SOFTWARE\BORLAND\DELPHI\LOCALES"; Key: ""; Value: "") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries volume information
- details
- "HWiNFO_Monitor_Setup.tmp" queries volume information of an entire harddrive"C:\" at 00000000-00004792-00000C17-2963004575
- source
- API Call
- relevance
- 8/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the active computer name
- details
-
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME"; Key: "COMPUTERNAME") - source
- Registry Access
- relevance
- 5/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the registry for installed applications
- details
-
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\HWINFO_MONITOR_SETUP.TMP")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1") - source
- Registry Access
- relevance
- 10/10
- ATT&CK ID
- T1518 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to detect virtual machine (string)
-
General
-
Able to retrieve command line parameters of the running process
- details
- file/memory contains long string(File: "_setup64.tmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1059.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to create a directory
- details
-
"HWiNFO_Monitor_Setup.exe" called "CreateDirectoryW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp\_isetup (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %PROGRAMFILES%\CPUID (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %PROGRAMFILES%\CPUID\HWiNFO (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "CreateDirectoryW" with parameter %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO (UID: 00000000-00004792) - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1074.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to create a process
- details
-
"HWiNFO_Monitor_Setup.exe" called "CreateProcessW" with parameter ""%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp" /SL5="$10034C
3034253
905728
C:\HWiNFO_Monitor_Se" - (UID: 00000000-00001392) - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to load libraries
- details
-
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter kernel32 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter kernel32.dll (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "LoadLibrary" with a parameter %WINDIR%\system32\bcrypt.dll (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter kernel32 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter kernel32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter Msctf.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter imm32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter uxtheme.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\shell32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\uxtheme.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\bcrypt.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\shfolder.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\Rstrtmgr.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter DWMAPI.DLL (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter user32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter shell32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter msimg32.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter %WINDIR%\system32\sfc.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "LoadLibrary" with a parameter api-ms-win-core-fibers-l1-1-0 (UID: 00000000-00004792) - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1129 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to move file or directory
- details
-
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp & %PROGRAMFILES%\CPUID\HWiNFO\unins000.exe (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp & %PROGRAMFILES%\CPUID\HWiNFO\CRYPTBASE.dll (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp & %PROGRAMFILES%\CPUID\HWiNFO\HWMonitor.exe (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-BJKFJATABB.tmp & %PROGRAMFILES%\CPUID\HWiNFO\hwm_readme.txt (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-TI156WG2Y2.tmp & %PROGRAMFILES%\CPUID\HWiNFO\unins000.dat (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp & %PROGRAMFILES%\CPUID\HWiNFO\unins000.exe (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "MoveFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\is-F54G98LCMX.tmp & %PROGRAMFILES%\CPUID\HWiNFO\unins000.msg (UID: 00000000-00004792) - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1570 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to retrieve function addresses
- details
-
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FlsAlloc (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FlsSetValue (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FlsGetValue (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter LCMapStringEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FlsFree (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter InitOnceExecuteOnce (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateEventExW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateSemaphoreW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateSemaphoreExW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateThreadpoolTimer (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetThreadpoolTimer (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CloseThreadpoolTimer (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateThreadpoolWait (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetThreadpoolWait (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CloseThreadpoolWait (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateSymbolicLinkW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetCurrentPackageId (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetTickCount64 (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetFileInformationByHandle (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter InitializeConditionVariable (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter WakeConditionVariable (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter WakeAllConditionVariable (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SleepConditionVariableCS (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter InitializeSRWLock (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SleepConditionVariableSRW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CreateThreadpoolWork (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SubmitThreadpoolWork (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CloseThreadpoolWork (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CompareStringEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetLocaleInfoEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter AreFileApisANSI (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter RtlGetVersion (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CoCreateInstance (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CoCreateInstanceEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CoGetClassObject (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CoGetInstanceFromFile (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CoGetInstanceFromIStorage (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter wine_get_version (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetLogicalProcessorInformation (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetThreadUILanguage (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetDefaultDllDirectories (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetSearchPathMode (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter SetProcessDEPPolicy (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetNativeSystemInfo (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CompareStringOrdinal (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VariantChangeTypeEx (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarNeg (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarNot (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarAdd (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarSub (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarMul (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarDiv (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarIdiv (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarMod (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarAnd (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarOr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarXor (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarCmp (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarI4FromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarR4FromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarR8FromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarDateFromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarCyFromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarBoolFromStr (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarBstrFromCy (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarBstrFromDate (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter VarBstrFromBool (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetUserDefaultUILanguage (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter CheckTokenMembership (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetTempPath2W (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter BCryptGenRandom (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter GetFinalPathNameByHandleW (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter DecodePointer (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "GetProcAddress" with a parameter EncodePointer (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlsAlloc (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlsSetValue (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlsGetValue (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter LCMapStringEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlsFree (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter InitOnceExecuteOnce (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateEventExW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateSemaphoreW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateSemaphoreExW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateThreadpoolTimer (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetThreadpoolTimer (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CloseThreadpoolTimer (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateThreadpoolWait (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetThreadpoolWait (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CloseThreadpoolWait (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateSymbolicLinkW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetCurrentPackageId (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetTickCount64 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetFileInformationByHandle (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter InitializeConditionVariable (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter WakeConditionVariable (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter WakeAllConditionVariable (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SleepConditionVariableCS (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter InitializeSRWLock (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SleepConditionVariableSRW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CreateThreadpoolWork (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SubmitThreadpoolWork (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CloseThreadpoolWork (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CompareStringEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetLocaleInfoEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter AreFileApisANSI (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RtlGetVersion (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoCreateInstance (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoCreateInstanceEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoGetClassObject (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoGetInstanceFromFile (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoGetInstanceFromIStorage (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter wine_get_version (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetLogicalProcessorInformation (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThreadUILanguage (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetDefaultDllDirectories (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetSearchPathMode (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetProcessDEPPolicy (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetNativeSystemInfo (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CompareStringOrdinal (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VariantChangeTypeEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarNeg (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarNot (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarAdd (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarSub (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarMul (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarDiv (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarIdiv (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarMod (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarAnd (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarOr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarXor (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarCmp (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarI4FromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarR4FromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarR8FromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarDateFromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarCyFromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarBoolFromStr (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarBstrFromCy (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarBstrFromDate (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter VarBstrFromBool (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoInitializeEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoAddRefServerProcess (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoReleaseServerProcess (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoResumeClassObjects (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CoSuspendClassObjects (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter BufferedPaintInit (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter AnimateWindow (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter InitializeFlatSB (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter UninitializeFlatSB (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_GetScrollProp (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_SetScrollProp (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_GetScrollRange (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_GetScrollPos (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_SetScrollPos (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter FlatSB_SetScrollRange (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetLayeredWindowAttributes (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter Wow64DisableWow64FsRedirection (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter Wow64RevertWow64FsRedirection (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter OpenThemeData (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CloseThemeData (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeBackground (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeText (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeTextEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemePartSize (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeTextExtent (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeTextMetrics (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeBackgroundRegion (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter HitTestThemeBackground (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeEdge (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeIcon (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsThemePartDefined (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeColor (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeMetric (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeString (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeBool (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeInt (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeEnumValue (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemePosition (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeFont (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeRect (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeMargins (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeIntList (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemePropertyOrigin (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetWindowTheme (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeFilename (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysColor (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysColorBrush (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysBool (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysSize (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysFont (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysString (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeSysInt (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsThemeActive (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsAppThemed (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetWindowTheme (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter EnableThemeDialogTexture (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsThemeDialogTextureEnabled (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeAppProperties (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetThemeAppProperties (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetCurrentThemeName (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeDocumentationProperty (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DrawThemeParentBackground (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter EnableTheming (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter NotifyWinEvent (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SHPathPrepareForWriteW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter TaskDialogIndirect (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsWow64Process2 (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RegDeleteKeyExA (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter IsWow64GuestMachineSupported (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SHGetKnownFolderPath (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DisableProcessWindowsGhosting (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter CheckTokenMembership (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetUserDefaultUILanguage (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ShutdownBlockReasonDestroy (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ShutdownBlockReasonCreate (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SetProcessMitigationPolicy (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetSystemWow64DirectoryW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetTempPath2W (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter BCryptGenRandom (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SHGetFolderPathW (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmStartSession (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmRegisterResources (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmGetList (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmShutdown (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmRestart (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RmEndSession (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetThemeBackgroundExtent (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DwmSetWindowAttribute (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ChangeWindowMessageFilterEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetWindowDpiAwarenessContext (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter AreDpiAwarenessContextsEqual (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SHGetStockIconInfo (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SHGetImageList (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter MonitorFromRect (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter GetMonitorInfoA (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ImmAssociateContextEx (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter AlphaBlend (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter DwmExtendFrameIntoClientArea (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter SfcIsFileProtected (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter ProcessIdToSessionId (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter BufferedPaintUnInit (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "GetProcAddress" with a parameter RtlDllShutdownInProgress (UID: 00000000-00004792) - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to execute Windows APIs
- details
-
Found reference to API (Indicator: "GetLogicalProcessorInformation"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetThreadPreferredUILanguages"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "SetThreadPreferredUILanguages"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetThreadUILanguage"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetLongPathNameW"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "SetEvent"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "ResetEvent"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "CompareStringOrdinal"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "RtlCompareUnicodeString"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetDiskFreeSpaceExW"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "InitializeConditionVariable"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "WakeConditionVariable"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "WakeAllConditionVariable"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "SleepConditionVariableCS"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetTickCount64"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "CheckTokenMembership"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetUserDefaultUILanguage"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "SeShutdownPrivilege"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetFinalPathNameByHandleW"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "GetCurrentDirectory"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API (Indicator: "WNetEnumResourceW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "WNetGetUniversalNameW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "WNetGetConnectionW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "WNetCloseEnum"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "WNetOpenEnumW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetSaveFileNameW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetOpenFileNameW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SHGetFileInfoW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "Shell_NotifyIconW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ShellExecuteW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ShellExecuteExW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "MoveWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CopyImage"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetMenuItemInfoW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetMenuItemInfoW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "FrameRect"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetMenuStringW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "FillRect"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SendMessageA"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "EnumWindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ShowOwnedPopups"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetScrollRange"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetActiveWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetActiveWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DrawEdge"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetKeyboardLayoutList"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "OemToCharBuffA"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "EnumChildWindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "UnhookWindowsHookEx"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetCapture"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetCapture"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ShowCaret"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CreatePopupMenu"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetMenuItemID"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CharLowerBuffW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "IsZoomed"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetParent"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DrawMenuBar"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetClientRect"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "IsChild"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "IsIconic"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CallNextHookEx"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ShowWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetWindowTextW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetForegroundWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DestroyWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "RegisterClassW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CharNextW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetFocus"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetDC"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetFocus"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ReleaseDC"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "ExitWindowsEx"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CharToOemBuffA"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetScrollRange"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "PeekMessageA"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "MessageBeep"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetSubMenu"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DestroyIcon"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "IsWindowVisible"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DispatchMessageA"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "UnregisterClassW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetTopWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "LoadStringW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CreateMenu"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "CharLowerW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetWindowRgn"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetWindowPos"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetMenuItemCount"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetSysColorBrush"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetWindowDC"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetScrollInfo"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "SetWindowTextW"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetSysColor"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "EnableScrollBar"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "TrackPopupMenu"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "DrawIconEx"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API (Indicator: "GetLogicalProcessorInformation"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "MessageBoxA"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "IsWow64Process"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "ProcessIdToSessionId"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "LocaleNameToLCID"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "GetTimeZoneInformationForYear"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "GetNativeSystemInfo"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "GetSystemTimes"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "RegDeleteKeyExW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CryptDecodeObject"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "PFXImportCertStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertGetNameStringW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertNameToStrW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertFreeCertificateContext"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertDuplicateCertificateContext"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertCloseStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertOpenSystemStoreW"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertOpenStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertFindChainInStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "CertFindCertificateInStore"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API (Indicator: "StrToInt64ExW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "GetLastError"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "LocalFree"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "CloseHandle"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "ReadFile"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "WriteFile"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "GetCommandLineW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetConsoleCtrlHandler"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetProcessShutdownParameters"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetCurrentDirectoryW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "GetSystemDirectoryW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetErrorMode"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "ExitProcess"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "FreeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetNamedSecurityInfoW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SetEntriesInAclW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "AllocateAndInitializeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "GetNamedSecurityInfoW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "CommandLineToArgvW"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API (Indicator: "SessionEnv"; Source: "00000000-00004792.00000000.253882.013ED000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to execute an application (API string)
- details
-
Found reference to API "ShellExecuteW" (Indicator: "ShellExecute"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "ShellExecuteExW" (Indicator: "ShellExecute"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve the command-line string for the current process (API string)
- details
-
Found reference to API "GetCommandLineW" (Indicator: "GetCommandLine"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API "CommandLineToArgvW" (Indicator: "CommandLineToArgv"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1059.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to set/get the last-error code for a calling thread (API string)
- details
- Found reference to API "GetLastError" (Indicator: "GetLastError"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to show a graphical window (API string)
- details
- Found reference to API "ShowWindow" (Indicator: "ShowWindow"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1564.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains registry location strings
- details
-
"Software\Embarcadero\Locales" in Source: HWiNFO_Monitor_Setup.exe
"Software\CodeGear\Locales" in Source: HWiNFO_Monitor_Setup.exe
"Software\Borland\Locales" in Source: HWiNFO_Monitor_Setup.exe
"Software\Borland\Delphi\Locales" in Source: HWiNFO_Monitor_Setup.exe
"SOFTWARE\Microsoft\Windows NT\CurrentVersion" in Source: HWiNFO_Monitor_Setup.exe - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Creates mutants
- details
-
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\Sessions\1\BaseNamedObjects\Local\SM0:4792:168:WilStaging_02"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\Sessions\1\BaseNamedObjects\RstrMgr3887CAB8-533F-4C85-B0DC-3E5639F8D511"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\Sessions\1\BaseNamedObjects\RstrMgr-3887CAB8-533F-4C85-B0DC-3E5639F8D511-Session0000"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\Sessions\1\BaseNamedObjects\SM0:4792:64:WilError_03"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\Sessions\1\BaseNamedObjects\Local\SM0:4792:64:WilError_03"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!rwWriterMutex"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_16.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_32.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_48.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_96.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_256.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_768.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_1280.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_1920.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_2560.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_sr.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_wide.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_exif.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_wide_alternate.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_custom_stream.db!dfMaintainer"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!IconCacheInit"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "\BaseNamedObjects\C::Users:%OSUSER%:AppData:Local:Microsoft:Windows:Explorer:iconcache_idx.db!rwReaderRefs"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "Local\SM0:4792:168:WilStaging_02"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "Local\SM0:4792:64:WilError_03"
Process HWiNFO_Monitor_Setup.tmp created mutex with name "SM0:4792:64:WilError_03" - source
- Created Mutant
- relevance
- 3/10
- ATT&CK ID
- T1480 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops files marked as clean
- details
-
Antivirus vendors marked dropped file "HWiNFO Monitor.lnk" as clean (type is "MS Windows shortcut Item id list present Has Relative path Has Working directory Icon number=0 Unicoded HasExpIcon "%SystemDrive%\Program Files\CPUID\HWiNFO\HWiNFO.exe" length=0 window=normal IDListSize 0x019b Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D" Volume "C:\"")
Antivirus vendors marked dropped file "#U0423#U0434#U0430#U043b#U0438#U0442#U044c HWiNFO Monitor.lnk" as clean (type is "MS Windows shortcut Item id list present Points to a file or directory Has Relative path Has Working directory Unicoded MachineID hk2lovh86kohwgg Archive ctime=Sat Apr 11 05:54:00 2026 atime=Sat Apr 11 05:55:00 2026 mtime=Wed Apr 8 15:11:14 2026 length=3130088 window=normal IDListSize 0x01c5 Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D" Volume "C:\" LocalBasePath "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"")
Antivirus vendors marked dropped file "is-DZZ74NCPUI.tmp" as clean (type is "PE32+ executable for MS Windows 5.02 (GUI) x86-64 5 sections"), Antivirus vendors marked dropped file "_setup64.tmp" as clean (type is "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections") - source
- Binary File
- relevance
- 10/10
-
File contains dynamic base/NX flags
- details
-
"is-6A6AUP6767.tmp" has flags like IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT - source
- Static Parser
-
Found E-Mail address in binary/memory
- details
- Pattern match: "fdelattre@cpuid.com"
- source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1114 (Show technique in the MITRE ATT&CK™ matrix)
-
Loads modules at runtime
- details
-
"HWiNFO_Monitor_Setup.exe" loaded module "API-MS-WIN-CORE-SYNCH-L1-2-0" at base 77170000
"HWiNFO_Monitor_Setup.exe" loaded module "API-MS-WIN-CORE-FIBERS-L1-1-1" at base 77170000
"HWiNFO_Monitor_Setup.exe" loaded module "API-MS-WIN-CORE-LOCALIZATION-L1-2-1" at base 77170000
"HWiNFO_Monitor_Setup.exe" loaded module "KERNEL32" at base 76890000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\TEMP\VXOLE32.DLL" at base 73630000
"HWiNFO_Monitor_Setup.exe" loaded module "KERNEL32.DLL" at base 76890000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SYSTEM32\BCRYPT.DLL" at base 73610000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SYSTEM32\BCRYPTPRIMITIVES.DLL" at base 76fb0000
"HWiNFO_Monitor_Setup.exe" loaded module "RPCRT4.DLL" at base 75d30000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SYSTEM32\UXTHEME.DLL" at base 74fb0000
"HWiNFO_Monitor_Setup.exe" loaded module "NTDLL.DLL" at base 77ab0000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SYSTEM32\APPHELP.DLL" at base 74ee0000
"HWiNFO_Monitor_Setup.tmp" loaded module "API-MS-WIN-CORE-SYNCH-L1-2-0" at base 77170000
"HWiNFO_Monitor_Setup.tmp" loaded module "API-MS-WIN-CORE-FIBERS-L1-1-1" at base 77170000
"HWiNFO_Monitor_Setup.tmp" loaded module "API-MS-WIN-CORE-LOCALIZATION-L1-2-1" at base 77170000
"HWiNFO_Monitor_Setup.tmp" loaded module "KERNEL32" at base 76890000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\TEMP\VXOLE32.DLL" at base 73630000
"HWiNFO_Monitor_Setup.tmp" loaded module "KERNEL32.DLL" at base 76890000
"HWiNFO_Monitor_Setup.tmp" loaded module "MSCTF.DLL" at base 773f0000
"HWiNFO_Monitor_Setup.tmp" loaded module "IMM32.DLL" at base 776a0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\UXTHEME.DLL" at base 74fb0000
"HWiNFO_Monitor_Setup.tmp" loaded module "NTDLL.DLL" at base 77ab0000
"HWiNFO_Monitor_Setup.tmp" loaded module "RPCRT4.DLL" at base 75d30000
"HWiNFO_Monitor_Setup.tmp" loaded module "UXTHEME.DLL" at base 74fb0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\SHELL32.DLL" at base 75f00000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\BCRYPT.DLL" at base 73610000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\BCRYPTPRIMITIVES.DLL" at base 76fb0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\SHFOLDER.DLL" at base 73530000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\RSTRTMGR.DLL" at base 734f0000
"HWiNFO_Monitor_Setup.tmp" loaded module "COMCTL32" at base 75530000
"HWiNFO_Monitor_Setup.tmp" loaded module "DWMAPI.DLL" at base 73160000
"HWiNFO_Monitor_Setup.tmp" loaded module "USER32.DLL" at base 778f0000
"HWiNFO_Monitor_Setup.tmp" loaded module "COMCTL32.DLL" at base 75530000
"HWiNFO_Monitor_Setup.tmp" loaded module "SHELL32.DLL" at base 75f00000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSWOW64\THUMBCACHE.DLL" at base 73100000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\ICONCODECSERVICE.DLL" at base 734e0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\WINDOWSCODECS.DLL" at base 73370000
"HWiNFO_Monitor_Setup.tmp" loaded module "MSIMG32.DLL" at base 734d0000
"HWiNFO_Monitor_Setup.tmp" loaded module "SSPICLI.DLL" at base 744a0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\EXPLORERFRAME.DLL" at base 72d30000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\SFC.DLL" at base 5db0000
"HWiNFO_Monitor_Setup.tmp" loaded module "API-MS-WIN-CORE-FIBERS-L1-1-0" at base 77170000
"HWiNFO_Monitor_Setup.tmp" loaded module "API-MS-WIN-CORE-REGISTRY-L1-1-0.DLL" at base 77170000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSWOW64\WINDOWS.STORAGE.DLL" at base 73c70000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\PROPSYS.DLL" at base 74560000
"HWiNFO_Monitor_Setup.tmp" loaded module "CSCAPI.DLL" at base 743f0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SYSTEM32\DWMAPI.DLL" at base 73160000 - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1129 (Show technique in the MITRE ATT&CK™ matrix)
-
Loads the Bcrypt module DLL
- details
-
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SysWOW64\bcrypt.dll" at 73610000
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SysWOW64\bcryptprimitives.dll" at 76FB0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SysWOW64\bcryptprimitives.dll" at 76FB0000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SysWOW64\bcrypt.dll" at 73610000 - source
- Loaded Module
- ATT&CK ID
- T1027 (Show technique in the MITRE ATT&CK™ matrix)
-
Loads the RPC (Remote Procedure Call) module DLL
- details
-
"HWiNFO_Monitor_Setup.exe" loaded module "%WINDIR%\SysWOW64\rpcrt4.dll" at 75D30000
"HWiNFO_Monitor_Setup.tmp" loaded module "%WINDIR%\SysWOW64\rpcrt4.dll" at 75D30000 - source
- Loaded Module
- ATT&CK ID
- T1129 (Show technique in the MITRE ATT&CK™ matrix)
-
Matched Compiler/Packer signature (DIE)
- details
-
"HWiNFO_Monitor_Setup.exe" was detected as "Inno Setup Module" and name: "Installer"
"HWiNFO_Monitor_Setup.exe" was detected as ".NET Reactor" and name: "Protector"
"HWiNFO_Monitor_Setup.exe" was detected as "Embarcadero Delphi" and name: "Compiler"
"HWiNFO_Monitor_Setup.exe" was detected as "Turbo Linker" and name: "Linker"
"is-DZZ74NCPUI.tmp" was detected as "Inno Setup Module" and name: "Installer"
"is-DZZ74NCPUI.tmp" was detected as ".NET Reactor" and name: "Protector"
"is-DZZ74NCPUI.tmp" was detected as "Embarcadero Delphi" and name: "Compiler"
"is-DZZ74NCPUI.tmp" was detected as "Turbo Linker" and name: "Linker"
"is-6A6AUP6767.tmp" was detected as "Inno Setup Module" and name: "Installer"
"is-6A6AUP6767.tmp" was detected as ".NET Reactor" and name: "Protector"
"is-6A6AUP6767.tmp" was detected as "Embarcadero Delphi" and name: "Compiler"
"is-6A6AUP6767.tmp" was detected as "Turbo Linker" and name: "Linker"
"_setup64.tmp" was detected as "Inno Setup Module" and name: "Installer"
"_setup64.tmp" was detected as ".NET Reactor" and name: "Protector"
"_setup64.tmp" was detected as "Embarcadero Delphi" and name: "Compiler"
"_setup64.tmp" was detected as "Turbo Linker" and name: "Linker" - source
- Static Parser
- ATT&CK ID
- T1027 (Show technique in the MITRE ATT&CK™ matrix)
-
Overview of unique CLSIDs touched in registry
- details
-
"HWiNFO_Monitor_Setup.tmp" touched "Local Icon Cache" (Path: "HKCU\WOW6432NODE\CLSID\{2155FEE3-2419-4373-B102-6843707EB41F}")
"HWiNFO_Monitor_Setup.tmp" touched "Task Bar Communication" (Path: "HKCU\WOW6432NODE\CLSID\{56FDF344-FD6D-11D0-958A-006097C9A090}\TREATAS")
"HWiNFO_Monitor_Setup.tmp" touched "Computer" (Path: "HKCU\WOW6432NODE\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\SHELLFOLDER")
"HWiNFO_Monitor_Setup.tmp" touched "Shortcut" (Path: "HKCU\WOW6432NODE\CLSID\{00021401-0000-0000-C000-000000000046}\TREATAS")
"HWiNFO_Monitor_Setup.tmp" touched "Memory Mapped Cache Mgr" (Path: "HKCU\WOW6432NODE\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\TREATAS") - source
- Registry Access
- relevance
- 3/10
- ATT&CK ID
- T1546.015 (Show technique in the MITRE ATT&CK™ matrix)
-
Process launched with changed environment
- details
-
Process "HWiNFO_Monitor_Setup.tmp" (Show Process) was launched with new environment variables: "USERDNSDOMAIN="DESKTOP-8LD9T6N""
Process "HWiNFO_Monitor_Setup.tmp" (Show Process) was launched with modified environment variables: "NUMBER_OF_PROCESSORS" - source
- Monitored Target
- relevance
- 10/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads information about supported languages
- details
-
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EMPTY")
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EN-US")
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "EN-US")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EMPTY")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CUSTOMLOCALE"; Key: "EN-US")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\EXTENDEDLOCALE"; Key: "EN-US") - source
- Registry Access
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
References Windows file paths for DLLs (possible dropped files)
- details
-
Observed system executable string:"%WINDIR%\system32\bcrypt.dll" [Source: 00000000-00001392-00000C2B-2957734118]
Observed system executable string:"%WINDIR%\system32\shell32.dll" [Source: 00000000-00004792-00000C2B-2959597676]
Observed system executable string:"%WINDIR%\system32\uxtheme.dll" [Source: 00000000-00004792-00000C2B-2959643739]
Observed system executable string:"%WINDIR%\system32\shfolder.dll" [Source: 00000000-00004792-00000C2B-2959985508]
Observed system executable string:"%WINDIR%\system32\Rstrtmgr.dll" [Source: 00000000-00004792-00000C2B-2960040978]
Observed system executable string:"%WINDIR%\system32\sfc.dll" [Source: 00000000-00004792-00000C2B-2961330496] - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Scanning for window names
- details
- "HWiNFO_Monitor_Setup.tmp" searching for class "Shell_TrayWnd"
- source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1010 (Show technique in the MITRE ATT&CK™ matrix)
-
Spawns new processes
- details
-
Spawned process "HWiNFO_Monitor_Setup.tmp" with commandline "/SL5="$10034C
3034253
905728
C:\\HWiNFO_Monitor_Setup.exe" /SILE ..." (Show Process) - source
- Monitored Target
- relevance
- 3/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Spawns new processes that are not known child processes
- details
-
Spawned process "HWiNFO_Monitor_Setup.tmp" with commandline "/SL5="$10034C
3034253
905728
C:\\HWiNFO_Monitor_Setup.exe" /SILE ..." (Show Process) - source
- Monitored Target
- relevance
- 3/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes files in a temp directory
- details
-
"HWiNFO_Monitor_Setup.exe" writes to a file "%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp"
"HWiNFO_Monitor_Setup.tmp" writes to a file "C:\Users\%USERNAME%\AppData\Local\Temp\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp" - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1005 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to retrieve command line parameters of the running process
-
Installation/Persistence
-
Attempts to launch the Installer package binary
- details
-
Process "HWiNFO_Monitor_Setup.tmp" with commandline "/SL5="$10034C
3034253
905728
C:\\HWiNFO_Monitor_Setup.exe" /SILENT" (Show Process) - source
- Monitored Target
- relevance
- 3/10
- ATT&CK ID
- T1546.016 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to load modules (API string)
- details
- Found reference to API "LoadLibraryEx failed" (Indicator: "LoadLibrary"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Dropped files
- details
-
"HWiNFO Monitor.lnk" has type "MS Windows shortcut Item id list present Has Relative path Has Working directory Icon number=0 Unicoded HasExpIcon "%SystemDrive%\Program Files\CPUID\HWiNFO\HWiNFO.exe" length=0 window=normal IDListSize 0x019b Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D" Volume "C:\""- Location: [%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk]- [targetUID: 00000000-00004792]
"#U0423#U0434#U0430#U043b#U0438#U0442#U044c HWiNFO Monitor.lnk" has type "MS Windows shortcut Item id list present Points to a file or directory Has Relative path Has Working directory Unicoded MachineID hk2lovh86kohwgg Archive ctime=Sat Apr 11 05:54:00 2026 atime=Sat Apr 11 05:55:00 2026 mtime=Wed Apr 8 15:11:14 2026 length=3130088 window=normal IDListSize 0x01c5 Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D" Volume "C:\" LocalBasePath "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe""- [targetUID: N/A]
"is-96Q5IE2WSZ.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp]- [targetUID: 00000000-00004792]
"HWiNFO_Monitor_Setup.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp]- [targetUID: 00000000-00001392]
"is-DZZ74NCPUI.tmp" has type "PE32+ executable for MS Windows 5.02 (GUI) x86-64 5 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp]- [targetUID: 00000000-00004792]
"is-FNEYTLL0RX.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 10 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp]- [targetUID: 00000000-00004792]
"is-6A6AUP6767.tmp" has type "PE32+ executable for MS Windows 6.00 (DLL) x86-64 7 sections"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp]- [targetUID: 00000000-00004792]
"is-F54G98LCMX.tmp" has type "InnoSetup messages version 6.0.0 261 messages (UTF-16) Cancel installation"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-F54G98LCMX.tmp]- [targetUID: 00000000-00004792]
"is-BJKFJATABB.tmp" has type "ASCII text with CRLF line terminators"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-BJKFJATABB.tmp]- [targetUID: 00000000-00004792]
"_setup64.tmp" has type "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections"- Location: [%TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp]- [targetUID: 00000000-00004792]
"is-TI156WG2Y2.tmp" has type "InnoSetup Log 64-bit CPUID HWMonitor version 0x418 4783 bytes DESKTOP-D\TepHoBHuK C:\Program Files\CPUID\HWMonitor\376\377\3"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-TI156WG2Y2.tmp]- [targetUID: 00000000-00004792]
"unins000.dat" has type "InnoSetup Log 64-bit HWiNFO Monitor {8F12FE46-4F7A-43AB-93D5-012BBED69B1A} version 0x41e 3331 bytes hK2lOvH86\lwEaUAK\3 C:\Program Files\CPUID\HWiNFO\376\377\377\"- Location: [%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat]- [targetUID: 00000000-00004792] - source
- Binary File
- relevance
- 3/10
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops temp files
- details
-
"is-96Q5IE2WSZ.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp]
"HWiNFO_Monitor_Setup.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections" - Location: [%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp]
"is-DZZ74NCPUI.tmp" has type "PE32+ executable for MS Windows 5.02 (GUI) x86-64 5 sections" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp]
"is-FNEYTLL0RX.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 10 sections" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp]
"is-6A6AUP6767.tmp" has type "PE32+ executable for MS Windows 6.00 (DLL) x86-64 7 sections" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp]
"is-F54G98LCMX.tmp" has type "InnoSetup messages version 6.0.0 261 messages (UTF-16) Cancel installation" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-F54G98LCMX.tmp]
"is-BJKFJATABB.tmp" has type "ASCII text with CRLF line terminators" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-BJKFJATABB.tmp]
"_setup64.tmp" has type "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections" - Location: [%TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp]
"is-TI156WG2Y2.tmp" has type "InnoSetup Log 64-bit CPUID HWMonitor version 0x418 4783 bytes DESKTOP-D\TepHoBHuK %PROGRAMFILES%\CPUID\HWMonitor\376\377\3" - Location: [%PROGRAMFILES%\CPUID\HWiNFO\is-TI156WG2Y2.tmp] - source
- Binary File
- relevance
- 1/10
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens registry keys
- details
-
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CODEPAGE"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER\SEGMENT HEAP"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\MICROSOFT\WOW64\X86"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\STATESEPARATION\REDIRECTIONMAP\KEYS"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SAFEBOOT\OPTION"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SRP\GP\DLL"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKCU\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "OPEN"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\FILESYSTEM"; Key: ""; Value: "") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries basic information of the specified process
- details
- "HWiNFO_Monitor_Setup.exe" queries basic process information of the "C:\HWiNFO_Monitor_Setup.exe" (UID: 1392)
- source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries registry keys
- details
-
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CODEPAGE"; Key: "ACP"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\CODEPAGE"; Key: "OEMCP"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER"; Key: "RAISEEXCEPTIONONPOSSIBLEDEADLOCK"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\SESSION MANAGER"; Key: "RESOURCEPOLICIES"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "57A6ED1A-79F7-5011-B242-4784E5620CF7"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WOW64\X86"; Key: "HWINFO_MONITOR_SETUP.EXE"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WOW64\X86"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "3C74AFB9-8D82-44E3-B52C-365DBF48382A"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "B749553B-D950-5E03-6282-3145A61B1002"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "05F95EFE-7F75-49C7-A994-60A55CC09571"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SOFTWARE\POLICIES\MICROSOFT\WINDOWS\SAFER\CODEIDENTIFIERS"; Key: "TRANSPARENTENABLED"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\FILESYSTEM"; Key: "LONGPATHSENABLED"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\SORTING\VERSIONS"; Key: ""; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\SORTING\VERSIONS"; Key: "000604XX"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "CA967C75-04BF-40B5-9A16-98B5F9332A92"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "B6FD710B-F783-4B1C-AB9C-C68099DCC0C7"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "BF30465B-E93C-46FD-9CDF-F41C8904A01F"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "C1376338-0984-48B8-B933-9C7D779FD84D"; Value: "")
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\WMI\SECURITY"; Key: "F25BCD2E-2690-55DC-3BC4-07B65B1B41C9"; Value: "") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1012 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads files
- details
- "HWiNFO_Monitor_Setup.exe" reads file "c:\hwinfo_monitor_setup.exe"
- source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Shows ability to use execution guardrails
- details
-
The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains a Wine emulator-related string
Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)
Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)
Matched sigs: Able to identify virtual environment by using user activity (API string)
Matched sigs: Able to detect virtual machine (string)
Matched sigs: Able to identify sandbox environment running process
Matched sigs: Queries process mitigation policy via NtQueryInformationProcess
Matched sigs: Attempts to call APIs commonly associated with anti-analysis and evasion techniques
Matched sigs: Observed a high volume of repeated registry API calls (API Hammering) - source
- Indicator Combinations
- relevance
- 1/10
- ATT&CK ID
- T1480 (Show technique in the MITRE ATT&CK™ matrix)
-
Touches files
- details
-
"HWiNFO_Monitor_Setup.exe" trying to touch file "%WINDIR%\SysWOW64\imm32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\ole32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\Temp\VxSSL32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\fltLib.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\cryptsp.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\netapi32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\winhttp.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\SysWOW64\mpr.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\windows\temp\VxOle32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\Windows\Temp\VxOle32.dll"
"HWiNFO_Monitor_Setup.exe" trying to touch file "C:\WINDOWS\system32\netapi32.DLL" - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Touches files in program files directory
- details
-
"HWiNFO_Monitor_Setup.tmp" touched file "%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-6A6AUP6767.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-DZZ74NCPUI.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-BJKFJATABB.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-TI156WG2Y2.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-FNEYTLL0RX.tmp"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Program Files\CPUID\HWiNFO\is-F54G98LCMX.tmp" - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Touches files in the Windows directory
- details
-
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Explorer"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Caches"
"HWiNFO_Monitor_Setup.tmp" touched file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" touched file "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" touched file "%LOCALAPPDATA%\Microsoft\Windows\Explorer"
"HWiNFO_Monitor_Setup.tmp" touched file "%LOCALAPPDATA%\Microsoft\Windows\Caches"
"HWiNFO_Monitor_Setup.tmp" touched file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" touched file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.lnk" - source
- API Call
- relevance
- 7/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Tries to access LNK files (Windows shortcut)
- details
-
"HWiNFO_Monitor_Setup.tmp" trying to access LNK file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" trying to access LNK file "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" trying to access LNK file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk"
"HWiNFO_Monitor_Setup.tmp" trying to access LNK file "%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\Удалить HWiNFO Monitor.lnk" - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Tries to access non-existent files (executable)
- details
-
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\WINDOWS\system32\rpcss.dll"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID\HWiNFO\CRYPTBASE.dll"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID\HWiNFO\HWMonitor.exe"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID\HWiNFO\HWiNFO.exe" - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Tries to access non-existent files (non-executable)
- details
-
"HWiNFO_Monitor_Setup.exe" trying to access non-existent file "%TEMP%\is-V1X3KIG9SZ.tmp"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SysWOW64\en-US\tzres.dll.mui"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SysWOW64\en-US\KERNELBASE.dll.mui"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SysWOW64\en-US\netmsg.dll.mui"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Users\%USERNAME%\AppData\Local\Temp\is-1JFN0P1ZCP.tmp"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Users\%USERNAME%\AppData\Local\Temp\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp.Local\"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SysWOW64\uxtheme.dll.Config"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Explorer\IconCacheToDelete"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SysWOW64\en-US\imageres.dll.mui"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\SystemResources\USER32.dll.mun"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Windows\WinSxS\FileMaps\program_files_cpuid_hwinfo_e2a2a1e6add8f4d7.cdf-ms"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "\SystemRoot\WinSxS\FileMaps\program_files_cpuid_hwinfo_e2a2a1e6add8f4d7.cdf-ms"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp"
"HWiNFO_Monitor_Setup.tmp" trying to access non-existent file "C:\Program Files\CPUID\HWiNFO\is-6A6AUP6767.tmp" - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes files
- details
-
"HWiNFO_Monitor_Setup.exe" writes file "%TEMP%\is-v1x3kig9sz.tmp\hwinfo_monitor_setup.tmp"
"HWiNFO_Monitor_Setup.exe" writes file "%temp%\is-v1x3kig9sz.tmp\hwinfo_monitor_setup.tmp"
"HWiNFO_Monitor_Setup.tmp" writes file "C:\Users\%USERNAME%\appdata\local\temp\is-1jfn0p1zcp.tmp\_isetup\_setup64.tmp"
"HWiNFO_Monitor_Setup.tmp" writes file "c:\program files\cpuid\hwinfo\is-96q5ie2wsz.tmp" - source
- API Call
- relevance
- 1/10
-
Writes log files
- details
-
"HWiNFO_Monitor_Setup.tmp" writes a file "%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat"
"HWiNFO_Monitor_Setup.tmp" writes a file "%PROGRAMFILES%\CPUID\HWiNFO\unins000.dat" - source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1074.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Attempts to launch the Installer package binary
-
Network Related
-
Able to access Windows networking-related API (String)
- details
-
Found reference to API "WNetEnumResourceW" (Indicator: "WNetEnumResource"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetGetUniversalNameW" (Indicator: "WNetGetUniversalName"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetGetConnectionW" (Indicator: "WNetGetConnection"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetCloseEnum" (Indicator: "WNetCloseEnum"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetOpenEnumW" (Indicator: "WNetOpenEnum"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1135 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to enumerate network resources (API string)
- details
-
Found reference to API "WNetEnumResourceW" (Indicator: "NetEnumResource"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetGetConnectionW" (Indicator: "NetGetConnection"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "WNetCloseEnum" (Indicator: "NetCloseEnum"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1049 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to query information about shared network resources (API string)
- details
- Found reference to API "EnumPrintersW" (Indicator: "EnumPrinters"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
- source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1135 (Show technique in the MITRE ATT&CK™ matrix)
-
Found mail related domain names
- details
- Observed email domain:"%programfiles%\cpuid\hwinfo\is-f54g98lcmx.tmp" [Source: 00000000-00004792-00000C57-2962609903]
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1071.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Found potential URL in binary/memory
- details
-
Pattern match: "https://jrsoftware.org/ishelp/index.php?topic=setupcmdline"
Pattern match: "https://www.cpuid.com/softwares/hwmonitor.htmlcpuid"
Pattern match: "https://www.cpuid.com"
Heuristic match: "font.name"
Pattern match: "http://schemas.microsoft.com/smi/2005/windowssettings"
Pattern match: "crl.comodoca.com/aaacertificateservices.crl04"
Pattern match: "http://ocsp.comodoca.com0"
Pattern match: "http://crl.sectigo.com/sectigopubliccodesigningrootr46.crl0"
Pattern match: "http://crt.sectigo.com/sectigopubliccodesigningrootr46.p7c0#"
Pattern match: "http://ocsp.sectigo.com0"
Pattern match: "https://sectigo.com/cps0"
Pattern match: "http://crl.sectigo.com/sectigopubliccodesigningcaevr36.crl0"
Pattern match: "http://crt.sectigo.com/sectigopubliccodesigningcaevr36.crt0#"
Pattern match: "http://ocsp.sectigo.com0d"
Pattern match: "crl.sectigo.com/sectigopublictimestampingcar36.crl0z"
Pattern match: "crt.sectigo.com/sectigopublictimestampingcar36.crt0#" - source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1071 (Show technique in the MITRE ATT&CK™ matrix)
-
Possibly tries to communicate over SSL connection (HTTPS)
- details
- Found HTTPS url "https://jrsoftware.org"
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1573 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to access Windows networking-related API (String)
-
Pattern Matching
-
YARA signature match - Anti Debugging Used
- details
- YARA signature matched on Anti Debugging used in file "is-DZZ74NCPUI.tmp"
- source
- YARA Signature
- relevance
- 2/10
- ATT&CK ID
- T1622 (Show technique in the MITRE ATT&CK™ matrix)
-
YARA signature match - PE executable embedded in .rsrc section
- details
- YARA signature for embedded PE executable in .rsrc section matched on file "is-DZZ74NCPUI.tmp"
- source
- YARA Signature
- relevance
- 5/10
- ATT&CK ID
- T1027.009 (Show technique in the MITRE ATT&CK™ matrix)
-
YARA signature match – Embedded PE executable
- details
- YARA signature matched on embedded PE in file "is-DZZ74NCPUI.tmp"
- source
- YARA Signature
- relevance
- 2/10
- ATT&CK ID
- T1027.009 (Show technique in the MITRE ATT&CK™ matrix)
-
YARA signature match - Anti Debugging Used
-
Spyware/Information Retrieval
-
Able to capture screen (API string)
- details
-
Found reference to API "GetDC" (Indicator: "GetDC"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "GetWindowDC" (Indicator: "GetWindowDC"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1113 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to discover operating system information (API string)
- details
- Found reference to API "5720624326,8160,3024,,RtlGetVersion,NTDLL.dll,"01:06:04.656",RX=0,PX=0" (Indicator: "RtlGetVersion"; Source: "00000000-00004792.00000000.253882.013ED000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Attempts to read volume data via DOS device path
- details
- "HWiNFO_Monitor_Setup.tmp" tries to directly access volume data "Z:"
- source
- API Call
- relevance
- 1/10
- ATT&CK ID
- T1006 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used for searching a directory for files
- details
-
"HWiNFO_Monitor_Setup.exe" called "FindFirstFileW" with parameter C:\HWiNFO_Monitor_Setup.en-US (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "FindFirstFileW" with parameter C:\HWiNFO_Monitor_Setup.en (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "FindFirstFileW" with parameter C:\HWiNFO_Monitor_Setup.ENU (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.exe" called "FindFirstFileW" with parameter C:\HWiNFO_Monitor_Setup.EN (UID: 00000000-00001392)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.en-US (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.en (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.ENU (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.EN (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\unins???.* (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\unins000.dat (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %PROGRAMFILES%\CPUID\HWiNFO\unins000.exe (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp\* (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindNextFileW" with parameter .. (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindNextFileW" with parameter _isetup (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindFirstFileW" with parameter %TEMP%\is-1JFN0P1ZCP.tmp\_isetup\* (UID: 00000000-00004792)
"HWiNFO_Monitor_Setup.tmp" called "FindNextFileW" with parameter _setup64.tmp (UID: 00000000-00004792) - source
- API Call
- relevance
- 5/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used for taking snapshot of the specified processes
- details
-
"HWiNFO_Monitor_Setup.exe" called "CreateToolhelp32Snapshot" with parameters {"dwFlags": "4"
"th32ProcessID": "0"}
"HWiNFO_Monitor_Setup.tmp" called "CreateToolhelp32Snapshot" with parameters {"dwFlags": "4"
"th32ProcessID": "0"} - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1057 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to retrieve computer name
- details
- "HWiNFO_Monitor_Setup.tmp" called "GetComputerNameW" (UID: 00000000-00004792)
- source
- API Call
- relevance
- 2/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to retrieve information about the current system
- details
-
"HWiNFO_Monitor_Setup.exe" called "GetNativeSystemInfo" with parameters {"lpSystemInfo": "090000000010000000000100fffffeff0300000002000000d8210000000001000600004f"}
"HWiNFO_Monitor_Setup.tmp" called "GetNativeSystemInfo" with parameters {"lpSystemInfo": "090000000010000000000100fffffeff0300000002000000d8210000000001000600004f"} - source
- API Call
- relevance
- 3/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Calls an API typically used to retrieve user name
- details
- "HWiNFO_Monitor_Setup.tmp" called "GetUserNameW" (UID: 00000000-00004792)
- source
- API Call
- relevance
- 2/10
- ATT&CK ID
- T1033 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains CRYPTO related strings
- details
-
Found string "TChaCha20Ctx@" (Indicator: "chacha"; File: "HWiNFO_Monitor_Setup.exe")
Found string "TChaCha20Context" (Indicator: "chacha"; File: "HWiNFO_Monitor_Setup.exe")
Found string "D:\Coding\Is\issrc-build\Components\ChaCha20.pas" (Indicator: "chacha"; File: "HWiNFO_Monitor_Setup.exe")
Found string "AShared.EncryptionFunc" (Indicator: ".encrypt"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found string "ChaCha20" (Indicator: "chacha"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found string "kECDSA" (Indicator: "ecdsa"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1027 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to enumerate system network resources (API string)
- details
- Found reference to API "WNetOpenEnumW" (Indicator: "WNetOpenEnum"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1135 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to read files (API string)
- details
- Found reference to API "ReadFile" (Indicator: "ReadFile"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
- source
- File/Memory
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve file and directory information (API string)
- details
-
Found reference to API "GetTempDir: GetTempPath failed (%u, %u)" (Indicator: "GetTempPath"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API "GetCurrentDirectory" (Indicator: "GetCurrentDirectory"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API "GetSystemDirectoryW" (Indicator: "GetSystemDirectory"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve files based on search patterns
- details
-
Found string "Where should [name] be installed?" (Indicator: "where "; Source: "00000000-00004792.00000000.253882.012EE000.00000004.mdmp")
Found string "Where should Setup place the program's shortcuts?" (Indicator: "where "; Source: "00000000-00004792.00000000.253882.012EE000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1083 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve the specified system metric or system configuration setting (API string)
- details
-
Found reference to API "GetSystemMetricsForDpi" (Indicator: "GetSystemMetrics"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
Found reference to API "10372453688,8160,111,,GetSystemMetrics,user32.dll,"01:06:06.593",RX=0,PX=0" (Indicator: "GetSystemMetrics"; Source: "00000000-00004792.00000000.253882.01407000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1082 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve the time elapsed since the system was started (API string)
- details
- Found reference to API "GetTickCount64" (Indicator: "GetTickCount"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1497.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to retrieve token privileges information (API string)
- details
- Found reference to API "CheckTokenMembership" (Indicator: "CheckTokenMembership"; File: "HWiNFO_Monitor_Setup.exe")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1134 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains string like password/secret
- details
-
file/memory contains long string with (Indicator: "password"; File: "HWiNFO_Monitor_Setup.exe")
Found string "Please specify the password using the /PASSWORD= command line parameter." (Indicator: "password"; File: "HWiNFO_Monitor_Setup.exe")
Found string "The password you specified is not correct. Please try again." (Indicator: "password"; File: "HWiNFO_Monitor_Setup.exe")
Found string "Scheme "%s" is not registered$Credential without user and password+Platform-dependant function not implemented)Scheme-dependant function not implemented" (Indicator: "password"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found string "The password you entered is not correct. Please try again." (Indicator: "password"; Source: "00000000-00004792.00000000.253882.012EE000.00000004.mdmp")
Found string "This installation is password protected." (Indicator: "password"; Source: "00000000-00004792.00000000.253882.012EE000.00000004.mdmp")
Found string "Please provide the password, then click Next to continue. Passwords are case-sensitive." (Indicator: "password"; Source: "00000000-00004792.00000000.253882.012EE000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1555 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to capture screen (API string)
-
System Security
-
Able to delete registry key/value (API string)
- details
- Found registry deletion API: "RegDeleteKeyExW" in "00000000-00004792.00000000.253882.00E89000.00000004.mdmp"
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1112 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to access device drivers
- details
-
Found string "\Device\HarddiskVolume3\Users\%OSUSER%\AppData\Local\Temp\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp" (Indicator: "\Device\"; Source: "00000000-00001392-00000BC0-2958373228")
Found string "DriverData=%WINDIR%\System32\Drivers\DriverData" (Indicator: "\drivers\"; Source: "00000000-00004792.00000000.253882.01380000.00000004.mdmp, 00000000-00004792.00000000.253882.013BC000.00000004.mdmp, 00000000-00004792.00000000.253882.019B0000.00000004.mdmp")
Found string "DriverData=C:\Windows\System32\Drivers\DriverData" (Indicator: "system32\drivers"; Source: "00000000-00004792.00000000.253882.01380000.00000004.mdmp, 00000000-00004792.00000000.253882.013BC000.00000004.mdmp, 00000000-00004792.00000000.253882.019B0000.00000004.mdmp")
Found string ":\WINDOWS\system32\DriverStore\FileRepository" (Indicator: "system32\drivers"; Source: "00000000-00004792.00000000.253882.01380000.00000004.mdmp")
Found string ":\WINDOWS\system32\DRIVERS" (Indicator: "system32\drivers"; Source: "00000000-00004792.00000000.253882.013BC000.00000004.mdmp")
Found string "e3\DosDevices\C:\??\Volume{44294f7c-6083-41c6-8176-3c202d755616}" (Indicator: "\DosDevices\"; Source: "00000000-00004792.00000000.253882.01407000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1543.003 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to hook/unhook windows functions (API string)
- details
-
Found reference to API "UnhookWindowsHookEx" (Indicator: "UnhookWindowsHook"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
Found reference to API "CallNextHookEx" (Indicator: "CallNextHook"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1056.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to modify access token privileges (API string)
- details
-
Found reference to API "CheckTokenMembership" (Indicator: "CheckTokenMembership"; File: "HWiNFO_Monitor_Setup.exe")
Found reference to API "SeShutdownPrivilege" (Indicator: "SeShutdownPrivilege"; File: "HWiNFO_Monitor_Setup.exe") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1134 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to modify the user configuration/privilege (API string)
- details
- Found reference to API "SystemParametersInfoForDpi" (Indicator: "SystemParametersInfo"; Source: "00000000-00004792.00000000.253882.00E89000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1098 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to obtains specified information about the security of a file or directory (API string)
- details
-
Found reference to API "FreeSid" (Indicator: "FreeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API "SetEntriesInAclW" (Indicator: "SetEntriesInAcl"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API "AllocateAndInitializeSid" (Indicator: "AllocateAndInitializeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
Found reference to API "AllocateAndInitializeSid" (Indicator: "InitializeSid"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp") - source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1134.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to terminate a process (API string)
- details
- Found reference to API "ExitProcess" (Indicator: "ExitProcess"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1489 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to write files (API string)
- details
- Found reference to API "WriteFile" (Indicator: "WriteFile"; Source: "00000000-00004792.00000000.253882.00E8C000.00000002.mdmp")
- source
- File/Memory
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Opens the Kernel Security Device Driver (KsecDD) of Windows
- details
-
"HWiNFO_Monitor_Setup.exe" opened "\Device\KsecDD"
"HWiNFO_Monitor_Setup.tmp" opened "\Device\KsecDD" - source
- API Call
- relevance
- 10/10
- ATT&CK ID
- T1068 (Show technique in the MITRE ATT&CK™ matrix)
-
Queries services related registry keys
- details
-
"HWiNFO_Monitor_Setup.exe" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\SERVICES\BAM\STATE\USERSETTINGS\S-1-5-21-1271187874-1938232448-3812392235-1001"; Key: "\DEVICE\HARDDISKVOLUME3\USERS\HAPUBWS\APPDATA\LOCAL\TEMP\IS-V1X3KIG9SZ.TMP\HWINFO_MONITOR_SETUP.TMP"; Value: "")
"HWiNFO_Monitor_Setup.tmp" (Access type: "QUERYVAL"; Path: "HKLM\SYSTEM\CONTROLSET001\SERVICES\LANMANWORKSTATION\PARAMETERS"; Key: "RPCCACHETIMEOUT"; Value: "") - source
- Registry Access
- relevance
- 1/10
- ATT&CK ID
- T1007 (Show technique in the MITRE ATT&CK™ matrix)
-
References device drivers used by rootkit malware
- details
- Found string "e3\DosDevices\C:\??\Volume{44294f7c-6083-41c6-8176-3c202d755616}" (Indicator: "\DosDevices\c:"; Source: "00000000-00004792.00000000.253882.01407000.00000004.mdmp")
- source
- File/Memory
- relevance
- 1/10
- ATT&CK ID
- T1014 (Show technique in the MITRE ATT&CK™ matrix)
-
Writes registry keys
- details
-
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "OWNER"; Value: "B8120000780E9F2C77C9DC0100")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "SESSIONHASH"; Value: "E8BAEA20A7118F45F93D5A2C1346E4A92125AFF206DAB3694E8B240906DBDD5300")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "SEQUENCE"; Value: "0100000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "REGFILES0000"; Value: "%PROGRAMFILES%\CPUID\HWiNFO\CRYPTBASE.dll")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKCU\SOFTWARE\MICROSOFT\RESTARTMANAGER\SESSION0000"; Key: "REGFILESHASH"; Value: "A21397A4B68B1D9B2A13B14D92195CEA1B5FA56F2D4692067BA9E17E1F18EC8000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: SETUP VERSION"; Value: "6.7.1")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: APP PATH"; Value: "%PROGRAMFILES%\CPUID\HWiNFO")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INSTALLLOCATION"; Value: "%PROGRAMFILES%\CPUID\HWiNFO\")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: ICON GROUP"; Value: "CPUID\HWiNFO")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: USER"; Value: "lwEaUAK")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: SELECTED TASKS"; Value: "000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: DESELECTED TASKS"; Value: "desktopicon")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INNO SETUP: LANGUAGE"; Value: "russian")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "DISPLAYNAME"; Value: "HWiNFO Monitor,")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "DISPLAYICON"; Value: "%PROGRAMFILES%\CPUID\HWiNFO\HWiNFO.exe")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "UNINSTALLSTRING"; Value: ""%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe"")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "QUIETUNINSTALLSTRING"; Value: ""%PROGRAMFILES%\CPUID\HWiNFO\unins000.exe" /SILENT")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "DISPLAYVERSION"; Value: "1.63")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "PUBLISHER"; Value: "CPUID")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "URLINFOABOUT"; Value: "https://www.cpuid.com")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "HELPLINK"; Value: "https://www.cpuid.com")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "URLUPDATEINFO"; Value: "https://www.cpuid.com")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "NOMODIFY"; Value: "0100000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "NOREPAIR"; Value: "0100000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "INSTALLDATE"; Value: "20260410")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "MAJORVERSION"; Value: "0100000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "MINORVERSION"; Value: "3F00000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "VERSIONMAJOR"; Value: "0100000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "VERSIONMINOR"; Value: "3F00000000")
"HWiNFO_Monitor_Setup.tmp" (Access type: "SETVAL"; Path: "HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{8F12FE46-4F7A-43AB-93D5-012BBED69B1A}_IS1"; Key: "ESTIMATEDSIZE"; Value: "0933000000") - source
- Registry Access
- relevance
- 3/10
- ATT&CK ID
- T1112 (Show technique in the MITRE ATT&CK™ matrix)
-
Able to delete registry key/value (API string)
-
Unusual Characteristics
-
Contains ability to reboot/shutdown the operating system (API string)
- details
- Found reference to API "ExitWindowsEx" (Indicator: "ExitWindows"; Source: "00000000-00004792.00000000.253882.00E82000.00000004.mdmp")
- source
- File/Memory
- relevance
- 3/10
- ATT&CK ID
- T1529 (Show technique in the MITRE ATT&CK™ matrix)
-
Drops executable files inside temp directory
- details
-
"HWiNFO_Monitor_Setup.tmp" has type "PE32 executable for MS Windows 6.01 (GUI) Intel i386 11 sections"- Location: [%TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp]- [targetUID: 00000000-00001392]
"_setup64.tmp" has type "PE32+ executable for MS Windows 5.02 (console) x86-64 5 sections"- Location: [%TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp]- [targetUID: 00000000-00004792] - source
- Binary File
- relevance
- 3/10
- ATT&CK ID
- T1105 (Show technique in the MITRE ATT&CK™ matrix)
-
Input file contains API references not part of its Import Address Table (IAT)
- details
-
Found string "GetLogicalProcessorInformation" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "GetThreadPreferredUILanguages" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "SetThreadPreferredUILanguages" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "GetThreadUILanguage" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "GetLongPathNameW" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "SetEvent" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "ResetEvent" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: KERNELBASE.DLL)
Found string "VariantChangeTypeEx" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarNeg" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarNot" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarAdd" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarSub" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarMul" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarDiv" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarIdiv" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarMod" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarAnd" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarOr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarXor" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarCmp" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarI4FromStr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarR4FromStr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarR8FromStr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarDateFromStr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL)
Found string "VarCyFromStr" (Source: HWiNFO_Monitor_Setup.exe, API is part of module: OLEAUT32.DLL) - source
- File/Memory
- relevance
- 10/10
- ATT&CK ID
- T1106 (Show technique in the MITRE ATT&CK™ matrix)
-
Reads the windows installation language
- details
-
"HWiNFO_Monitor_Setup.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\LANGUAGE"; Key: "INSTALLLANGUAGEFALLBACK")
"HWiNFO_Monitor_Setup.tmp" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\LANGUAGE"; Key: "INSTALLLANGUAGEFALLBACK") - source
- Registry Access
- relevance
- 2/10
- ATT&CK ID
- T1614.001 (Show technique in the MITRE ATT&CK™ matrix)
-
Contains ability to reboot/shutdown the operating system (API string)
File Details
HWiNFO_Monitor_Setup.exe
- Filename
- HWiNFO_Monitor_Setup.exe
- Size
- 4MiB (4233610 bytes)
- Type
- compressed innosetup
- Description
- PE32 executable for MS Windows 6.01 (GUI), Intel i386, 11 sections
- Architecture
- WINDOWS
- SHA256
- eefc0f986dd3ea376a4a54f80ce0dc3e6491165aefdd7d5d6005da3892ce248f
- MD5
- cdc459a866361463d719bc89622300f3
- SHA1
- 02a53d660332c25af623bbb7df57c2aad1b0b91b
- ssdeep
-
49152:VuI2hj6XF18ahT8kRdwIcwcBQSuBP9HqT9LnTiHejJkT6Dt7ON9Vnc:V5Oj6JR8kRdwIHcBIHqxLnmMBJ+c
Resources
- Icon
-
Classification (TrID)
- 46.7% (.EXE) Inno Setup installer
- 25.0% (.CPL) Windows Control Panel Item (generic)
- 18.1% (.EXE) Win32 EXE PECompact compressed (generic)
- 4.5% (.EXE) Win64 Executable (generic)
- 1.9% (.EXE) Win32 Executable (generic)
Screenshots
Hybrid Analysis
Tip: Click an analysed process below to view more details.
Analysed 2 processes in total (System Resource Monitor).
-
HWiNFO_Monitor_Setup.exe /SILENT (PID: 1392) 9/26
-
HWiNFO_Monitor_Setup.tmp /SL5="$10034C,3034253,905728,C:\HWiNFO_Monitor_Setup.exe" /SILENT (PID: 4792) Hash Seen Before
-
Network Analysis
DNS Requests
No relevant DNS requests were made.
Contacted Hosts
No relevant hosts were contacted.
HTTP Traffic
No relevant HTTP requests were made.
Extracted Strings
Extracted Files
-
Malicious 1
-
-
is-6A6AUP6767.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-6A6AUP6767.tmp
- Size
- 2.1MiB (2179584 bytes)
- Type
- pedll 64bits executable
- Description
- PE32+ executable for MS Windows 6.00 (DLL), x86-64, 7 sections
- AV Scan Result
- Labeled as "Gen:Variant.Tedy" (6/27)
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
8b76280eaa6f34b3d3fc55e14f676314
- SHA1
-
c65e515b9c9655c651c939b94574cf39b40a8be2
- SHA256
-
776446faf98a68f6ebc36e800455645cf04197edd4c249c6b2fe178c86b18652
-
-
Clean 4
-
-
HWiNFO Monitor.lnk
- Filepath
- %ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\CPUID\HWiNFO\HWiNFO Monitor.lnk
- Size
- 1.5KiB (1541 bytes)
- Type
- lnk
- Description
- MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Icon number=0, Unicoded, HasExpIcon "%SystemDrive%\Program Files\CPUID\HWiNFO\HWiNFO.exe", length=0, window=normal, IDListSize 0x019b, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\"
- AV Scan Result
- 0/27
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
fbfdd262cc8c41ad0e98e56ba908a7ef
- SHA1
-
e8e85386bdf1ce70f9f2c47b36bd157531bd548d
- SHA256
-
0f7980d4f585cb2f2d7a8e8e7341cb4204f33559d7b5c2e392d14e52cde2c99d
-
is-DZZ74NCPUI.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-DZZ74NCPUI.tmp
- Size
- 3.4MiB (3617000 bytes)
- Type
- peexe 64bits executable
- Description
- PE32+ executable for MS Windows 5.02 (GUI), x86-64, 5 sections
- AV Scan Result
- 0/26
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- Additional info
- YARA signature match
- MD5
-
5ac249f46a574a7dcfe900d42d4af4c5
- SHA1
-
99cea1a086edb6e7881d349d1e43483cf91ac744
- SHA256
-
02db6764d1f13b837b0a525e5931bdbc67e7a2a4d071e849c7e087255d4a2d5b
-
_setup64.tmp
- Filepath
- %TEMP%\is-1JFN0P1ZCP.tmp\_isetup\_setup64.tmp
- Size
- 6KiB (6144 bytes)
- Type
- peexe 64bits executable
- Description
- PE32+ executable for MS Windows 5.02 (console), x86-64, 5 sections
- AV Scan Result
- 0/26
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
e4211d6d009757c078a9fac7ff4f03d4
- SHA1
-
019cd56ba687d39d12d4b13991c9a42ea6ba03da
- SHA256
-
388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
-
#U0423#U0434#U0430#U043b#U0438#U0442#U044c HWiNFO Monitor.lnk
- Size
- 971B (971 bytes)
- Type
- lnk
- Description
- MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Unicoded, MachineID hk2lovh86kohwgg, Archive, ctime=Sat Apr 11 05:54:00 2026, atime=Sat Apr 11 05:55:00 2026, mtime=Wed Apr 8 15:11:14 2026, length=3130088, window=normal, IDListSize 0x01c5, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\", LocalBasePath "C:\Program Files\CPUID\HWiNFO\unins000.exe"
- AV Scan Result
- 0/26
- MD5
-
fa28133179acb2b8dd843055994759cd
- SHA1
-
b0778f2b63dec4bcc76675ab945172644c73bde5
- SHA256
-
d34a3629b9c92402bcefe17ee8bb3a224549efe491a944be93579348902db0c9
-
-
Informative 7
-
-
is-96Q5IE2WSZ.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-96Q5IE2WSZ.tmp
- Size
- 4.2MiB (4433318 bytes)
- Type
- compressed innosetup
- Description
- PE32 executable for MS Windows 6.01 (GUI), Intel i386, 11 sections
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
176e0d21114ab4cb4dda16d15071d7c0
- SHA1
-
d1d104e422dca4cd5f1e5a91011c8f8b6edcaf41
- SHA256
-
5e9b42e797477b04e2cd2c17de7a43830378a5813c486beba29edb655c898a62
-
is-BJKFJATABB.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-BJKFJATABB.tmp
- Size
- 17KiB (17012 bytes)
- Type
- text
- Description
- ASCII text, with CRLF line terminators
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
57263245bde230461ce6417b8d874070
- SHA1
-
58eded76d3214878e3a40c8048abe35073804cc0
- SHA256
-
8a0887b83b26fb3d2e1ac07f3f42ccfc7478b7970063e741e3551ffbbfc28058
-
is-F54G98LCMX.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-F54G98LCMX.tmp
- Size
- 24KiB (24097 bytes)
- Type
- unknown
- Description
- InnoSetup messages, version 6.0.0, 261 messages (UTF-16), Cancel installation
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
313d0cc5d1a64d2565e35937991775a6
- SHA1
-
b8acb11878c485865c9e4679248e53b83a8f3ad4
- SHA256
-
5ed0233c0922e9f20307315e24b4f33c3d56ab9f42b2f75ae91e7a27fd313b66
-
is-FNEYTLL0RX.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-FNEYTLL0RX.tmp
- Size
- 3MiB (3130088 bytes)
- Type
- compressed innosetup
- Description
- PE32 executable for MS Windows 6.01 (GUI), Intel i386, 10 sections
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
1c2db2b8528275cc5599ff19689fb2cf
- SHA1
-
e32676e4701e3aad08e169be68abc39f31a9ac7a
- SHA256
-
6270005159ce90cc83e321975520045fc019aeaa71cca0e2014ee366d99b3b29
-
is-TI156WG2Y2.tmp
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\is-TI156WG2Y2.tmp
- Size
- 4.7KiB (4783 bytes)
- Type
- unknown
- Description
- InnoSetup Log 64-bit CPUID HWMonitor, version 0x418, 4783 bytes, DESKTOP-D\TepHoBHuK, C:\Program Files\CPUID\HWMonitor\376\377\3
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
74f01f74056b6a152312ec81f33dc45f
- SHA1
-
e8c3190077944b4208d8eaaf9b2e96826d3246cd
- SHA256
-
b605f053be8aaf4702b57f6bcad179d5f870aa725174ae11865e9550da17bfe4
-
unins000.dat
- Filepath
- %PROGRAMFILES%\CPUID\HWiNFO\unins000.dat
- Size
- 3.3KiB (3331 bytes)
- Type
- unknown
- Description
- InnoSetup Log 64-bit HWiNFO Monitor {8F12FE46-4F7A-43AB-93D5-012BBED69B1A}, version 0x41e, 3331 bytes, hK2lOvH86\lwEaUAK\3, C:\Program Files\CPUID\HWiNFO\376\377\377\
- Runtime Process
- HWiNFO_Monitor_Setup.tmp (PID: 4792)
- MD5
-
440ffc9405d8bd5a4bfe89e2b27ce6cf
- SHA1
-
d452c5135512b304036e0ffb355556fc8dc8c535
- SHA256
-
f6b94d0a097f7f714eb3e3c6a0d9ce144f9440959852984e4103dc8396738a49
-
HWiNFO_Monitor_Setup.tmp
- Filepath
- %TEMP%\is-V1X3KIG9SZ.tmp\HWiNFO_Monitor_Setup.tmp
- Size
- 4.2MiB (4406272 bytes)
- Type
- compressed innosetup
- Description
- PE32 executable for MS Windows 6.01 (GUI), Intel i386, 11 sections
- Runtime Process
- HWiNFO_Monitor_Setup.exe (PID: 1392)
- MD5
-
3e447b198f4bf47b6ca383b9318d80a3
- SHA1
-
709826ba81c3d4d04b33cc5d12712776948b4a97
- SHA256
-
6543daa30e7f7f491e0d467bfc312c8c590b1d6cf042b703a3db2af37c77f914
-
Warnings
-
Runtime
- Some low-level data is hidden, as this is only a slim report
- Not all sources for indicator ID "string-64" are available in the report
- Not all sources for indicator ID "api-125" are available in the report
- Not all sources for indicator ID "api-124" are available in the report
- Not all sources for indicator ID "api-147" are available in the report
- Not all sources for indicator ID "api-263" are available in the report
- Not all sources for indicator ID "api-235" are available in the report
- Not all sources for indicator ID "api-297" are available in the report
- Not all sources for indicator ID "api-294" are available in the report
- Not all sources for indicator ID "api-243" are available in the report
- Not all sources for indicator ID "api-161" are available in the report
- Not all sources for indicator ID "api-242" are available in the report
- Not all sources for indicator ID "registry-177" are available in the report
- Not all sources for indicator ID "registry-172" are available in the report
- Not all sources for indicator ID "api-237" are available in the report
- Not all sources for indicator ID "api-105" are available in the report
- Not all sources for indicator ID "api-151" are available in the report
- Not all sources for indicator ID "mutant-0" are available in the report
- Not all sources for indicator ID "registry-215" are available in the report
- Enforcing malicious verdict, as a reliable source indicates high confidence
Anonymous commented 1 day ago