Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
11-09-2020 10:36
Static task
static1
Behavioral task
behavioral1
Sample
14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe
Resource
win10v200722
General
-
Target
14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe
-
Size
14.6MB
-
MD5
18067be70aad9ca5d329663e35ed5cde
-
SHA1
8655fc0484f35513527268f7313334dc2c2d5953
-
SHA256
14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f
-
SHA512
8b071bbe15118e69873a600e2bdb15125f8c6ae1ab133b1951fbbf52b4dddd65734088dd51f84de716f9c2cbb22bcda40c83d129d8594fbb839a3975355277ed
Malware Config
Extracted
metasploit
windows/download_exec
http://39.101.174.221:12358/LWbW
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MALCJS)
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Registers COM server for autorun 1 TTPs
-
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\SETD23A.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETD23A.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\SangforVnic.sys DrvInst.exe -
Executes dropped EXE 35 IoCs
Processes:
TaskServer.exeEasyConnectInstaller_.exeUninstall.exeSangforCSClientInstaller.exeTcpDriverInstaller.exeRemove.exeInstall.exeDnsDriverInstaller.exeRemove.exeInstall.exeSuperExeInstaller.exeSangforServiceClientInstaller.exeVC2010RedistX86UInstaller.exeHTPInstaller.exeSJobberInstaller.exeSangforUpdateInstaller.exeSangforRAppInstaller.exeInstallControl.exeVNICInstaller_X64.exendiscleanup.x64.exevacon.exeSetIPTime.exeComHelperX64.exeComHelperX64.exeECBaseInstaller.exeECAgentInstaller.exeECAgent.exeSuperServiceInstaller.exeSangforPromoteService.exeSangforPromoteService.exeSangforPromoteService.exeECAgent.exeECAgent.exeECAgent.exeECAgent.exepid process 2972 TaskServer.exe 2560 EasyConnectInstaller_.exe 3336 Uninstall.exe 3868 SangforCSClientInstaller.exe 3972 TcpDriverInstaller.exe 1972 Remove.exe 3968 Install.exe 3952 DnsDriverInstaller.exe 1216 Remove.exe 2072 Install.exe 3100 SuperExeInstaller.exe 2100 SangforServiceClientInstaller.exe 984 VC2010RedistX86UInstaller.exe 3392 HTPInstaller.exe 3904 SJobberInstaller.exe 1176 SangforUpdateInstaller.exe 812 SangforRAppInstaller.exe 1172 InstallControl.exe 2808 VNICInstaller_X64.exe 3988 ndiscleanup.x64.exe 3956 vacon.exe 3988 SetIPTime.exe 3880 ComHelperX64.exe 688 ComHelperX64.exe 2708 ECBaseInstaller.exe 2428 ECAgentInstaller.exe 3108 ECAgent.exe 8 SuperServiceInstaller.exe 3964 SangforPromoteService.exe 1308 SangforPromoteService.exe 3172 SangforPromoteService.exe 2784 ECAgent.exe 2752 ECAgent.exe 2412 ECAgent.exe 3880 ECAgent.exe -
Loads dropped DLL 71 IoCs
Processes:
EasyConnectInstaller_.exeSangforCSClientInstaller.exeTcpDriverInstaller.exeDnsDriverInstaller.exeSuperExeInstaller.exeSangforServiceClientInstaller.exeInstallControl.exeVNICInstaller_X64.exeComHelperX64.exeComHelperX64.exeECAgent.exeSangforPromoteService.exeECAgent.exeECAgent.exepid process 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 2560 EasyConnectInstaller_.exe 3868 SangforCSClientInstaller.exe 3868 SangforCSClientInstaller.exe 3972 TcpDriverInstaller.exe 3972 TcpDriverInstaller.exe 3952 DnsDriverInstaller.exe 3100 SuperExeInstaller.exe 2100 SangforServiceClientInstaller.exe 1172 InstallControl.exe 1172 InstallControl.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 2808 VNICInstaller_X64.exe 3880 ComHelperX64.exe 688 ComHelperX64.exe 3108 ECAgent.exe 3108 ECAgent.exe 3108 ECAgent.exe 3108 ECAgent.exe 3108 ECAgent.exe 3172 SangforPromoteService.exe 3172 SangforPromoteService.exe 3172 SangforPromoteService.exe 3172 SangforPromoteService.exe 3172 SangforPromoteService.exe 3172 SangforPromoteService.exe 2784 ECAgent.exe 2784 ECAgent.exe 2784 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
JavaScript code in executable 15 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\TaskServer.exe js C:\Users\Admin\AppData\Local\Temp\TaskServer.exe js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js C:\Program Files (x86)\Sangfor\SSL\ECAgent\SANGFORVPNLIBEAY32.dll js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe js \Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll js -
Drops file in System32 directory 28 IoCs
Processes:
DrvInst.exeSangforCSClientInstaller.exevacon.exeEasyConnectInstaller_.exeVC2010RedistX86UInstaller.exeECAgent.exeDrvInst.exeECAgent.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCEDF.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SangforVnic.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCF0F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SangforVnic.sys DrvInst.exe File created C:\Windows\SysWOW64\SangforVpnSsleay32.dll SangforCSClientInstaller.exe File created C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCEDF.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCEEF.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\sangforvnic.PNF vacon.exe File created C:\Windows\SysWOW64\SangforInstallHelper.dll EasyConnectInstaller_.exe File created C:\Windows\SysWOW64\atl100.dll VC2010RedistX86UInstaller.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\sangforvnic.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Sangfor\SSL\Log\ECAgent_20200911.log ECAgent.exe File created C:\Windows\SysWOW64\mfc100u.dll VC2010RedistX86UInstaller.exe File opened for modification C:\Windows\SysWOW64\msvcp100.dll VC2010RedistX86UInstaller.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCEEF.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\sangforvnic.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\SangforVnic.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\SangforVnic.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{189f60c7-696e-264e-987b-c27d6d5a1a39}\SETCF0F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\sangforvnic.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\SangforInstallHelper.dll EasyConnectInstaller_.exe File created C:\Windows\SysWOW64\SangforVpnLibeay32.dll SangforCSClientInstaller.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Sangfor\SSL\Log\ECAgent_20200911.log ECAgent.exe File created C:\Windows\SysWOW64\mfc100chs.dll VC2010RedistX86UInstaller.exe File opened for modification C:\Windows\SysWOW64\msvcr100.dll VC2010RedistX86UInstaller.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe -
Modifies service 2 TTPs 671 IoCs
Processes:
EasyConnectInstaller_.exesvchost.exeComHelperX64.exeComHelperX64.exevacon.exeDrvInst.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000004\SupportedNameSpace = "15" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LanmanWorkstation\Linkage svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000001\ProviderInfo ComHelperX64.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000002\ProviderId = a2cb4a96bcb2eb408c6aa6db40161cae ComHelperX64.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{03b1ffce-43af-4c7d-8b20-4202fe05efa9}\EnableDHCP = "1" svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{d8a0d563-1c61-4d7a-879d-f714707a865f} svchost.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000012 ComHelperX64.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000002\PackedCatalogItem = 2553797374656d526f6f74255c73797374656d33325c6d7377736f636b2e646c6c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006600020000000000000000000000000008000000a01a0fe78babcf118ca300805f48a192ee0300000100000000000000000000000000000000000000000000000000000000000000020000000200000010000000100000000100000006000000000000000000000000000000000000000000000040002500530079007300740065006d0052006f006f00740025005c00530079007300740065006d00330032005c006d007300770073006f0063006b002e0064006c006c002c002d003600300031003000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000009\ProtocolName = "@%SystemRoot%\\System32\\wshqos.dll,-101" ComHelperX64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000002 EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBT\Parameters\Interfaces\Tcpip_{03b1ffce-43af-4c7d-8b20-4202fe05efa9} svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000007\LibraryPath = "%SystemRoot%\\System32\\winrnr.dll" ComHelperX64.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000004 EasyConnectInstaller_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000005\Version = "0" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LanmanWorkstation\Linkage\Route = 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 svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000003\ProviderId = cd89fe036d767649b9c1bb9bc42c7b4d EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000007\PackedCatalogItem = 2553797374656d526f6f74255c73797374656d33325c6d7377736f636b2e646c6c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006600020000000000000000000000000008000000a01a0fe78babcf118ca300805f48a192ee0300000100000000000000000000000000000000000000000000000000000000000000020000000200000010000000100000000100000006000000000000000000000000000000000000000000000040002500530079007300740065006d0052006f006f00740025005c00530079007300740065006d00330032005c006d007300770073006f0063006b002e0064006c006c002c002d003600300031003000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000008\ProtocolName = "@%SystemRoot%\\System32\\mswsock.dll,-60101" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000008\ProviderId = 7ebda25538bbd211916601a1c9b76901 ComHelperX64.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\NAMESPACE_CATALOG5\00000014 EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000002 ComHelperX64.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000001\ProviderId = 7ebda25532bbd311916601a5c9b76901 ComHelperX64.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{03b1ffce-43af-4c7d-8b20-4202fe05efa9}\EnableDHCP = "0" vacon.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WFPLWFS\Parameters\Adapters\{03B1FFCE-43AF-4C7D-8B20-4202FE05EFA9} svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000008\DisplayString = "Sangfor SSL Name Space Provider" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000007\ProviderId = ee37263b80e5cf11a55500c04fd8d4ac EasyConnectInstaller_.exe Key deleted \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\WINSOCK2\PARAMETERS\PROTOCOL_CATALOG9\0000000F EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NetBIOS\Linkage\LanaMap = 010001010102010301040105 svchost.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{03b1ffce-43af-4c7d-8b20-4202fe05efa9} svchost.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000006 EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000001\PackedCatalogItem = 2553797374656d526f6f74255c73797374656d33325c6d7377736f636b2e646c6c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000026000200000000000000000000000000080000001b193412f74ba74c86e0dfd7c32b5445e903000001000000000000000000000000000000000000000000000000000000000000000200000022000000240000002400000001000000010000000000000000000000000000000000000000000000480079007000650072002d005600200052004100570000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 EasyConnectInstaller_.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Next_Catalog_Entry_ID = "1019" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\RasPppoe\Linkage\Route = 22007b00320032003800350034004400410032002d0036004200370043002d0034003700350035002d0039003200440036002d003500360030003100450033003800450041003000350035007d002200000022007b00310043004100370031003500450043002d0042004400450044002d0034003900310039002d0042004100460034002d004200390046004300320036003900310042004600330034007d002200000022007b00300033004200310046004600430045002d0034003300410046002d0034004300370044002d0038004200320030002d003400320030003200460045003000350045004600410039007d00220000000000 svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Adapters\{03B1FFCE-43AF-4C7D-8B20-4202FE05EFA9}\{B5F4D659-7DAA-4565-8E41-BE220ED60542}-0000 svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000005\StoresServiceClassInfo = "0" ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000007\LibraryPath = "C:\\Program Files (x86)\\Sangfor\\SSL\\ClientComponent\\SangforNsp.dll" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\RasPppoe\Linkage\Export = 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 svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\00000014 ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000018\ProtocolName = "SangforLSP_x64_def" ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000001\LibraryPath = "%SystemRoot%\\system32\\napinsp.dll" ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000014\ProtocolName = "SangforLSP_x64_def over [MSAFD Tcpip [TCP/IP]]" ComHelperX64.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000003\PackedCatalogItem = 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 ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000005\DisplayString = "@%SystemRoot%\\system32\\wshtcpip.dll,-60103" ComHelperX64.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000007\Version = "1" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000011 EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000010\ProtocolName = "@%SystemRoot%\\System32\\mswsock.dll,-60200" EasyConnectInstaller_.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Psched\Parameters\Adapters\{03B1FFCE-43AF-4C7D-8B20-4202FE05EFA9} svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WFPLWFS\Parameters\Adapters\{D8A0D563-1C61-4D7A-879D-F714707A865F} svchost.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000008 ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000009\ProtocolName = "@%SystemRoot%\\System32\\mswsock.dll,-60102" ComHelperX64.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000006 EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000005\DisplayString = "@%SystemRoot%\\system32\\wshtcpip.dll,-60103" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\RasPppoe\Linkage svchost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WFPLWFS\Parameters\Adapters svchost.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000007\PackedCatalogItem = 2553797374656d526f6f74255c73797374656d33325c6d7377736f636b2e646c6c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090602000000000000000000000000000c000000c0b0eaf9d426d011bbbf00aa006c34e4f3030000010000000000000000000000000000000000000000000000000000000000000002000000170000001c0000001c0000000300000000000000ff0000000000000000000000008000000000000040002500530079007300740065006d0052006f006f00740025005c00530079007300740065006d00330032005c006d007300770073006f0063006b002e0064006c006c002c002d003600300032003000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ComHelperX64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000008 EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries\000000000014\ProtocolName = "@%SystemRoot%\\System32\\wshqos.dll,-101" EasyConnectInstaller_.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SangforVnic\Owners = 6f0065006d0032002e0069006e00660000000000 DrvInst.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Num_Catalog_Entries64 = "7" ComHelperX64.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000002\SupportedNameSpace = "37" ComHelperX64.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000013 ComHelperX64.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries64\000000000016 ComHelperX64.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries64\000000000004\Version = "0" ComHelperX64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries\000000000007 EasyConnectInstaller_.exe -
Drops file in Program Files directory 151 IoCs
Processes:
DnsDriverInstaller.exeSuperExeInstaller.exeSangforRAppInstaller.exeVNICInstaller_X64.exeSangforUpdateInstaller.exeEasyConnectInstaller_.exeSangforCSClientInstaller.exeTcpDriverInstaller.exeHTPInstaller.exeECAgentInstaller.exeInstallControl.exeSJobberInstaller.exeexpand.exeexpand.exedescription ioc process File opened for modification C:\Program Files (x86)\Sangfor\SSL\DnsDriver\DnsDrv.sys DnsDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromote.CAB SuperExeInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\mstscax.dll SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate256.cer VNICInstaller_X64.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforUpdate\SangforUD.exe SangforUpdateInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\librdpdr.dll SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcpX64.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\SangforVpnSsleay32.dll SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\FT_ND_API.dll SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Remove.exe TcpDriverInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\TcpDriver\WfpDrv.sys TcpDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\HTP\htp.conf HTPInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll ECAgentInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Install.exe TcpDriverInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\TcpDriver\WfpDrv_win7.sys TcpDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Nddkey\FT_ND_MOD.dll InstallControl.exe File created C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\vacon.exe VNICInstaller_X64.exe File created C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe ECAgentInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\ndiscleanup.x64.exe VNICInstaller_X64.exe File created C:\Program Files (x86)\Sangfor\SSL\ECAgent\Uninstaller.exe ECAgentInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\nd_dkey_v2.CAB EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\nd_dkey_v2_win8.CAB EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforL3Vpn.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNsp.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\USBKeyManager.dll SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\SvpnJobber\SJobberUninstaller.exe SJobberInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\ClientComponent\nd_dkey_v2_win8.CAB EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe EasyConnectInstaller_.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\TcpDriver\WfpDrv_win7X64.sys TcpDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\DnsDriver\DnsDrv.sys DnsDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\SangforPDF.exe SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\librdpclip.dll SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Nddkey\FT_ND_FULL.dll InstallControl.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\LogoutTimeOut.exe SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\TcpDriver\WfpDrv.sys TcpDriverInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\Promote\91f09f3061a24480b6e277fe1e1e4df9$dpx$.tmp expand.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\Uninstaller.exe SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\DnsDriver\DnsDrvx64.sys DnsDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\SfRemoteAppSession.exe SangforRAppInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\ClientComponent\nd_dkey_v2.cab EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\SangforCSClient.exe SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Remove.exe DnsDriverInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\SfRemoteAppClientHook.dll SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\InstallControl.exe EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCDC.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\librdpsnd.dll SangforRAppInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Nddkey\epsnd_m8.inf InstallControl.exe File created C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforVnic.inf VNICInstaller_X64.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\SangforCSClient\ShuttleCsp11_3000GM.dll SangforCSClientInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\Promote\91f09f3061a24480b6e277fe1e1e4df9$dpx$.tmp\9e8fdc0cd85a014b8e0460c4b50a8212.tmp expand.exe File created C:\Program Files (x86)\Sangfor\SSL\Promote\PromoteUninstall.exe SuperExeInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\SvpnJobber\SvpnJobber.exe SJobberInstaller.exe File created C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate.cer VNICInstaller_X64.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SSOClientPrj.dll EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\RemoteAppClient\libsrapc.dll SangforRAppInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller.exe EasyConnectInstaller_.exe File created C:\Program Files (x86)\Sangfor\SSL\TcpDriver\WfpDrv_win7X64.sys TcpDriverInstaller.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\SangforServiceClient\efd5fdcf8b664d90a16a7f13ffba7967$dpx$.tmp expand.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforVnic.inf VNICInstaller_X64.exe File opened for modification C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforVnic.cat VNICInstaller_X64.exe -
Drops file in Windows directory 11 IoCs
Processes:
expand.exeDrvInst.exeexpand.exevacon.exesvchost.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe File opened for modification C:\Windows\INF\setupapi.dev.log vacon.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe -
NSIS installer 30 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe nsis_installer_2 C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 124 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exevacon.exeDrvInst.exesvchost.exeDrvInst.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID vacon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs vacon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags vacon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Mfg svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 vacon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe -
Processes:
SangforCSClientInstaller.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Internet Explorer\Main SangforCSClientInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Internet Explorer\Main\Isolation = "PMIL" SangforCSClientInstaller.exe -
Modifies data under HKEY_USERS 89 IoCs
Processes:
DrvInst.exesvchost.exeSangforPromoteService.exeECAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust SangforPromoteService.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\S-1-5-18_Classes\Local Settings ECAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs SangforPromoteService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs SangforPromoteService.exe -
Modifies registry class 381 IoCs
Processes:
InstallControl.exeComHelperX64.exeEasyConnectInstaller_.exeComHelperX64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0272DA76-96FB-449E-8298-178876E0EA89}\ = "ePsM8SC Class" InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BC6E9AA5-FDE9-4959-8809-CA4261CD6200}\ProgID ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BC6E9AA5-FDE9-4959-8809-CA4261CD6200}\TypeLib\ ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F257CF85-8E97-4C9B-8407-459B28007500}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforBHO.SangforIEBHO\CLSID\ = "{FFD2FD1F-C991-4A2F-8557-CDB11E277500}" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SSOClientPrj.Web2Client\CLSID\ = "{E6316651-CC1B-4FB9-A985-4796DC6B7110}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6316651-CC1B-4FB9-A985-4796DC6B7110}\VersionIndependentProgID EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforL3Vpn.L3Vpn.1\CLSID\ = "{964865DB-CC7E-4F11-88BA-1445A7947102}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E39B98A8-34A7-4D92-A979-920C48817110}\Programmable EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ClientNSPPrj.ClientNSP\CLSID\ = "{A5A85624-037B-446E-9090-EEA49DFD5900}" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D372A52D-D08B-4336-B561-E00028877FAB}\ = "IePsM8SC" InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A47855F-8D41-43D0-BF75-CC3F15097100}\TypeLib ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{964865DB-CC7E-4F11-88BA-1445A7947102}\VersionIndependentProgID EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A39CB63-CC0C-4EDD-82D0-4559C5087110}\InprocServer32 EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A39CB63-CC0C-4EDD-82D0-4559C5087110}\TypeLib EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6316651-CC1B-4FB9-A985-4796DC6B7110}\InprocServer32\ThreadingModel = "Apartment" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A5A85624-037B-446E-9090-EEA49DFD5900}\ProgID EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D37E99E3-20EB-4838-8BDF-89D0D35FF043}\ = "CSProxy Class" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforCore.SangforCoreCom.1\CLSID\ = "{92AFA1EA-8651-4152-9D42-7A417A327100}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92AFA1EA-8651-4152-9D42-7A417A327100}\ProgID EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ProxyIE.CSProxy.1\CLSID\ = "{D37E99E3-20EB-4838-8BDF-89D0D35FF043}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D372A52D-D08B-4336-B561-E00028877FAB}\ProxyStubClsid32 InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4A47855F-8D41-43D0-BF75-CC3F15097100}\InprocServer32 ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{964865DB-CC7E-4F11-88BA-1445A7947102}\ProgID EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforSddn.Sddn\CurVer\ = "SangforSddn.Sddn.1" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0272DA76-96FB-449E-8298-178876E0EA89}\TypeLib InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforBHO.SangforIEBHO\CurVer EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFD2FD1F-C991-4A2F-8557-CDB11E277500} EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FFD2FD1F-C991-4A2F-8557-CDB11E277500}\ProgID\ = "SangforBHO.SangforIEBHO.1" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforBHO.SangforHelper EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6316651-CC1B-4FB9-A985-4796DC6B7110}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BC6E9AA5-FDE9-4959-8809-CA4261CD6200} ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforCDC.Server\CLSID\ = "{C5BC3F7A-3F33-4CA1-B5AF-4540987C7100}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5BC3F7A-3F33-4CA1-B5AF-4540987C7100}\ProgID EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0272DA76-96FB-449E-8298-178876E0EA89}\ProgID InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2A39CB63-CC0C-4EDD-82D0-4559C5087110}\VersionIndependentProgID EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ClientNSPPrj.ClientNSP\CurVer\ = "ClientNSPPrj.ClientNSP.1" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A5A85624-037B-446E-9090-EEA49DFD5900}\ProgID\ = "ClientNSPPrj.ClientNSP.1" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A5A85624-037B-446E-9090-EEA49DFD5900}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4} EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{964865DB-CC7E-4F11-88BA-1445A7947102}\InprocServer32\ThreadingModel = "Apartment" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ProxyIE_X64.CSProxy\CurVer\ = "ProxyIE_X64.CSProxy.1" ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID ComHelperX64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F257CF85-8E97-4C9B-8407-459B28007500}\InprocServer32\ = "C:\\Program Files (x86)\\Sangfor\\SSL\\ClientComponent\\CSClientManagerPrj.dll" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SangforBHO.SangforIEBHO.1\CLSID\ = "{FFD2FD1F-C991-4A2F-8557-CDB11E277500}" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E39B98A8-34A7-4D92-A979-920C48817110}\Implemented Categories EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ProxyIE.CSProxy\CurVer\ = "ProxyIE.CSProxy.1" EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ProxyIE_X64.CSProxy.1\CLSID\ = "{BC6E9AA5-FDE9-4959-8809-CA4261CD6200}" ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F257CF85-8E97-4C9B-8407-459B28007500}\Implemented Categories EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A5A85624-037B-446E-9090-EEA49DFD5900}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforSddn.Sddn.1\CLSID EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C5BC3F7A-3F33-4CA1-B5AF-4540987C7100}\TypeLib EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforCore.SangforCoreCom\CurVer EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{92AFA1EA-8651-4152-9D42-7A417A327100} EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforBHO.SangforIEBHO\CLSID EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E39B98A8-34A7-4D92-A979-920C48817110}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4} EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SSOClientPrj.Web2Client.1\ = "Web2Client Class" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CSClientManagerPrj.CSClientManager\CLSID EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SSOClientPrj.SSOClientBHO\CurVer EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SSOClientPrj.SSOClientBHO.1 EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ClientNSPPrj.ClientNSP.1\ = "ClientNSP Class" EasyConnectInstaller_.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A5A85624-037B-446E-9090-EEA49DFD5900}\TypeLib EasyConnectInstaller_.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F4A90D77-027F-4096-8D94-8FA4A4E1F235}\1.0\FLAGS\ = "0" InstallControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SangforNspX64.1 ComHelperX64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F257CF85-8E97-4C9B-8407-459B28007500}\VersionIndependentProgID EasyConnectInstaller_.exe -
Processes:
vacon.exeECAgent.exeECAgent.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46 vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 0f0000000100000014000000f45a0858c9cd920e647bad539ab9f1cfc77f24cb0b000000010000002a0000005300650063007400690067006f0020002800550054004e0020004f0062006a0065006300740029000000090000000100000022000000302006082b06010505070308060a2b0601040182370a030406082b060105050703036200000001000000200000006fff78e400a70c11011cd85977c459fb5af96a3df0540820d0f4b8607875e58f140000000100000014000000daed6474149c143cabdd99a9bd5b284d8b3cc9d81d0000000100000010000000f919b9ccce1e59c2e785f7dc2ccf6708030000000100000014000000e12dfb4b41d7d9c32b30514bac1d81d8385e2d4620000000010000006a040000308204663082034ea003020102021044be0c8b500024b411d3362de0b35f1b300d06092a864886f70d0101050500308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a656374301e170d3939303730393138333132305a170d3139303730393138343033365a308195310b3009060355040613025553310b3009060355040813025554311730150603550407130e53616c74204c616b652043697479311e301c060355040a131554686520555345525452555354204e6574776f726b3121301f060355040b1318687474703a2f2f7777772e7573657274727573742e636f6d311d301b0603550403131455544e2d5553455246697273742d4f626a65637430820122300d06092a864886f70d01010105000382010f003082010a0282010100ceaa813fa3a36178aa31005595119e270f1f1cdf3a9b826830c04a611df12f0efabe79f7a523ef55519684cddbe3b96e3e31d80a2067c7f4d9bf94eb47043e02ce2aa25d870409f6309d188a97b2aa1cfc41d2a136cbfb3d91bae7d97035fae4e790c39ba39bd33cf5129977b1b709e068e61cb8f39463886a6afe0b76c9bef422e467b9ab1a5e77c18507dd0d6cbfee06c7776a419ea70fd7fbee9417b7fc85bea4abc41c31ddd7b6d1e4f0efdf168fb25293d7a1d489a1072ebfe10112421e1ae1d89534db647928ffba2e11c2e5e85b9248fb470bc26cdaad328341f3a5e54170fd65906dfafa51c4f9bd962b19042cd36da7dcf07f6f8365e26aab8786750203010001a381af3081ac300b0603551d0f0404030201c6300f0603551d130101ff040530030101ff301d0603551d0e04160414daed6474149c143cabdd99a9bd5b284d8b3cc9d830420603551d1f043b30393037a035a0338631687474703a2f2f63726c2e7573657274727573742e636f6d2f55544e2d5553455246697273742d4f626a6563742e63726c30290603551d250422302006082b0601050507030306082b06010505070308060a2b0601040182370a0304300d06092a864886f70d01010505000382010100081f52b1374478dbfdceb9da959698aa556480b55a40dd21a5c5c1f35f2c4cc8475a69eae8f03535f4d025f3c8a6a4874abd1bb17308bdd4c3cab635bb59867731cda78014ae13effcb148f96b25252d51b62c6d45c198c88a565d3eee434e3e6b278ed03a4b850b5fd3ed6aa775cbd15a872f3975135a72b002819fbef00f845420626c69d4e14dc60d9943010d12968c789dbf50a2b144aa6acf177acf6f0fd4f824555ff0341649663e5046c96371383162b862b9f353ad6cb52ba212aa194f09da5ee793c68e1408fef0308018a086854dc87dd78b03fe6ed5f79d16ac922ca023e59c91521f94df179473c3b3c1c17105200078bd13521da83ecd001fc8 vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\2EFD69CD8052055D6DC5EAC7631A27A45E102A8B\Blob = 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 vacon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0\Blob = 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 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\2EFD69CD8052055D6DC5EAC7631A27A45E102A8B\Blob = 0300000001000000140000002efd69cd8052055d6dc5eac7631a27a45e102a8b200000000100000058050000308205543082043ca0030201020210121876db06e834da35c19890e6e650d0300d06092a864886f70d01010505003081b4310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313b3039060355040b13325465726d73206f66207573652061742068747470733a2f2f7777772e766572697369676e2e636f6d2f727061202863293130312e302c06035504031325566572695369676e20436c617373203320436f6465205369676e696e672032303130204341301e170d3135303731373030303030305a170d3138303931343233353935395a3081b0310b300906035504061302434e31123010060355040813096775616e67646f6e673111300f060355040713087368656e7a68656e31253023060355040a141c53616e67666f7220546563686e6f6c6f6769657320436f2e2c4c7464312c302a060355040b1423726573656172636820616e6420646576656c6f706d656e74206465706172746d656e74312530230603550403141c53616e67666f7220546563686e6f6c6f6769657320436f2e2c4c746430820122300d06092a864886f70d01010105000382010f003082010a0282010100acc852ff226c28a5c22858d7793d2e147777fab1d2a477d63d912937d5a3ae8d3c24d77cbc98eebbcb7150852bde889a3b27995e26718a734a6b0d27dee19a86469dec07b3cfffcb9eba39673d95a7aed3f546bf5dd1aa7c863d2cbcc66e8facfcfd20b464ce07c8a17074c650c55ab2ba97c32c3689fed66d63dd9ac553aa4f54a3d117c57b63451c03cae6048139d05b53e3a512daa778c30ae5e1c2940e6f4769bac48808f1e39d8b0c703dc3592d5b1a8384d7882ab0e879721e609d259b6aaa07de8fe17b7e8418d545f67ba982c72331fcb7083ccf5c6938879c3f4c094bce1ead3a17315f12d20da73045e7b0434ceacecd610f19d51ab2b2e0c26e230203010001a38201623082015e30090603551d1304023000300e0603551d0f0101ff040403020780302b0603551d1f042430223020a01ea01c861a687474703a2f2f73662e73796d63622e636f6d2f73662e63726c30660603551d20045f305d305b060b6086480186f84501071703304c302306082b06010505070201161768747470733a2f2f642e73796d63622e636f6d2f637073302506082b0601050507020230190c1768747470733a2f2f642e73796d63622e636f6d2f72706130130603551d25040c300a06082b06010505070303305706082b06010505070101044b3049301f06082b060105050730018613687474703a2f2f73662e73796d63642e636f6d302606082b06010505073002861a687474703a2f2f73662e73796d63622e636f6d2f73662e637274301f0603551d23041830168014cf99a9ea7b26f44bc98e8fd7f00526efe3d2a79d301d0603551d0e041604148b9a352c7884797b474f0d042581fd6f3527b8e5300d06092a864886f70d010105050003820101009e02c33ef7badd9b9f8870fb759774d90a4c7f9d9d013d147bafb25ca723c7cc60f858743fcbc6fa4a3d4d37c5caa3613f6c955ddacfe9f8bff184d1e529835b2c474382a2b809f33e571769c9610f72340fd4eda76a4557dd75fd2b8865bac936085ac66715ca26a70132d7fcf0761b1e191b0cc706ea2c3efcb537b56272f4337e4d14798a0a6852f285065b62bdecb93fff7ca4a4dce93d9623250ea9791c0e7a7a4df215616936dc4adb45ab6ea923e77e071fd13ff3515a93b297dc1af597e59ab8588c3672ba8e51c535710f3bbbc5c981525c5e6fea977a8e77a67f495974030e0fd9330a812d1fad546be3ffa0a756fbccf5d9b29af6d437500b27c3 vacon.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0\Blob = 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 ECAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0\Blob = 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 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5CEA91B309BE5E0A5EE4DA8FD8C162847787B3CA\Blob = 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 vacon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5CEA91B309BE5E0A5EE4DA8FD8C162847787B3CA vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46\Blob = 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 vacon.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5CEA91B309BE5E0A5EE4DA8FD8C162847787B3CA\Blob = 0f00000001000000200000004657a804ff701934257969425731293ebb5493e41b2b59e1bb733fc42ccb22d00300000001000000140000005cea91b309be5e0a5ee4da8fd8c162847787b3ca2000000001000000200500003082051c30820404a0030201020210234d0da754e1f10eae2e6d26bbcd1b18300d06092a864886f70d01010b0500307f310b3009060355040613025553311d301b060355040a131453796d616e74656320436f72706f726174696f6e311f301d060355040b131653796d616e746563205472757374204e6574776f726b3130302e0603550403132753796d616e74656320436c61737320332053484132353620436f6465205369676e696e67204341301e170d3135313233313030303030305a170d3138303931343233353935395a3081b0310b300906035504061302434e31123010060355040813096775616e67646f6e673111300f060355040713087368656e7a68656e31253023060355040a141c53616e67666f7220546563686e6f6c6f6769657320436f2e2c4c7464312c302a060355040b1423726573656172636820616e6420646576656c6f706d656e74206465706172746d656e74312530230603550403141c53616e67666f7220546563686e6f6c6f6769657320436f2e2c4c746430820120300d06092a864886f70d01010105000382010d00308201080282010100c0595e7714493cade5690897671e3e06acf314a0fe078cff559df66cd2a579efab43f61d0c60adf2a8eebf9a665bf6afe39a55c06fd87ca6ef531bb63da9bf5b843384c085fb7b0070e845433cc9bbfc5d1f9332a85a8e7707e741c90bbd1b551a5239592cf4bc0c872bee374b115d3cc101cd4c19a6c0a90f6de78ea7944f04c61bcd162d4cf976e7ba138f9a30b333a70e5b6ed1d608e438d18bbf57d0e7a1fd8897a47f2628d71bd64b6bfcd5e0a8d03064e30f8a2867f4d3264d53d03d7963989ba4f2d3f486400cd85a10b194f2e055b17052c239bb485952000b1db641fc7b0f7628118fb003e660d9f50ad9d9df731e597ffdef3de65a9644808653b9020103a38201623082015e30090603551d1304023000300e0603551d0f0101ff040403020780302b0603551d1f042430223020a01ea01c861a687474703a2f2f73762e73796d63622e636f6d2f73762e63726c30660603551d20045f305d305b060b6086480186f84501071703304c302306082b06010505070201161768747470733a2f2f642e73796d63622e636f6d2f637073302506082b0601050507020230190c1768747470733a2f2f642e73796d63622e636f6d2f72706130130603551d25040c300a06082b06010505070303305706082b06010505070101044b3049301f06082b060105050730018613687474703a2f2f73762e73796d63642e636f6d302606082b06010505073002861a687474703a2f2f73762e73796d63622e636f6d2f73762e637274301f0603551d23041830168014963b53f0793397af7d83ef2e2bcccab7861e7266301d0603551d0e041604147398bcef6eb19cdd27df2c2988153f050669a4b1300d06092a864886f70d01010b050003820101008ab4f0256e632d8e95f0b8e668ab115f08a22036dd089d19ad4abe0b885579a9389415c5638138c44966db8d8e13d850f3046f5aed9dd1dc8a70707fb7b0ab7e774f56c2e6306110ae8695c9ccd452fa366f273c9cc5635b41e76fd15439884c0d8ec87ef1e2b88552935b8e1aeeb6da162d05ec00a860d7c7ee894afe4fe456e122916f0a7fbbae0e4e1ecb9945a4d11ba532d2b7beeab0f42cf4ad43e72b72b0864f99a09aa5a742ccc1826a408559afa3a1cef61778e59319ea83e0cbd935aa83a2b0c22722b73d5029226b66c111f0bdc833478a547bd5016ed614bf84dd58596b63e22406fc74ade183b928bb58def97eeda5e22cb1eb933001df92bd99 vacon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0 ECAgent.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A9062C5C1721FF87EBCBD89DF03719755560E7A0\Blob = 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 ECAgent.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\2EFD69CD8052055D6DC5EAC7631A27A45E102A8B vacon.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SangforCSClientInstaller.exeECAgent.exepid process 3868 SangforCSClientInstaller.exe 3868 SangforCSClientInstaller.exe 2752 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe 2752 ECAgent.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
pid process 612 612 612 -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
Uninstall.exesvchost.exesvchost.exevacon.exeDrvInst.exesvchost.exedescription pid process Token: SeDebugPrivilege 3336 Uninstall.exe Token: SeShutdownPrivilege 1352 svchost.exe Token: SeCreatePagefilePrivilege 1352 svchost.exe Token: SeAuditPrivilege 3492 svchost.exe Token: SeSecurityPrivilege 3492 svchost.exe Token: SeLoadDriverPrivilege 3956 vacon.exe Token: SeRestorePrivilege 616 DrvInst.exe Token: SeBackupPrivilege 616 DrvInst.exe Token: SeLoadDriverPrivilege 616 DrvInst.exe Token: SeLoadDriverPrivilege 616 DrvInst.exe Token: SeLoadDriverPrivilege 616 DrvInst.exe Token: SeShutdownPrivilege 3032 svchost.exe Token: SeCreatePagefilePrivilege 3032 svchost.exe Token: SeLoadDriverPrivilege 3032 svchost.exe Token: SeLoadDriverPrivilege 3032 svchost.exe Token: SeLoadDriverPrivilege 3956 vacon.exe Token: SeLoadDriverPrivilege 3032 svchost.exe Token: SeLoadDriverPrivilege 3956 vacon.exe Token: SeLoadDriverPrivilege 3956 vacon.exe Token: SeLoadDriverPrivilege 3032 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Uninstall.exepid process 3336 Uninstall.exe 3336 Uninstall.exe -
Suspicious use of WriteProcessMemory 123 IoCs
Processes:
14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exeEasyConnectInstaller_.exeTcpDriverInstaller.exeDnsDriverInstaller.exeSuperExeInstaller.exeSangforServiceClientInstaller.exeVNICInstaller_X64.exedescription pid process target process PID 3900 wrote to memory of 2972 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe TaskServer.exe PID 3900 wrote to memory of 2972 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe TaskServer.exe PID 3900 wrote to memory of 2972 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe TaskServer.exe PID 3900 wrote to memory of 2560 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe EasyConnectInstaller_.exe PID 3900 wrote to memory of 2560 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe EasyConnectInstaller_.exe PID 3900 wrote to memory of 2560 3900 14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe EasyConnectInstaller_.exe PID 2560 wrote to memory of 3336 2560 EasyConnectInstaller_.exe Uninstall.exe PID 2560 wrote to memory of 3336 2560 EasyConnectInstaller_.exe Uninstall.exe PID 2560 wrote to memory of 3336 2560 EasyConnectInstaller_.exe Uninstall.exe PID 2560 wrote to memory of 3868 2560 EasyConnectInstaller_.exe SangforCSClientInstaller.exe PID 2560 wrote to memory of 3868 2560 EasyConnectInstaller_.exe SangforCSClientInstaller.exe PID 2560 wrote to memory of 3868 2560 EasyConnectInstaller_.exe SangforCSClientInstaller.exe PID 2560 wrote to memory of 3972 2560 EasyConnectInstaller_.exe TcpDriverInstaller.exe PID 2560 wrote to memory of 3972 2560 EasyConnectInstaller_.exe TcpDriverInstaller.exe PID 2560 wrote to memory of 3972 2560 EasyConnectInstaller_.exe TcpDriverInstaller.exe PID 3972 wrote to memory of 1972 3972 TcpDriverInstaller.exe Remove.exe PID 3972 wrote to memory of 1972 3972 TcpDriverInstaller.exe Remove.exe PID 3972 wrote to memory of 1972 3972 TcpDriverInstaller.exe Remove.exe PID 3972 wrote to memory of 3968 3972 TcpDriverInstaller.exe Install.exe PID 3972 wrote to memory of 3968 3972 TcpDriverInstaller.exe Install.exe PID 3972 wrote to memory of 3968 3972 TcpDriverInstaller.exe Install.exe PID 2560 wrote to memory of 3952 2560 EasyConnectInstaller_.exe DnsDriverInstaller.exe PID 2560 wrote to memory of 3952 2560 EasyConnectInstaller_.exe DnsDriverInstaller.exe PID 2560 wrote to memory of 3952 2560 EasyConnectInstaller_.exe DnsDriverInstaller.exe PID 3952 wrote to memory of 1216 3952 DnsDriverInstaller.exe Remove.exe PID 3952 wrote to memory of 1216 3952 DnsDriverInstaller.exe Remove.exe PID 3952 wrote to memory of 1216 3952 DnsDriverInstaller.exe Remove.exe PID 3952 wrote to memory of 2072 3952 DnsDriverInstaller.exe Install.exe PID 3952 wrote to memory of 2072 3952 DnsDriverInstaller.exe Install.exe PID 3952 wrote to memory of 2072 3952 DnsDriverInstaller.exe Install.exe PID 2560 wrote to memory of 3100 2560 EasyConnectInstaller_.exe SuperExeInstaller.exe PID 2560 wrote to memory of 3100 2560 EasyConnectInstaller_.exe SuperExeInstaller.exe PID 2560 wrote to memory of 3100 2560 EasyConnectInstaller_.exe SuperExeInstaller.exe PID 3100 wrote to memory of 3776 3100 SuperExeInstaller.exe expand.exe PID 3100 wrote to memory of 3776 3100 SuperExeInstaller.exe expand.exe PID 3100 wrote to memory of 3776 3100 SuperExeInstaller.exe expand.exe PID 2560 wrote to memory of 2100 2560 EasyConnectInstaller_.exe SangforServiceClientInstaller.exe PID 2560 wrote to memory of 2100 2560 EasyConnectInstaller_.exe SangforServiceClientInstaller.exe PID 2560 wrote to memory of 2100 2560 EasyConnectInstaller_.exe SangforServiceClientInstaller.exe PID 2100 wrote to memory of 3948 2100 SangforServiceClientInstaller.exe expand.exe PID 2100 wrote to memory of 3948 2100 SangforServiceClientInstaller.exe expand.exe PID 2100 wrote to memory of 3948 2100 SangforServiceClientInstaller.exe expand.exe PID 2560 wrote to memory of 984 2560 EasyConnectInstaller_.exe VC2010RedistX86UInstaller.exe PID 2560 wrote to memory of 984 2560 EasyConnectInstaller_.exe VC2010RedistX86UInstaller.exe PID 2560 wrote to memory of 984 2560 EasyConnectInstaller_.exe VC2010RedistX86UInstaller.exe PID 2560 wrote to memory of 3392 2560 EasyConnectInstaller_.exe HTPInstaller.exe PID 2560 wrote to memory of 3392 2560 EasyConnectInstaller_.exe HTPInstaller.exe PID 2560 wrote to memory of 3392 2560 EasyConnectInstaller_.exe HTPInstaller.exe PID 2560 wrote to memory of 3904 2560 EasyConnectInstaller_.exe SJobberInstaller.exe PID 2560 wrote to memory of 3904 2560 EasyConnectInstaller_.exe SJobberInstaller.exe PID 2560 wrote to memory of 3904 2560 EasyConnectInstaller_.exe SJobberInstaller.exe PID 2560 wrote to memory of 1176 2560 EasyConnectInstaller_.exe SangforUpdateInstaller.exe PID 2560 wrote to memory of 1176 2560 EasyConnectInstaller_.exe SangforUpdateInstaller.exe PID 2560 wrote to memory of 1176 2560 EasyConnectInstaller_.exe SangforUpdateInstaller.exe PID 2560 wrote to memory of 812 2560 EasyConnectInstaller_.exe SangforRAppInstaller.exe PID 2560 wrote to memory of 812 2560 EasyConnectInstaller_.exe SangforRAppInstaller.exe PID 2560 wrote to memory of 812 2560 EasyConnectInstaller_.exe SangforRAppInstaller.exe PID 2560 wrote to memory of 1172 2560 EasyConnectInstaller_.exe InstallControl.exe PID 2560 wrote to memory of 1172 2560 EasyConnectInstaller_.exe InstallControl.exe PID 2560 wrote to memory of 1172 2560 EasyConnectInstaller_.exe InstallControl.exe PID 2560 wrote to memory of 2808 2560 EasyConnectInstaller_.exe VNICInstaller_X64.exe PID 2560 wrote to memory of 2808 2560 EasyConnectInstaller_.exe VNICInstaller_X64.exe PID 2560 wrote to memory of 2808 2560 EasyConnectInstaller_.exe VNICInstaller_X64.exe PID 2808 wrote to memory of 3988 2808 VNICInstaller_X64.exe ndiscleanup.x64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe"C:\Users\Admin\AppData\Local\Temp\14c63d1c8979ac3e55720fbfedd7f1f7fb68bbf16a2ca2882284817cf01ccd8f.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\TaskServer.exeTaskServer.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exeEasyConnectInstaller_.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies service
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Uninstall.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Uninstall.exe" -QUICKREPAIR -HIDE -NODELSESSION -SessionId=-13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Remove.exe"C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Remove.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Install.exe"C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Install.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Remove.exe"C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Remove.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Install.exe"C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Install.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\expand.exe"expand.exe" -r "C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromote.CAB" "C:\Program Files (x86)\Sangfor\SSL\Promote"4⤵
- Drops file in Program Files directory
- Drops file in Windows directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\expand.exe"expand.exe" -r "C:\Program Files (x86)\Sangfor\SSL\SangforServiceClient\SangforServiceClient.CAB" "C:\Program Files (x86)\Sangfor\SSL\SangforServiceClient"4⤵
- Drops file in Program Files directory
- Drops file in Windows directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VC2010RedistX86UInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VC2010RedistX86UInstaller.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\InstallControl.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\InstallControl.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe" -SessionId=-13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\ndiscleanup.x64.exe"C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\ndiscleanup.x64.exe"4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\vacon.exe"C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\vacon.exe" install "C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate.cer" "C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate256.cer" "C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforVNIC.inf" SangforVNIC4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies service
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SetIPTime.exe"C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SetIPTime.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\netsh.exenetsh interface ip set interface 2 dadtransmits=05⤵
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe" reg ProxyIEX64.dll "C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcpX64.dll"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies service
- Modifies registry class
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe" reg SangforNspX64.dll "C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNspX64.dll"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies service
- Modifies registry class
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe"C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe" --restart4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe"C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe" -SessionId=-13⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe"C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe" -/StopServer4⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe"C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe" -/StartServer4⤵
- Executes dropped EXE
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{10ceac9c-42e5-144f-b2cf-5244379a6f30}\sangforvnic.inf" "9" "493d7628f" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\sangfor\ssl\csclient\vnic"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "sangforvnic.inf:3beb73aff103cc24:SangforVNIC.ndi:5.9.0.0:sangforvnic," "493d7628f" "0000000000000174"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Modifies service
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe"C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe"C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe" --import-sys --enable-loopback2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies system certificate store
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n="Microsoft.MicrosoftEdge_8wekyb3d8bbwe"3⤵
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n="Microsoft.Windows.Spartan_cw5n1h2txyewy"3⤵
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe"C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe" --from-sp2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe"C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe" --import-nss --enable-ie-loopback2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe"C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe" --import-sys --enable-loopback2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n="Microsoft.MicrosoftEdge_8wekyb3d8bbwe"3⤵
-
C:\Windows\SysWOW64\CheckNetIsolation.exeCheckNetIsolation.exe LoopbackExempt -a -n="Microsoft.Windows.Spartan_cw5n1h2txyewy"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~2\Sangfor\SSL\CLIENT~1\ND_DKE~1.CAB
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate.cer
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforCertificate256.cer
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SangforVNIC.inf
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SetIPTime.exe
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\SetIPTime.exe
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\ndiscleanup.x64.exe
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\ndiscleanup.x64.exe
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\vacon.exe
-
C:\Program Files (x86)\Sangfor\SSL\CSClient\VNIC\vacon.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ComHelperX64.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\DnsDriverInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECAgentInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\ECBaseInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\HTPInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\InstallControl.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\InstallControl.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SJobberInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCSClientInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCore.dll
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNspX64.dll
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforRAppInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforServiceClientInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcpX64.dll
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforUpdateInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperExeInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\SuperServiceInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\TcpDriverInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Uninstall.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\Uninstall.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VC2010RedistX86UInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VC2010RedistX86UInstaller.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe
-
C:\Program Files (x86)\Sangfor\SSL\ClientComponent\VNICInstaller_X64.exe
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Install.exe
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Install.exe
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Remove.exe
-
C:\Program Files (x86)\Sangfor\SSL\DnsDriver\Remove.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECAgent.exe
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\ECBase.dll
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\SANGFORVPNLIBEAY32.dll
-
C:\Program Files (x86)\Sangfor\SSL\ECAgent\SANGFORVPNSSLEAY32.dll
-
C:\Program Files (x86)\Sangfor\SSL\Promote\MSVCP60.dll
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromote.exe
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe
-
C:\Program Files (x86)\Sangfor\SSL\Promote\SangforPromoteService.exe
-
C:\Program Files (x86)\Sangfor\SSL\SangforServiceClient\SangforServiceClient.exe
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Install.exe
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Install.exe
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Remove.exe
-
C:\Program Files (x86)\Sangfor\SSL\TcpDriver\Remove.exe
-
C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe
-
C:\Users\Admin\AppData\Local\Temp\EasyConnectInstaller_.exe
-
C:\Users\Admin\AppData\Local\Temp\TaskServer.exe
-
C:\Users\Admin\AppData\Local\Temp\TaskServer.exe
-
C:\Users\Admin\AppData\Local\Temp\{10CEA~1\SangforVnic.cat
-
C:\Users\Admin\AppData\Local\Temp\{10CEA~1\SangforVnic.sys
-
C:\Users\Admin\AppData\Local\Temp\{10ceac9c-42e5-144f-b2cf-5244379a6f30}\sangforvnic.inf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e64br7r6.Admin\cert8.db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e64br7r6.Admin\key3.db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\e64br7r6.Admin\secmod.db
-
C:\Users\Admin\AppData\Roaming\Sangfor\SSL\Log\ECAgent_20200911.log
-
C:\Windows\INF\oem2.PNF
-
C:\Windows\INF\oem2.inf
-
C:\Windows\Logs\DPX\setupact.log
-
C:\Windows\SysWOW64\MSVCR100.dll
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\Sangfor\SSL\Log\ECAgent_20200911.log
-
C:\Windows\System32\DRIVER~1\FILERE~1\SANGFO~1.INF\SangforVnic.sys
-
C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\SangforVnic.cat
-
C:\Windows\System32\DriverStore\FileRepository\sangforvnic.inf_amd64_9183b83f3b2f3cd1\sangforvnic.inf
-
\??\c:\PROGRA~2\sangfor\ssl\csclient\vnic\SANGFO~1.SYS
-
\??\c:\program files (x86)\sangfor\ssl\csclient\vnic\SangforVnic.cat
-
\??\c:\program files (x86)\sangfor\ssl\promote\sangforpromote.cab
-
\??\c:\program files (x86)\sangfor\ssl\sangforserviceclient\sangforserviceclient.cab
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\CSClientManagerPrj.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\CSClientManagerPrj.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\Nddkey\FT_ND_API.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\Nddkey\FT_ND_SC.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SSOClientPrj.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SSOClientPrj.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforBHO.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforBHO.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCDC.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCDC.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCore.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCore.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforCore.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforL3Vpn.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforL3Vpn.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNsp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNsp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforNspX64.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforSddn.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforSddn.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcp.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\SangforTcpX64.dll
-
\Program Files (x86)\Sangfor\SSL\ClientComponent\UrlWarrent.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\ECBase.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnLibeay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll
-
\Program Files (x86)\Sangfor\SSL\ECAgent\SangforVpnSsleay32.dll
-
\Program Files (x86)\Sangfor\SSL\Promote\msvcp60.dll
-
\Program Files (x86)\Sangfor\SSL\Promote\msvcp60.dll
-
\Program Files (x86)\Sangfor\SSL\Promote\msvcp60.dll
-
\Program Files (x86)\Sangfor\SSL\Promote\msvcp60.dll
-
\Users\Admin\AppData\Local\Temp\nscB202.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nscB202.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsiB30C.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nsjC2CB.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nslAEE5.tmp\KillProcDLL.dll
-
\Users\Admin\AppData\Local\Temp\nslAEE5.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\SkinBtn.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\SkinBtn.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\SkinProgress.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\SkinProgress.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\dbdStaticCtrl.dll
-
\Users\Admin\AppData\Local\Temp\nsp867D.tmp\dbdStaticCtrl.dll
-
\Users\Admin\AppData\Local\Temp\nstB657.tmp\nsExec.dll
-
\Users\Admin\AppData\Local\Temp\nsyB454.tmp\nsExec.dll
-
\Windows\SysWOW64\SangforInstallHelper.dll
-
\Windows\SysWOW64\msvcr100.dll
-
\Windows\SysWOW64\msvcr100.dll
-
\Windows\SysWOW64\msvcr100.dll
-
\Windows\SysWOW64\msvcr100.dll
-
\Windows\SysWOW64\msvcr100.dll
-
memory/8-163-0x0000000000000000-mapping.dmp
-
memory/184-196-0x0000000000000000-mapping.dmp
-
memory/616-125-0x0000000000000000-mapping.dmp
-
memory/688-141-0x0000000000000000-mapping.dmp
-
memory/688-937-0x0000000000000000-mapping.dmp
-
memory/804-198-0x0000000000000000-mapping.dmp
-
memory/812-92-0x0000000000000000-mapping.dmp
-
memory/984-80-0x0000000000000000-mapping.dmp
-
memory/1172-95-0x0000000000000000-mapping.dmp
-
memory/1176-89-0x0000000000000000-mapping.dmp
-
memory/1216-58-0x0000000000000000-mapping.dmp
-
memory/1308-169-0x0000000000000000-mapping.dmp
-
memory/1972-47-0x0000000000000000-mapping.dmp
-
memory/2072-62-0x0000000000000000-mapping.dmp
-
memory/2100-72-0x0000000000000000-mapping.dmp
-
memory/2412-923-0x0000000000000000-mapping.dmp
-
memory/2428-148-0x0000000000000000-mapping.dmp
-
memory/2560-3-0x0000000000000000-mapping.dmp
-
memory/2568-135-0x0000000000000000-mapping.dmp
-
memory/2708-145-0x0000000000000000-mapping.dmp
-
memory/2752-201-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-199-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-531-0x0000000004220000-0x0000000004221000-memory.dmpFilesize
4KB
-
memory/2752-465-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-193-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-194-0x0000000004120000-0x0000000004121000-memory.dmpFilesize
4KB
-
memory/2752-195-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-395-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-288-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-242-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-200-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2752-185-0x0000000000000000-mapping.dmp
-
memory/2752-207-0x0000000003920000-0x0000000003921000-memory.dmpFilesize
4KB
-
memory/2784-180-0x0000000000000000-mapping.dmp
-
memory/2808-101-0x0000000000000000-mapping.dmp
-
memory/2972-9-0x0000000001506000-0x0000000001507000-memory.dmpFilesize
4KB
-
memory/2972-0-0x0000000000000000-mapping.dmp
-
memory/3100-65-0x0000000000000000-mapping.dmp
-
memory/3108-151-0x0000000000000000-mapping.dmp
-
memory/3336-17-0x0000000000000000-mapping.dmp
-
memory/3392-83-0x0000000000000000-mapping.dmp
-
memory/3648-938-0x0000000000000000-mapping.dmp
-
memory/3776-69-0x0000000000000000-mapping.dmp
-
memory/3868-39-0x0000000000000000-mapping.dmp
-
memory/3880-925-0x0000000000000000-mapping.dmp
-
memory/3880-136-0x0000000000000000-mapping.dmp
-
memory/3904-86-0x0000000000000000-mapping.dmp
-
memory/3948-76-0x0000000000000000-mapping.dmp
-
memory/3952-55-0x0000000000000000-mapping.dmp
-
memory/3956-112-0x0000000000000000-mapping.dmp
-
memory/3964-166-0x0000000000000000-mapping.dmp
-
memory/3964-120-0x0000000000000000-mapping.dmp
-
memory/3968-52-0x0000000000000000-mapping.dmp
-
memory/3972-44-0x0000000000000000-mapping.dmp
-
memory/3988-132-0x0000000000000000-mapping.dmp
-
memory/3988-105-0x0000000000000000-mapping.dmp