Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
23-09-2020 14:04
Static task
static1
Behavioral task
behavioral1
Sample
FileZilla_3.50.0_win64_sponsored-setup.exe
Resource
win7
Behavioral task
behavioral2
Sample
FileZilla_3.50.0_win64_sponsored-setup.exe
Resource
win10v200722
General
-
Target
FileZilla_3.50.0_win64_sponsored-setup.exe
-
Size
12.9MB
-
MD5
90f560ce71cc77fc2e121761eeef265c
-
SHA1
85ff0ad4728e31539e1d3757a543d47e9cd42f74
-
SHA256
d04bbcd2855d3bba4627cbb1da3a0e5fa79fe0b27b371024605ff1382ea94c58
-
SHA512
c5a6b3890743ff0f1ea3f6fc9c2f28cf70e9f47c4067830ca63b38c3a1b10d386dc0d889c3041a553876b4a14fafd094f4a7d41279273b85148d6a8f9b9d54e1
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Creates new service(s) 1 TTPs
-
Executes dropped EXE 8 IoCs
Processes:
y1m.exesaBSI.exeinstaller.exefilezilla.exeinstaller.exeServiceHost.exeUIHost.exeupdater.exepid process 3444 y1m.exe 3388 saBSI.exe 3264 installer.exe 3464 filezilla.exe 3332 installer.exe 4748 ServiceHost.exe 1928 UIHost.exe 4780 updater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
UIHost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\International\Geo\Nation UIHost.exe -
Loads dropped DLL 43 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exeregsvr32.exey1m.exefilezilla.exeregsvr32.exeregsvr32.exeregsvr32.exeServiceHost.exeregsvr32.exeUIHost.exeregsvr32.exeregsvr32.exepid process 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 3944 regsvr32.exe 3444 y1m.exe 3444 y1m.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 3464 filezilla.exe 4152 regsvr32.exe 4188 regsvr32.exe 4696 regsvr32.exe 4748 ServiceHost.exe 4748 ServiceHost.exe 4748 ServiceHost.exe 4796 regsvr32.exe 4748 ServiceHost.exe 4748 ServiceHost.exe 1928 UIHost.exe 1928 UIHost.exe 4748 ServiceHost.exe 4428 regsvr32.exe 4496 regsvr32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for any installed AV software in registry 1 TTPs 7 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\SOFTWARE\AVAST Software\Avast FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVAST Software\Avast\Version FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVG\AV\Dir FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\SOFTWARE\AVG\AV\Dir FileZilla_3.50.0_win64_sponsored-setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
JavaScript code in executable 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\nsd25932204626964\libeay32.dll js \Users\Admin\AppData\Local\Temp\inH259367375574\libeay32.dll js C:\Program Files\FileZilla FTP Client\filezilla.exe js C:\Program Files\FileZilla FTP Client\libstdc++-6.dll js C:\Program Files\FileZilla FTP Client\libgnutls-30.dll js \Program Files\FileZilla FTP Client\libstdc++-6.dll js \Program Files\FileZilla FTP Client\libgnutls-30.dll js -
Drops file in Program Files directory 1857 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exeinstaller.exeinstaller.exedescription ioc process File created C:\Program Files\FileZilla FTP Client\resources\lone\48x48\folderup.png FileZilla_3.50.0_win64_sponsored-setup.exe File opened for modification C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\eula-cs-CZ.txt installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-webboost-fr-FR.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\flatzilla\16x16\processqueue.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\flatzilla\32x32\cancel.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\flatzilla\32x32\download.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\locales\is\libfilezilla.mo FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-install-nb-NO.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\cyril\16x16\upload.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\lone\16x16\speedlimits.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\opencrystal\32x32\disconnect.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-checklist-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-search-experience-toast-sr-Latn-CS.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\mcafee-logo.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ss-toast-variants-ru-RU.js installer.exe File created C:\Program Files\FileZilla FTP Client\locales\kab\filezilla.mo FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\settings-icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\loading-spinner.gif installer.exe File created C:\Program Files\FileZilla FTP Client\locales\lo_LA\filezilla.mo FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\cryptojack-icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-de-DE.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\lone\32x32\reconnect.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\minimal\16x16\compare.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\msac.ico installer.exe File opened for modification C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-shared-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-install-fr-CA.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-ext-install-toast-ko-KR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\core\handlers.luc installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-bing-sr-Latn-CS.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\bookmark.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-duckduckgo-sk-SK.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-el-GR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-es-ES.js installer.exe File created C:\Program Files\FileZilla FTP Client\libfilezilla-9.dll FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\flatzilla\24x24\compare.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\uihost.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-checklist-risk.png installer.exe File opened for modification C:\Program Files\McAfee\WebAdvisor\Temp1156428362\webadvisor.cab installer.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-shared-de-DE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-shared-it-IT.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\wa_install_close.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-pps-cs-CZ.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\tango\32x32\reconnect.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\locales\ja_JP\libfilezilla.mo FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\close_icon.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\webadvisor\wa-dwtoast.css installer.exe File opened for modification C:\Program Files\McAfee\WebAdvisor\Temp1156428362\wa_install_close.png installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-dialog-balloon-es-ES.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-zh-TW.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\lone\48x48\speedlimits.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\tango\16x16\folder.png FileZilla_3.50.0_win64_sponsored-setup.exe File opened for modification C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-shared-sv-SE.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-adblock-pt-BR.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\commonlogicloader.luc installer.exe File created C:\Program Files\FileZilla FTP Client\resources\tango\16x16\cancel.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-install-cs-CZ.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-options-pt-BR.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\lone\16x16\binary.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\Temp1156428362\jslang\wa-res-install-pl-PL.js installer.exe File created C:\Program Files\McAfee\WebAdvisor\jslang\wa-res-sstoast-cs-CZ.js installer.exe File created C:\Program Files\FileZilla FTP Client\resources\default\480x480\sort_up_light.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\lone\48x48\filter.png FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\FileZilla FTP Client\resources\minimal\theme.xml FileZilla_3.50.0_win64_sponsored-setup.exe File created C:\Program Files\McAfee\WebAdvisor\MFW\packages\builtin\wa-ss-toast-variants-bg.png installer.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exey1m.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 y1m.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 y1m.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FileZilla_3.50.0_win64_sponsored-setup.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exey1m.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS FileZilla_3.50.0_win64_sponsored-setup.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS FileZilla_3.50.0_win64_sponsored-setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS y1m.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS y1m.exe -
Processes:
regsvr32.exeregsvr32.exey1m.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\MenuText = "McAfee 웹어드바이저" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Default Visible = "Yes" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\MenuText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSIDExtension = "{29B24532-6CE1-41BA-8BF0-F580EA174AF1}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\MenuText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412\ButtonText = "McAfee 웹어드바이저" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\CLSID = "{32CFFBE7-8BB7-4BC3-83D8-8197671920D6}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0411\ButtonText = "マカフィー ウェブアドバイザー" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\HotIcon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0804\ButtonText = "迈克菲联网顾问" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\@ = "WebAdvisor Menu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\ButtonText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuText = "McAfee WebAdvisor" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Icon = "C:\\Program Files\\McAfee\\WebAdvisor\\WebAdvisor.ico" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\MenuStatusBar = "MStatus bar View SiteReport" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{48A61126-9A19-4C50-A214-FF08CB94995C}\Lang0412 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Internet Explorer\GPU y1m.exe Set value (str) \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Software\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x1414\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"6.2.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" y1m.exe -
Modifies data under HKEY_USERS 47 IoCs
Processes:
ServiceHost.exeupdater.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates ServiceHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My ServiceHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache updater.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates ServiceHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs ServiceHost.exe -
Modifies registry class 70 IoCs
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exeFileZilla_3.50.0_win64_sponsored-setup.exeregsvr32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\ = "FileZilla 3 Shell Extension" FileZilla_3.50.0_win64_sponsored-setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version\ = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\IEPlugin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\IEPlugin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\ = "McAfee SiteAdvisor MISP Integration" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\ = "McAfee WebAdvisor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\directory\shellex\CopyHookHandlers\FileZilla3CopyHook FileZilla_3.50.0_win64_sponsored-setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32\ = "C:\\Program Files\\FileZilla FTP Client\\fzshellext_64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\ = "ScannerAPI Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\IEPlugin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\win32\\DownloadScan.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\IEPlugin.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32\ = "C:\\Program Files\\FileZilla FTP Client\\fzshellext.dll" FileZilla_3.50.0_win64_sponsored-setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileZilla3CopyHook\ = "{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\ = "ScannerAPI Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\DownloadScan.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32\ThreadingModel = "Apartment" FileZilla_3.50.0_win64_sponsored-setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\ = "McAfee WebAdvisor" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\InProcServer32 FileZilla_3.50.0_win64_sponsored-setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B}\ = "FileZilla 3 Shell Extension" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\directory\shellex\CopyHookHandlers\FileZilla3CopyHook regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{21CBFEC0-E728-420C-B4A4-A58AD2089ABA}\InprocServer32\ = "C:\\Program Files\\McAfee\\WebAdvisor\\x64\\WSSDep.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{117151a5-951b-477e-91a4-699c7d9d66a2}\Implemented Categories regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID FileZilla_3.50.0_win64_sponsored-setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DB70412E-EEC9-479C-BBA9-BE36BFDDA41B} FileZilla_3.50.0_win64_sponsored-setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1}\ = "McAfee WebAdvisor Extension" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B164E929-A1B6-4A06-B104-2CD0E90A88FF}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{29B24532-6CE1-41BA-8BF0-F580EA174AF1} regsvr32.exe -
Processes:
ServiceHost.exesaBSI.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 ServiceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 0400000001000000100000001bfe69d191b71933a372a80fe155e5b50f000000010000003000000066b764a96581128168cf208e374dda479d54e311f32457f4aee0dbd2a6c8d171d531289e1cd22bfdbbd4cfd979625483090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd21400000001000000140000005379bf5aaa2b4acf5480e1d89bc09df2b20366cb1d0000000100000010000000885010358d29a38f059b028559c95f900b00000001000000100000005300650063007400690067006f0000000300000001000000140000002b8f1b57330dbba2d07a6c51f70ee90ddab9ad8e190000000100000010000000ea6089055218053dd01e37e1d806eedf2000000001000000e2050000308205de308203c6a003020102021001fd6d30fca3ca51a81bbc640e35032d300d06092a864886f70d01010c0500308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f72697479301e170d3130303230313030303030305a170d3338303131383233353935395a308188310b3009060355040613025553311330110603550408130a4e6577204a6572736579311430120603550407130b4a65727365792043697479311e301c060355040a131554686520555345525452555354204e6574776f726b312e302c06035504031325555345525472757374205253412043657274696669636174696f6e20417574686f7269747930820222300d06092a864886f70d01010105000382020f003082020a028202010080126517360ec3db08b3d0ac570d76edcd27d34cad508361e2aa204d092d6409dcce899fcc3da9ecf6cfc1dcf1d3b1d67b3728112b47da39c6bc3a19b45fa6bd7d9da36342b676f2a93b2b91f8e26fd0ec162090093ee2e874c918b491d46264db7fa306f188186a90223cbcfe13f087147bf6e41f8ed4e451c61167460851cb8614543fbc33fe7e6c9cff169d18bd518e35a6a766c87267db2166b1d49b7803c0503ae8ccf0dcbc9e4cfeaf0596351f575ab7ffcef93db72cb6f654ddc8e7123a4dae4c8ab75c9ab4b7203dca7f2234ae7e3b68660144e7014e46539b3360f794be5337907343f332c353efdbaafe744e69c76b8c6093dec4c70cdfe132aecc933b517895678bee3d56fe0cd0690f1b0ff325266b336df76e47fa7343e57e0ea566b1297c3284635589c40dc19354301913acd37d37a7eb5d3a6c355cdb41d712daa9490bdfd8808a0993628eb566cf2588cd84b8b13fa4390fd9029eeb124c957cf36b05a95e1683ccb867e2e8139dcc5b82d34cb3ed5bffdee573ac233b2d00bf3555740949d849581a7f9236e651920ef3267d1c4d17bcc9ec4326d0bf415f40a94444f499e757879e501f5754a83efd74632fb1506509e658422e431a4cb4f0254759fa041e93d426464a5081b2debe78b7fc6715e1c957841e0f63d6e962bad65f552eea5cc62808042539b80e2ba9f24c971c073f0d52f5edef2f820f0203010001a3423040301d0603551d0e041604145379bf5aaa2b4acf5480e1d89bc09df2b20366cb300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff300d06092a864886f70d01010c050003820201005cd47c0dcff7017d4199650c73c5529fcbf8cf99067f1bda43159f9e0255579614f1523c27879428ed1f3a0137a276fc5350c0849bc66b4eba8c214fa28e556291f36915d8bc88e3c4aa0bfdefa8e94b552a06206d55782919ee5f305c4b241155ff249a6e5e2a2bee0b4d9f7ff70138941495430709fb60a9ee1cab128ca09a5ea7986a596d8b3f08fbc8d145af18156490120f73282ec5e2244efc58ecf0f445fe22b3eb2f8ed2d9456105c1976fa876728f8b8c36afbf0d05ce718de6a66f1f6ca67162c5d8d083720cf16711890c9c134c7234dfbcd571dfaa71dde1b96c8c3c125d65dabd5712b6436bffe5de4d661151cf99aeec17b6e871918cde49fedd3571a21527941ccf61e326bb6fa36725215de6dd1d0b2e681b3b82afec836785d4985174b1b9998089ff7f78195c794a602e9240ae4c372a2cc9c762c80e5df7365bcae0252501b4dd1a079c77003fd0dcd5ec3dd4fabb3fcc85d66f7fa92ddfb902f7f5979ab535dac367b0874aa9289e238eff5c276be1b04ff307ee002ed45987cb524195eaf447d7ee6441557c8d590295dd629dc2b9ee5a287484a59bb790c70c07dff589367432d628c1b0b00be09c4cc31cd6fce369b54746812fa282abd3634470c48dff2d33baad8f7bb57088ae3e19cf4028d8fcc890bb5d9922f552e658c51f883143ee881dd7c68e3c436a1da718de7d3d16f162f9ca90a8fd ServiceHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c7e00000001000000080000000000042beb77d5017a000000010000000c000000300a06082b060105050703097f000000010000000c000000300a06082b060105050703091d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c990b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b060105050703080f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 saBSI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\02FAF3E291435468607857694DF5E45B68851868\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 ServiceHost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 ServiceHost.exe -
Suspicious behavior: EnumeratesProcesses 204 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exey1m.exesaBSI.exepid process 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 3444 y1m.exe 3444 y1m.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe 3388 saBSI.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
filezilla.exepid process 3464 filezilla.exe -
Suspicious use of AdjustPrivilegeToken 158 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exedescription pid process Token: SeShutdownPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeCreatePagefilePrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe Token: SeDebugPrivilege 408 FileZilla_3.50.0_win64_sponsored-setup.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
y1m.exepid process 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe -
Suspicious use of SendNotifyMessage 5 IoCs
Processes:
y1m.exepid process 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe 3444 y1m.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.exey1m.exefilezilla.exepid process 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 408 FileZilla_3.50.0_win64_sponsored-setup.exe 3444 y1m.exe 3444 y1m.exe 3464 filezilla.exe 3464 filezilla.exe -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
FileZilla_3.50.0_win64_sponsored-setup.execmd.execmd.exesaBSI.exeinstaller.exeinstaller.exeregsvr32.exeregsvr32.exeServiceHost.exeregsvr32.exeupdater.exedescription pid process target process PID 408 wrote to memory of 3944 408 FileZilla_3.50.0_win64_sponsored-setup.exe regsvr32.exe PID 408 wrote to memory of 3944 408 FileZilla_3.50.0_win64_sponsored-setup.exe regsvr32.exe PID 408 wrote to memory of 3796 408 FileZilla_3.50.0_win64_sponsored-setup.exe cmd.exe PID 408 wrote to memory of 3796 408 FileZilla_3.50.0_win64_sponsored-setup.exe cmd.exe PID 408 wrote to memory of 3796 408 FileZilla_3.50.0_win64_sponsored-setup.exe cmd.exe PID 3796 wrote to memory of 2032 3796 cmd.exe cmd.exe PID 3796 wrote to memory of 2032 3796 cmd.exe cmd.exe PID 3796 wrote to memory of 2032 3796 cmd.exe cmd.exe PID 2032 wrote to memory of 3444 2032 cmd.exe y1m.exe PID 2032 wrote to memory of 3444 2032 cmd.exe y1m.exe PID 2032 wrote to memory of 3444 2032 cmd.exe y1m.exe PID 408 wrote to memory of 3388 408 FileZilla_3.50.0_win64_sponsored-setup.exe saBSI.exe PID 408 wrote to memory of 3388 408 FileZilla_3.50.0_win64_sponsored-setup.exe saBSI.exe PID 408 wrote to memory of 3388 408 FileZilla_3.50.0_win64_sponsored-setup.exe saBSI.exe PID 3388 wrote to memory of 3264 3388 saBSI.exe installer.exe PID 3388 wrote to memory of 3264 3388 saBSI.exe installer.exe PID 408 wrote to memory of 3464 408 FileZilla_3.50.0_win64_sponsored-setup.exe filezilla.exe PID 408 wrote to memory of 3464 408 FileZilla_3.50.0_win64_sponsored-setup.exe filezilla.exe PID 3264 wrote to memory of 3332 3264 installer.exe installer.exe PID 3264 wrote to memory of 3332 3264 installer.exe installer.exe PID 3332 wrote to memory of 4012 3332 installer.exe sc.exe PID 3332 wrote to memory of 4012 3332 installer.exe sc.exe PID 3332 wrote to memory of 3500 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 3500 3332 installer.exe regsvr32.exe PID 3500 wrote to memory of 4152 3500 regsvr32.exe regsvr32.exe PID 3500 wrote to memory of 4152 3500 regsvr32.exe regsvr32.exe PID 3500 wrote to memory of 4152 3500 regsvr32.exe regsvr32.exe PID 3332 wrote to memory of 4188 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 4188 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 4224 3332 installer.exe sc.exe PID 3332 wrote to memory of 4224 3332 installer.exe sc.exe PID 3332 wrote to memory of 4272 3332 installer.exe sc.exe PID 3332 wrote to memory of 4272 3332 installer.exe sc.exe PID 3332 wrote to memory of 4640 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 4640 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 4652 3332 installer.exe sc.exe PID 3332 wrote to memory of 4652 3332 installer.exe sc.exe PID 4640 wrote to memory of 4696 4640 regsvr32.exe regsvr32.exe PID 4640 wrote to memory of 4696 4640 regsvr32.exe regsvr32.exe PID 4640 wrote to memory of 4696 4640 regsvr32.exe regsvr32.exe PID 3332 wrote to memory of 4796 3332 installer.exe regsvr32.exe PID 3332 wrote to memory of 4796 3332 installer.exe regsvr32.exe PID 4748 wrote to memory of 1928 4748 ServiceHost.exe UIHost.exe PID 4748 wrote to memory of 1928 4748 ServiceHost.exe UIHost.exe PID 4748 wrote to memory of 4472 4748 ServiceHost.exe regsvr32.exe PID 4748 wrote to memory of 4472 4748 ServiceHost.exe regsvr32.exe PID 4472 wrote to memory of 4428 4472 regsvr32.exe regsvr32.exe PID 4472 wrote to memory of 4428 4472 regsvr32.exe regsvr32.exe PID 4472 wrote to memory of 4428 4472 regsvr32.exe regsvr32.exe PID 4748 wrote to memory of 4496 4748 ServiceHost.exe regsvr32.exe PID 4748 wrote to memory of 4496 4748 ServiceHost.exe regsvr32.exe PID 4748 wrote to memory of 4780 4748 ServiceHost.exe updater.exe PID 4748 wrote to memory of 4780 4748 ServiceHost.exe updater.exe PID 4780 wrote to memory of 728 4780 updater.exe cmd.exe PID 4780 wrote to memory of 728 4780 updater.exe cmd.exe PID 4780 wrote to memory of 4632 4780 updater.exe cmd.exe PID 4780 wrote to memory of 4632 4780 updater.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FileZilla_3.50.0_win64_sponsored-setup.exe"C:\Users\Admin\AppData\Local\Temp\FileZilla_3.50.0_win64_sponsored-setup.exe"1⤵
- Loads dropped DLL
- Checks for any installed AV software in registry
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\FileZilla FTP Client\fzshellext_64.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /d /c cmd /d /c C:\Users\Admin\AppData\Local\Temp\0ja\y1m.exe /covr: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 /mnl2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /d /c C:\Users\Admin\AppData\Local\Temp\0ja\y1m.exe /covr:XTBfVA98Yjx7CBJPQSc9LC1ISEgDJiE8Zk5EEQg7MHR8Xh4XEzMxGlFyYl8ONi0ST39jTRotL3B0RFsVHCF2e2lVEw8Me3BgYXYxIyI5ZG12ZiosOyMXalJPcjA7Ix5RZG17JmkkNXU9e3s0cD5GchlSIyhwPk9JL3AqPiIjbmofEV5YLyFnahwQUVokImRrFRFpOVBWNnIVD2kiVFshfQAUfjlBQD8ELCgLCWFnT1wtIhwDbm1YRjE9GRJ5AClRA3gYCDMtKUoCfRgJMz8pUAN+GAEyNilNA3EYFDMwKVECdRkVMyErTwJ1GhYyJytQA3MaGDI/K18DcRoGMj4rQQBkGhd0JypZAGQaEHQnKlYAZBoFdCcqUQBkGhh0ICpVAGMaE3QgKkIAYhobdCEqUgBiGgJ0ISpAAGUaA3QmKkUAZRoUdCYqRABgGB4yNipEP3FmC30wKlQrcXgHFkMrc0RzbUMIQyJzX3J0QwxCN3NEcnJDCUI3cl9yeUIeQjRyWzZmCCNCNDhlcG0JJ0EhOGFwZggnQSo5bnB6CTRBNjh9cH8JKQQ9fXtwdQkpQDQ5enFiCTJANjh1cWcJPEA3OH80ZUIHBjY2VTZlBh4GLDZON3oGGAc3N043dAcGBzE3RTd6QxdNAjdTf1NDGwsBc147V0MbCxlzTzpPQxwKGHJKOlVCCwocckU7SkIDCwVyUTtIQwcLC3NLO0RDGAsBc1x/UwkkCwE4ZjlWCTAIHjhkOVIJIwgEOGw5QgkvCAo4eTlYCTAIHjhyOU4JI00cfWs5Tk0uCRh9azlWTT8IAH1sOFdMOggafHs4U0w1CQV8czlKTCEJB313OURNOwkLfWg5Tk0sCBh9eDhRTTUIFH16OEFNLkwTN1Y4QQYeCRU3UjhSBgQJHTdCOF4GCgkIN1g4QQYeCQM3TjhSBhgKCDdUO0AGBAoGNF04XEAPTBQ0XXxRBAtMFDRFfEAFE0wTNUR9RQUJTQQ1QH1KBBZNDDRZfV4EFEwINFd8RAQYTBc0XXxTBQtMHDVZfUoFDU0DNUB9RgUPTRM1WzlBTyNNE35rfEdPJ00AfnF8T083TQx+f3xaTy1NE35rfFFPO00Afm18Rk8uTRB9dHxcTDxNDH16f1VPIAsHO2h/VQogTgE7bH9GCzxOBTp6f1cLKk4VOmh+XAosCg5wVHNLBBAJMXBYfWNBDEwhc1h+eEILTj9zTX92QhwLJDhkOmsJMAsiOHI6ckw6TiB9bn9iTzpNO35ufHhPK0w/fm19dk88CSQ1RDh+BxdMLDZQfXgHGEwoc0o2UAcYBx42XjZXBw8HATZNNVlCH0ERNk1zSQcZQgA1QHNQQRIJKDVAO3BBAgkic1p9YAccCSFzWnBjQQhCNjhKO3UIGwkgOFc4dkwRTDV8RH5vThxMNn9bfXpPFU0zflN9d04GTyF8XH5tTgVPOTR/NnsFK08+NXp/fAQsCy42fX9mBC4LNDVpOmAEIQswcHNxSAQhQAY1Z3FPBDZAGTV0ckAEOEMRcGo3WQQ4BQE1bDRIBzUFGHNnf2AHNU4vc3Q0VgcwTRJ+czlRTyJNFjtgNFRCJQUHNmJ8QkImCAM2ZXxEBzZNEDZ5NFVCPgUBc2p8RUI7BQFzazRQCRJAEzhAcUJMAQUQflBxWEwDBQp9RDReTAwFDjhef3ZMDE44fUp/cUwbTid9WDp1CRBOJztIf3MKAU0qO1E5eEEpTSo1e397QTNNKDVhfG8ENU0nNWU5dU8dTSd+U3xhTxpNMH5MfH8KHgg3fkw6b08YCyZ9QTp2CRNADn1BNFxPEEAUfUM0RkwEBRJ9TDRCCR5OOn1Mf3RMCk49fVt/a0wZTiQ4SzpsTBkINH1NOX1PFAgtO0ZyVU8CQAQ7SnJXTxhDEH5MclhPHAYKNWRyWAQqQx41Y3JPBDVDDTV2N19BPkMNc2ZyWUIvQABzfzRSCQdAFjtWNF4JBUAMOEJxWAkKQAh9WDpwCQoLPjhMOncJHQshOE86Y0wdTis4T3xzCRtNOjtCfGpPEAYSO0JyQAkTBgg7QHJaCgdDDjtPcl5PHQgmO085aAoJCCE7WDl3CgoINTtIfGdPAAg1fVg5YUwRCzh9QX9qBzkLLjVof2YHOws0Nnw6YAc0CzBzZnFIBzRABjZycU8HI0AZNmtxXwc6QA9zaDRHBzoGHzZuN1YENwYGcGV8fgQ3CDpwZTprQT1OIzVvfmAFK04uNW5+ewQ4Tig0fX56BCtOPzR5Om1OAU4/f0x8ZU0WTSB8VDdYCBFDHTpGcUoIEQUIfFc0T00bBhV8SzdYTRtDH3xccUZOBkAWfFxxRggaQBQ5XHFcTRkFDjlRcVwJEkEYOVxxTQkPQBs5XHBeCQ5ACDlLcFpNGQoiOUs7bwsRCTU6VDh3QCxMMjRpfWYFLEwjcWp9ZEAmTz5xdn5zQCYKNHFhOG1DOwk9cWE4bQUnCT80YTh3QCRMJTRsOHcEIwgxNHE5ZwQiCSI0cDl0BDUJJnBnc14ENUITNm9wSQcqCjFzb350ByBOOzdmfmlDKQovcm47Y0A0CjNxeTtjBT4KJDdnOH4GNwokN2d+YgY1TyQ3fTthQy9PKTd9f2cHOE8wNm5/dAYhTzk2YH9wBi5PI3J8NVtDMwQPcno1TUMqBxxOeVBRGDwCbCoSMkIbIj8XSW4Cfz0aPxFv /mnl3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0ja\y1m.exeC:\Users\Admin\AppData\Local\Temp\0ja\y1m.exe /covr:XTBfVA98Yjx7CBJPQSc9LC1ISEgDJiE8Zk5EEQg7MHR8Xh4XEzMxGlFyYl8ONi0ST39jTRotL3B0RFsVHCF2e2lVEw8Me3BgYXYxIyI5ZG12ZiosOyMXalJPcjA7Ix5RZG17JmkkNXU9e3s0cD5GchlSIyhwPk9JL3AqPiIjbmofEV5YLyFnahwQUVokImRrFRFpOVBWNnIVD2kiVFshfQAUfjlBQD8ELCgLCWFnT1wtIhwDbm1YRjE9GRJ5AClRA3gYCDMtKUoCfRgJMz8pUAN+GAEyNilNA3EYFDMwKVECdRkVMyErTwJ1GhYyJytQA3MaGDI/K18DcRoGMj4rQQBkGhd0JypZAGQaEHQnKlYAZBoFdCcqUQBkGhh0ICpVAGMaE3QgKkIAYhobdCEqUgBiGgJ0ISpAAGUaA3QmKkUAZRoUdCYqRABgGB4yNipEP3FmC30wKlQrcXgHFkMrc0RzbUMIQyJzX3J0QwxCN3NEcnJDCUI3cl9yeUIeQjRyWzZmCCNCNDhlcG0JJ0EhOGFwZggnQSo5bnB6CTRBNjh9cH8JKQQ9fXtwdQkpQDQ5enFiCTJANjh1cWcJPEA3OH80ZUIHBjY2VTZlBh4GLDZON3oGGAc3N043dAcGBzE3RTd6QxdNAjdTf1NDGwsBc147V0MbCxlzTzpPQxwKGHJKOlVCCwocckU7SkIDCwVyUTtIQwcLC3NLO0RDGAsBc1x/UwkkCwE4ZjlWCTAIHjhkOVIJIwgEOGw5QgkvCAo4eTlYCTAIHjhyOU4JI00cfWs5Tk0uCRh9azlWTT8IAH1sOFdMOggafHs4U0w1CQV8czlKTCEJB313OURNOwkLfWg5Tk0sCBh9eDhRTTUIFH16OEFNLkwTN1Y4QQYeCRU3UjhSBgQJHTdCOF4GCgkIN1g4QQYeCQM3TjhSBhgKCDdUO0AGBAoGNF04XEAPTBQ0XXxRBAtMFDRFfEAFE0wTNUR9RQUJTQQ1QH1KBBZNDDRZfV4EFEwINFd8RAQYTBc0XXxTBQtMHDVZfUoFDU0DNUB9RgUPTRM1WzlBTyNNE35rfEdPJ00AfnF8T083TQx+f3xaTy1NE35rfFFPO00Afm18Rk8uTRB9dHxcTDxNDH16f1VPIAsHO2h/VQogTgE7bH9GCzxOBTp6f1cLKk4VOmh+XAosCg5wVHNLBBAJMXBYfWNBDEwhc1h+eEILTj9zTX92QhwLJDhkOmsJMAsiOHI6ckw6TiB9bn9iTzpNO35ufHhPK0w/fm19dk88CSQ1RDh+BxdMLDZQfXgHGEwoc0o2UAcYBx42XjZXBw8HATZNNVlCH0ERNk1zSQcZQgA1QHNQQRIJKDVAO3BBAgkic1p9YAccCSFzWnBjQQhCNjhKO3UIGwkgOFc4dkwRTDV8RH5vThxMNn9bfXpPFU0zflN9d04GTyF8XH5tTgVPOTR/NnsFK08+NXp/fAQsCy42fX9mBC4LNDVpOmAEIQswcHNxSAQhQAY1Z3FPBDZAGTV0ckAEOEMRcGo3WQQ4BQE1bDRIBzUFGHNnf2AHNU4vc3Q0VgcwTRJ+czlRTyJNFjtgNFRCJQUHNmJ8QkImCAM2ZXxEBzZNEDZ5NFVCPgUBc2p8RUI7BQFzazRQCRJAEzhAcUJMAQUQflBxWEwDBQp9RDReTAwFDjhef3ZMDE44fUp/cUwbTid9WDp1CRBOJztIf3MKAU0qO1E5eEEpTSo1e397QTNNKDVhfG8ENU0nNWU5dU8dTSd+U3xhTxpNMH5MfH8KHgg3fkw6b08YCyZ9QTp2CRNADn1BNFxPEEAUfUM0RkwEBRJ9TDRCCR5OOn1Mf3RMCk49fVt/a0wZTiQ4SzpsTBkINH1NOX1PFAgtO0ZyVU8CQAQ7SnJXTxhDEH5MclhPHAYKNWRyWAQqQx41Y3JPBDVDDTV2N19BPkMNc2ZyWUIvQABzfzRSCQdAFjtWNF4JBUAMOEJxWAkKQAh9WDpwCQoLPjhMOncJHQshOE86Y0wdTis4T3xzCRtNOjtCfGpPEAYSO0JyQAkTBgg7QHJaCgdDDjtPcl5PHQgmO085aAoJCCE7WDl3CgoINTtIfGdPAAg1fVg5YUwRCzh9QX9qBzkLLjVof2YHOws0Nnw6YAc0CzBzZnFIBzRABjZycU8HI0AZNmtxXwc6QA9zaDRHBzoGHzZuN1YENwYGcGV8fgQ3CDpwZTprQT1OIzVvfmAFK04uNW5+ewQ4Tig0fX56BCtOPzR5Om1OAU4/f0x8ZU0WTSB8VDdYCBFDHTpGcUoIEQUIfFc0T00bBhV8SzdYTRtDH3xccUZOBkAWfFxxRggaQBQ5XHFcTRkFDjlRcVwJEkEYOVxxTQkPQBs5XHBeCQ5ACDlLcFpNGQoiOUs7bwsRCTU6VDh3QCxMMjRpfWYFLEwjcWp9ZEAmTz5xdn5zQCYKNHFhOG1DOwk9cWE4bQUnCT80YTh3QCRMJTRsOHcEIwgxNHE5ZwQiCSI0cDl0BDUJJnBnc14ENUITNm9wSQcqCjFzb350ByBOOzdmfmlDKQovcm47Y0A0CjNxeTtjBT4KJDdnOH4GNwokN2d+YgY1TyQ3fTthQy9PKTd9f2cHOE8wNm5/dAYhTzk2YH9wBi5PI3J8NVtDMwQPcno1TUMqBxxOeVBRGDwCbCoSMkIbIj8XSW4Cfz0aPxFv /mnl4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\saBSI.exe"C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\saBSI.exe" /affid 91088 PaidDistribution=true InstallID=yDyCzzzztD0DyE0E0A0C0B0EyBtC0CyE2RtBtDtBtDtDzytBtAtCyCtDzztByDtCtCtA Pixel=29Q8RpuLYEOe+Ww+7/4aPpmMG0+IzjwPk49oSZ6NYUmdjG5Llo9tSp+OfhTI2z0Jk+o9Ge/ZLhLd0ipdzc87SJyAak+Xi2FJnoprS/5MAAAArr1Yew==2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\installer.exe"C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\installer.exe"C:\Program Files\McAfee\WebAdvisor\Temp1156428362\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\sc.exesc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"5⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll"6⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll"5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SYSTEM32\sc.exesc.exe description "McAfee WebAdvisor" "McAfee WebAdvisor Service"5⤵
-
C:\Windows\SYSTEM32\sc.exesc.exe failure "McAfee WebAdvisor" reset= 3600 actions= restart/1/restart/1000/restart/3000/restart/30000/restart/1800000//05⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll"6⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\SYSTEM32\sc.exesc.exe start "McAfee WebAdvisor"5⤵
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32.exe /s "C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll"5⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Program Files\FileZilla FTP Client\filezilla.exe"C:\Program Files\FileZilla FTP Client\filezilla.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe"C:\Program Files\McAfee\WebAdvisor\UIHost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s "C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll"3⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll"2⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Program Files\McAfee\WebAdvisor\updater.exe"C:\Program Files\McAfee\WebAdvisor\updater.exe"2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IF EXIST "C:\Program Files\McAfee\WebAdvisor\Download" ( DEL "C:\Program Files\McAfee\WebAdvisor\Download\*.bak" )3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\FileZilla FTP Client\filezilla.exe
-
C:\Program Files\FileZilla FTP Client\fzshellext_64.dll
-
C:\Program Files\FileZilla FTP Client\libfilezilla-9.dll
-
C:\Program Files\FileZilla FTP Client\libgcc_s_seh-1.dll
-
C:\Program Files\FileZilla FTP Client\libgmp-10.dll
-
C:\Program Files\FileZilla FTP Client\libgnutls-30.dll
-
C:\Program Files\FileZilla FTP Client\libhogweed-6.dll
-
C:\Program Files\FileZilla FTP Client\libnettle-8.dll
-
C:\Program Files\FileZilla FTP Client\libpng16-16.dll
-
C:\Program Files\FileZilla FTP Client\libsqlite3-0.dll
-
C:\Program Files\FileZilla FTP Client\libstdc++-6.dll
-
C:\Program Files\FileZilla FTP Client\resources\16x16\unknown.png
-
C:\Program Files\FileZilla FTP Client\resources\48x48\filezilla.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\cancel.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\close.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\compare.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\disconnect.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\dropdown.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\file.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\filter.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\find.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\folder.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\leds.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\localtreeview.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\logview.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\processqueue.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\queueview.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\reconnect.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\refresh.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\remotetreeview.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\server.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\sitemanager.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\sort_down_dark.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\sort_up_dark.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\speedlimits.png
-
C:\Program Files\FileZilla FTP Client\resources\default\480x480\synchronize.png
-
C:\Program Files\FileZilla FTP Client\resources\default\theme.xml
-
C:\Program Files\FileZilla FTP Client\resources\defaultfilters.xml
-
C:\Program Files\FileZilla FTP Client\zlib1.dll
-
C:\Program Files\McAfee\WebAdvisor\EventManager.dll
-
C:\Program Files\McAfee\WebAdvisor\Ext18E4.tmp
-
C:\Program Files\McAfee\WebAdvisor\LogicModule.dll
-
C:\Program Files\McAfee\WebAdvisor\LookupManager.dll
-
C:\Program Files\McAfee\WebAdvisor\MFW\core\json.luc
-
C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\browserUtils.luc
-
C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\common_utils.luc
-
C:\Program Files\McAfee\WebAdvisor\MFW\core\utils\stringUtils.luc
-
C:\Program Files\McAfee\WebAdvisor\MFW\core\win32helper.luc
-
C:\Program Files\McAfee\WebAdvisor\Resource.dll
-
C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe
-
C:\Program Files\McAfee\WebAdvisor\SettingManager.dll
-
C:\Program Files\McAfee\WebAdvisor\TaskManager.dll
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\browserhost.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\browserplugin.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\downloadscan.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\eventmanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\ieplugin.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\installer.exe
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\installer.exe
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\l10n.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\logicmodule.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\logicscripts.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\lookupmanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\mfw-mwb.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\mfw-nps.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\mfw-webadvisor.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\mfw.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\resourcedll.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\servicehost.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\settingmanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\taskmanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\telemetry.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\uihost.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\uimanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\uninstaller.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\updater.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\wataskmanager.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\webadvisor.cab
-
C:\Program Files\McAfee\WebAdvisor\Temp1156428362\wssdep.cab
-
C:\Program Files\McAfee\WebAdvisor\UIHost.exe
-
C:\Program Files\McAfee\WebAdvisor\UIManager.dll
-
C:\Program Files\McAfee\WebAdvisor\WATaskManager.dll
-
C:\Program Files\McAfee\WebAdvisor\e10ssaffplg.xpi
-
C:\Program Files\McAfee\WebAdvisor\logic\MiscUtils.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\base_provider.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\ff_monitor.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\logic_loader.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\oem_business_logic.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\providers\bing.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\providers\duckduckgo.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\providers\yahoo.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\providers\yandex.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\providers_selector.luc
-
C:\Program Files\McAfee\WebAdvisor\logic\ss_logic.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\PostInit.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\PriorityQueue.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\UiArbitratorHelper.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\UiHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\UiThreadExitHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\class.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\dkjson.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\handlers.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\init.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\logger.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\triggeracceptor.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\utils\PackageUtils.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\utils\SettingsDB.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\core\utils\Telemetry.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\mwb\mwbhandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\nps\npshandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\atp_upsell_toast_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\av_scan_upsell_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\checklisthandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\chrome_extension_push_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\ext_install_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\overlay_ui_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\productupselltoast.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\securesearchhandler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\upsell_checklist.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\upsell_toast_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\mfw\packages\webadvisor\wacsecuresearchl10n.luc
-
C:\Program Files\McAfee\WebAdvisor\servicehost.exe
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\DimensionConfig.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\DimensionHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\DimensionProcessor.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\BaseAffidLookup.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\BingPartnerCode.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ChromeBasedBrowserVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\CurrentBrowserVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\DaysSinceSettingsDBLookup.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\DefaultBrowser.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\EventSupplied.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ExternalUtilityFunction.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\FeatureTrackingFeature.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\FirefoxVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ISBIsSecureSearch.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\InstallDate.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\LastBrowserUsed.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\LastOEMCheck.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\Locale.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\OSFlavour.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\PercentageHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\PostUpdateRebootTimeLookup.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ProfilesCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ProxySubTypeHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\ProxyTypeHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\RegistryLookup.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\SearchAnnotations.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\SequenceNumber.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\SettingsDBLookup.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\StaticValue.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\SuiteStatus.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\TelemetryVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\UpdatePending.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\UpdatePendingVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSAffid.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSCSPID.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSEulaDate.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSPackageType.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSSetting.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSSettingExpiry.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\dimensions\handlers\WSSVersion.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\EventFormatter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\EventHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\EventTransmitter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\HandleOnNavigate.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\SendOnPing.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryConfig.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\TelemetryHandler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\formatters\EventFormatter_JSON.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\AdblockCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\BlockPage.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\BrowserNavigate.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\CommonLogicLoader.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\DailyCounters.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\DailyPing.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\DomainNavigatedCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\DownloadScan.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\LogicScriptError.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\MetricCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\NavigatedToday.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\NewTabCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\SMAReputationCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\SearchSuggestCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\SearchTerm.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\SecureSearchHit.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\SendImmediately.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\WABadgeNotificationCounter.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\WSSAnalytics.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\WSSAnalyticsRaw.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\browser_host_launchers_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\handlers\ipc_stats_handler.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\transmitters\Transmit_Azure.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\events\version.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\SecureSearchStateChange.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\ToastCheckCompleted.luc
-
C:\Program Files\McAfee\WebAdvisor\telemetry\serializers\ToastCheckTriggered.luc
-
C:\Program Files\McAfee\WebAdvisor\uihost.exe
-
C:\Program Files\McAfee\WebAdvisor\updater.exe
-
C:\Program Files\McAfee\WebAdvisor\updater.exe
-
C:\Program Files\McAfee\WebAdvisor\win32\DownloadScan.dll
-
C:\Program Files\McAfee\WebAdvisor\win32\IEPlugin.dll
-
C:\Program Files\McAfee\WebAdvisor\win32\WSSDep.dll
-
C:\Program Files\McAfee\WebAdvisor\x64\DownloadScan.dll
-
C:\Program Files\McAfee\WebAdvisor\x64\IEPlugin.dll
-
C:\Program Files\McAfee\WebAdvisor\x64\WSSDep.dll
-
C:\Users\Admin\AppData\Local\Temp\0ja\y1m.exe
-
C:\Users\Admin\AppData\Local\Temp\0ja\y1m.exe
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\installer.exe
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\installer.exe
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\saBSI.exe
-
C:\Users\Admin\AppData\Local\Temp\ns20813EE1\2D6B7D05_stp\saBSI.exe
-
C:\Users\Admin\AppData\Roaming\fnt_0F1L1I1P0Z1L1I1I1T1V0N1P2WtJ1V0W1L1G2T1L1EtCzy.txt
-
C:\Users\Admin\AppData\Roaming\fnt_1N1I1F1S1T1I0M1F1Q2Y1I1P1B0C1F1Q1P.txt
-
\??\pipe\{FE05D378-5232-474D-B693-510024A75B82}
-
\??\pipe\{FE05D378-5232-474D-B693-510024A75B82}
-
\Program Files\FileZilla FTP Client\fzshellext.dll
-
\Program Files\FileZilla FTP Client\fzshellext_64.dll
-
\Program Files\FileZilla FTP Client\libfilezilla-9.dll
-
\Program Files\FileZilla FTP Client\libgcc_s_seh-1.dll
-
\Program Files\FileZilla FTP Client\libgmp-10.dll
-
\Program Files\FileZilla FTP Client\libgnutls-30.dll
-
\Program Files\FileZilla FTP Client\libhogweed-6.dll
-
\Program Files\FileZilla FTP Client\libnettle-8.dll
-
\Program Files\FileZilla FTP Client\libpng16-16.dll
-
\Program Files\FileZilla FTP Client\libsqlite3-0.dll
-
\Program Files\FileZilla FTP Client\libstdc++-6.dll
-
\Program Files\FileZilla FTP Client\zlib1.dll
-
\Program Files\McAfee\WebAdvisor\eventmanager.dll
-
\Program Files\McAfee\WebAdvisor\logicmodule.dll
-
\Program Files\McAfee\WebAdvisor\lookupmanager.dll
-
\Program Files\McAfee\WebAdvisor\settingmanager.dll
-
\Program Files\McAfee\WebAdvisor\taskmanager.dll
-
\Program Files\McAfee\WebAdvisor\uimanager.dll
-
\Program Files\McAfee\WebAdvisor\wataskmanager.dll
-
\Program Files\McAfee\WebAdvisor\win32\downloadscan.dll
-
\Program Files\McAfee\WebAdvisor\win32\ieplugin.dll
-
\Program Files\McAfee\WebAdvisor\win32\wssdep.dll
-
\Program Files\McAfee\WebAdvisor\x64\downloadscan.dll
-
\Program Files\McAfee\WebAdvisor\x64\ieplugin.dll
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dll
-
\Program Files\McAfee\WebAdvisor\x64\wssdep.dll
-
\Users\Admin\AppData\Local\Temp\inH259367375574\libeay32.dll
-
\Users\Admin\AppData\Local\Temp\inH259367375574\ssleay32.dll
-
\Users\Admin\AppData\Local\Temp\nsd25932204626964\libeay32.dll
-
\Users\Admin\AppData\Local\Temp\nsd25932204626964\ssleay32.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\INetC.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\INetC.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\Math.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\StartMenu.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\System.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\UAC.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\UserInfo.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\nsDialogs.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\nsis_appid.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\nsis_appid.dll
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\nsxE5E5.tmp
-
\Users\Admin\AppData\Local\Temp\nszAAFD.tmp\nsxE5E5.tmp
-
memory/408-7-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/408-4-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/408-5-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/408-21-0x0000000006E10000-0x0000000006E11000-memory.dmpFilesize
4KB
-
memory/408-9-0x00000000033F0000-0x00000000033F1000-memory.dmpFilesize
4KB
-
memory/408-20-0x0000000007610000-0x0000000007611000-memory.dmpFilesize
4KB
-
memory/408-19-0x0000000006E10000-0x0000000006E11000-memory.dmpFilesize
4KB
-
memory/408-14-0x0000000006280000-0x0000000006764000-memory.dmpFilesize
4.9MB
-
memory/728-949-0x0000000000000000-mapping.dmp
-
memory/1928-811-0x0000000000000000-mapping.dmp
-
memory/1928-857-0x00007FFA03D20000-0x00007FFA03D30000-memory.dmpFilesize
64KB
-
memory/2032-481-0x0000000000000000-mapping.dmp
-
memory/3264-618-0x0000000000000000-mapping.dmp
-
memory/3332-712-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-720-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-642-0x0000000000000000-mapping.dmp
-
memory/3332-668-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-697-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-698-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-699-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-703-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-702-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-783-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-704-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-782-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-781-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-780-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-779-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-778-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-777-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-776-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-706-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-707-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-775-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-708-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-774-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-773-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-772-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-771-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-709-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-770-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-710-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-769-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-711-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-768-0x00007FF5E5990000-0x00007FF5E59A0000-memory.dmpFilesize
64KB
-
memory/3332-766-0x00007FF62CD10000-0x00007FF62CD20000-memory.dmpFilesize
64KB
-
memory/3332-767-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-761-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-765-0x00007FF5E5990000-0x00007FF5E59A0000-memory.dmpFilesize
64KB
-
memory/3332-764-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-763-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-757-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-762-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-756-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-760-0x00007FF62CD10000-0x00007FF62CD20000-memory.dmpFilesize
64KB
-
memory/3332-759-0x00007FF5E5990000-0x00007FF5E59A0000-memory.dmpFilesize
64KB
-
memory/3332-758-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-754-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-755-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-753-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-752-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-751-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-750-0x00007FF630310000-0x00007FF630320000-memory.dmpFilesize
64KB
-
memory/3332-749-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-713-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-714-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-715-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-716-0x00007FF627520000-0x00007FF627530000-memory.dmpFilesize
64KB
-
memory/3332-717-0x00007FF619C50000-0x00007FF619C60000-memory.dmpFilesize
64KB
-
memory/3332-739-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-738-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-737-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-736-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-735-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-734-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-733-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-732-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-731-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-730-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-729-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-728-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-727-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-726-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-725-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-724-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-718-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3332-723-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-719-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-722-0x00007FF5CD180000-0x00007FF5CD190000-memory.dmpFilesize
64KB
-
memory/3332-721-0x00007FF631750000-0x00007FF631760000-memory.dmpFilesize
64KB
-
memory/3388-487-0x0000000000000000-mapping.dmp
-
memory/3444-599-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-608-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-496-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/3444-617-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-616-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-511-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-615-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-614-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-613-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-612-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-482-0x0000000000000000-mapping.dmp
-
memory/3444-485-0x0000000002760000-0x00000000029A1000-memory.dmpFilesize
2.3MB
-
memory/3444-486-0x0000000002760000-0x00000000029A1000-memory.dmpFilesize
2.3MB
-
memory/3444-495-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-610-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-490-0x00000000039B0000-0x0000000003E83000-memory.dmpFilesize
4.8MB
-
memory/3444-609-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-584-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-607-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-606-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-518-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-504-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-497-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-533-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-534-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-536-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-537-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-605-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-538-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-582-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-550-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-559-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-564-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-572-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-604-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-603-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-580-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-581-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/3444-547-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-601-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-579-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/3444-585-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-586-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/3444-587-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-588-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-589-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-590-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-591-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-592-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-593-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-594-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-595-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-596-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-602-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-597-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-598-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3444-600-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/3464-620-0x0000000000000000-mapping.dmp
-
memory/3500-705-0x0000000000000000-mapping.dmp
-
memory/3796-480-0x0000000000000000-mapping.dmp
-
memory/3944-477-0x0000000000000000-mapping.dmp
-
memory/4012-700-0x0000000000000000-mapping.dmp
-
memory/4152-741-0x0000000000000000-mapping.dmp
-
memory/4188-743-0x0000000000000000-mapping.dmp
-
memory/4224-747-0x0000000000000000-mapping.dmp
-
memory/4272-748-0x0000000000000000-mapping.dmp
-
memory/4428-870-0x0000000000000000-mapping.dmp
-
memory/4472-868-0x0000000000000000-mapping.dmp
-
memory/4496-872-0x0000000000000000-mapping.dmp
-
memory/4632-950-0x0000000000000000-mapping.dmp
-
memory/4640-784-0x0000000000000000-mapping.dmp
-
memory/4652-785-0x0000000000000000-mapping.dmp
-
memory/4696-787-0x0000000000000000-mapping.dmp
-
memory/4748-909-0x00007FFA069B0000-0x00007FFA069C0000-memory.dmpFilesize
64KB
-
memory/4748-939-0x00007FFA069B0000-0x00007FFA069C0000-memory.dmpFilesize
64KB
-
memory/4748-914-0x00007FFA069B0000-0x00007FFA069C0000-memory.dmpFilesize
64KB
-
memory/4780-901-0x0000000000000000-mapping.dmp
-
memory/4796-793-0x0000000000000000-mapping.dmp