Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
22-07-2021 22:11
Static task
static1
Behavioral task
behavioral1
Sample
_vcofsoig.nfn.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
_vcofsoig.nfn.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
onestep_817601070.exe
Resource
win7v20210410
General
-
Target
onestep_817601070.exe
-
Size
7.0MB
-
MD5
9815414bc96392ce89a88d0c7c46585a
-
SHA1
56deb0499d6a67d90b5bf92a597456fd1a05535c
-
SHA256
75d4cd9fa27ad0133285d39729bc676b4062f0856e4315bf9232d5123795ce0d
-
SHA512
2dff98fa978db9fb30adfec10b13e084784381441a97ef4675c8c9ccaa2302cb72111f3e6c7265076f818a0f929b9495ea314919997748f5b3797d8371e44a13
Malware Config
Extracted
redline
180721
cookiebrokrash.info:80
Extracted
redline
KO1000000
qusenero.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral4/memory/4952-228-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral4/memory/4952-229-0x0000000000417E42-mapping.dmp family_redline behavioral4/memory/4464-250-0x00000000024A0000-0x00000000024BB000-memory.dmp family_redline behavioral4/memory/4464-252-0x0000000002580000-0x0000000002599000-memory.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 4764 created 1136 4764 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dll acprotect \Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dll acprotect -
Blocklisted process makes network request 16 IoCs
Processes:
MsiExec.exepowershell.exeflow pid process 70 4100 MsiExec.exe 73 4100 MsiExec.exe 75 4100 MsiExec.exe 77 4100 MsiExec.exe 79 4100 MsiExec.exe 83 4100 MsiExec.exe 83 4100 MsiExec.exe 83 4100 MsiExec.exe 70 4100 MsiExec.exe 73 4100 MsiExec.exe 79 4100 MsiExec.exe 77 4100 MsiExec.exe 75 4100 MsiExec.exe 141 4420 powershell.exe 143 4420 powershell.exe 145 4420 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\SETD538.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETD538.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 20 IoCs
Processes:
onestep_817601070.tmpARPRecoveryToolboxLauncher.exeonestep.rar_565700.exel6ELr5JAGPv0A88WCXR4.exeVqAp5sVaOB.exeonestep.rar_565700.exe7SM6wBMmEaoQOCO555Ki.exevpn.exevpn.tmptapinstall.exetapinstall.exekomarjoba.exemask_svc.exekomarjoba.exekamarjoba.exemask_svc.exemask_svc.exeaipackagechainer.exeWeather_Installation.exeWeather.exepid process 2160 onestep_817601070.tmp 2824 ARPRecoveryToolboxLauncher.exe 3164 onestep.rar_565700.exe 1136 l6ELr5JAGPv0A88WCXR4.exe 2464 VqAp5sVaOB.exe 3380 onestep.rar_565700.exe 1284 7SM6wBMmEaoQOCO555Ki.exe 596 vpn.exe 3876 vpn.tmp 2596 tapinstall.exe 4224 tapinstall.exe 4264 komarjoba.exe 5048 mask_svc.exe 4952 komarjoba.exe 4464 kamarjoba.exe 4612 mask_svc.exe 4688 mask_svc.exe 4016 aipackagechainer.exe 1604 Weather_Installation.exe 4904 Weather.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dll upx \Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dll upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
VqAp5sVaOB.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\International\Geo\Nation VqAp5sVaOB.exe -
Loads dropped DLL 41 IoCs
Processes:
onestep_817601070.tmp7SM6wBMmEaoQOCO555Ki.exevpn.tmpMsiExec.exeMsiExec.exemask_svc.exeWeather_Installation.exeWeather.exepid process 2160 onestep_817601070.tmp 1284 7SM6wBMmEaoQOCO555Ki.exe 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4100 MsiExec.exe 4688 mask_svc.exe 4688 mask_svc.exe 4688 mask_svc.exe 4688 mask_svc.exe 4688 mask_svc.exe 4688 mask_svc.exe 3876 vpn.tmp 3876 vpn.tmp 1604 Weather_Installation.exe 1604 Weather_Installation.exe 1604 Weather_Installation.exe 1604 Weather_Installation.exe 1604 Weather_Installation.exe 1604 Weather_Installation.exe 4904 Weather.exe 4904 Weather.exe 4904 Weather.exe 1604 Weather_Installation.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
Weather_Installation.exeaipackagechainer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Weather_Installation.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Weather = "C:\\Users\\Admin\\AppData\\Roaming\\Weather\\Weather.exe --NppV" Weather_Installation.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run aipackagechainer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ aipackagechainer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
7SM6wBMmEaoQOCO555Ki.exemsiexec.exedescription ioc process File opened (read-only) \??\H: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\U: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\Q: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\V: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\O: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\G: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\L: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\P: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\S: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\B: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\N: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\Z: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\M: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\R: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\W: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\X: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\Y: 7SM6wBMmEaoQOCO555Ki.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
onestep.rar_565700.exeonestep.rar_565700.exedescription ioc process File opened for modification \??\PhysicalDrive0 onestep.rar_565700.exe File opened for modification \??\PhysicalDrive0 onestep.rar_565700.exe -
Drops file in System32 directory 17 IoCs
Processes:
DrvInst.exetapinstall.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD048.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File created C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD036.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD047.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD047.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD036.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\SETD048.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{58f7f134-bb92-474d-8959-821a4d75bc46}\tap0901.cat DrvInst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
mask_svc.exemask_svc.exemask_svc.exepid process 5048 mask_svc.exe 4612 mask_svc.exe 4688 mask_svc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
komarjoba.exedescription pid process target process PID 4264 set thread context of 4952 4264 komarjoba.exe komarjoba.exe -
autoit_exe 2 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exe autoit_exe C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exe autoit_exe -
Drops file in Program Files directory 64 IoCs
Processes:
onestep_817601070.tmpvpn.tmpdescription ioc process File created C:\Program Files (x86)\ARP Recovery Toolbox\is-KQVBB.tmp onestep_817601070.tmp File created C:\Program Files (x86)\MaskVPN\is-OBSTD.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-MB5T2.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-ALH5V.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-1F7EP.tmp vpn.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-J39TG.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-TVUBB.tmp onestep_817601070.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-Q2LB8.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File opened for modification C:\Program Files (x86)\ARP Recovery Toolbox\prRarRecoveryToolboxLib.dll onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-TMUP9.tmp onestep_817601070.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-O0D0I.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-ND8T0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-OSVSG.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-L6BDL.tmp vpn.tmp File opened for modification C:\Program Files (x86)\ARP Recovery Toolbox\RAR Recovery Toolbox.chm onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-3DQSV.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-E54UV.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\polstore.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-CSS1R.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-VDOAE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-TNG5V.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-HDS5Q.tmp vpn.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-T1IVI.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\win732\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-17N7M.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-J2M9N.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-LCKV9.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-SKJHL.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-7BOIK.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-Q71TJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-51A4H.tmp vpn.tmp File opened for modification C:\Program Files (x86)\ARP Recovery Toolbox\libeay32.dll onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-LFKVK.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-L8RI7.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-AHA9G.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-K7Q97.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-DL1VV.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-DLTJL.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-LEFN3.tmp vpn.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-56440.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-3UKSF.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-O372A.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-9M6LK.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-8P9I7.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-GLC1N.tmp vpn.tmp File opened for modification C:\Program Files (x86)\ARP Recovery Toolbox\ARPRecoveryToolboxLauncher.exe onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-NHU13.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-A6CF7.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\ARP Recovery Toolbox\unins000.dat onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-IN4D5.tmp vpn.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-SH8MO.tmp onestep_817601070.tmp File created C:\Program Files (x86)\ARP Recovery Toolbox\is-NID8B.tmp onestep_817601070.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libMaskVPN.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.dll vpn.tmp -
Drops file in Windows directory 27 IoCs
Processes:
DrvInst.exemsiexec.exesvchost.exeDrvInst.exetapinstall.exeWerFault.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\INF\oem2.PNF DrvInst.exe File opened for modification C:\Windows\Installer\MSIE1CC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF087.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF50D.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\Installer\MSIDE30.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f74d826.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{B59E6947-D960-4A88-902E-F387AFD7DF1F} msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Installer\MSIE0F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE596.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF0E6.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIFFAE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI659D.tmp msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE614.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE75D.tmp msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File opened for modification C:\Windows\Installer\f74d826.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF028.tmp msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4576 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 4808 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 4900 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 5000 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 5040 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 4024 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe 4764 1136 WerFault.exe l6ELr5JAGPv0A88WCXR4.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
tapinstall.exeDrvInst.exesvchost.exetapinstall.exesvchost.exeDrvInst.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0018 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
DrvInst.exemask_svc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-512 = "Central Asia Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-352 = "FLE Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-381 = "South Africa Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2452 = "Saint Pierre Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1022 = "Bangladesh Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-161 = "Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-792 = "SA Western Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2372 = "Easter Island Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-232 = "Hawaiian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-872 = "Pakistan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2592 = "Tocantins Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2591 = "Tocantins Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-432 = "Iran Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2632 = "Norfolk Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2841 = "Saratov Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1971 = "Belarus Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2572 = "Turks and Caicos Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-461 = "Afghanistan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2531 = "Chatham Islands Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\16\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 23b2fdee577fd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-SubSysId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d784b5e9577fd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ReadingMode\SettingsVersion = "2" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Extensible Cache MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 5c7b34e9577fd701 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = 1d24df8b702cd701 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\EnablementState = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe -
Processes:
vpn.tmp7SM6wBMmEaoQOCO555Ki.exetapinstall.exeVqAp5sVaOB.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 0f00000001000000200000002dc1a6a6cb0cb42f7e0d2c56f38bc7decbccd143405f669070ce130f9249ba48030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 04000000010000001000000087ce0b7b2a0e4900e158719b37a893720300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d431d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0b000000010000001200000044006900670069004300650072007400000014000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f6200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa62000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 VqAp5sVaOB.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 VqAp5sVaOB.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\SystemCertificates\CA\Certificates\8D4C4A23BA9EE84EA7348FA98CC6E65FBB69DE7B\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 7SM6wBMmEaoQOCO555Ki.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 tapinstall.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
onestep_817601070.tmpARPRecoveryToolboxLauncher.exevpn.tmpWerFault.exeWerFault.exeWerFault.exeWerFault.exepid process 2160 onestep_817601070.tmp 2160 onestep_817601070.tmp 2824 ARPRecoveryToolboxLauncher.exe 2824 ARPRecoveryToolboxLauncher.exe 2824 ARPRecoveryToolboxLauncher.exe 2824 ARPRecoveryToolboxLauncher.exe 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4576 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4808 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 4900 WerFault.exe 5000 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
MicrosoftEdgeCP.exepid process 5116 MicrosoftEdgeCP.exe 5116 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vpn.tmpmsiexec.exe7SM6wBMmEaoQOCO555Ki.exedescription pid process Token: SeDebugPrivilege 3876 vpn.tmp Token: SeDebugPrivilege 3876 vpn.tmp Token: SeSecurityPrivilege 1868 msiexec.exe Token: SeCreateTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeAssignPrimaryTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeLockMemoryPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeIncreaseQuotaPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeMachineAccountPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeTcbPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSecurityPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeTakeOwnershipPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeLoadDriverPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemProfilePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemtimePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeProfSingleProcessPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeIncBasePriorityPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreatePagefilePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreatePermanentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeBackupPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeRestorePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeShutdownPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeDebugPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeAuditPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemEnvironmentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeChangeNotifyPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeRemoteShutdownPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeUndockPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSyncAgentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeEnableDelegationPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeManageVolumePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeImpersonatePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreateGlobalPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreateTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeAssignPrimaryTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeLockMemoryPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeIncreaseQuotaPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeMachineAccountPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeTcbPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSecurityPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeTakeOwnershipPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeLoadDriverPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemProfilePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemtimePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeProfSingleProcessPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeIncBasePriorityPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreatePagefilePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreatePermanentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeBackupPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeRestorePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeShutdownPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeDebugPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeAuditPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSystemEnvironmentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeChangeNotifyPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeRemoteShutdownPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeUndockPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeSyncAgentPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeEnableDelegationPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeManageVolumePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeImpersonatePrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreateGlobalPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeCreateTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeAssignPrimaryTokenPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe Token: SeLockMemoryPrivilege 1284 7SM6wBMmEaoQOCO555Ki.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
onestep_817601070.tmp7SM6wBMmEaoQOCO555Ki.exevpn.tmponestep.rar_565700.exepid process 2160 onestep_817601070.tmp 1284 7SM6wBMmEaoQOCO555Ki.exe 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3164 onestep.rar_565700.exe 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp 3876 vpn.tmp -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
onestep.rar_565700.exeonestep.rar_565700.exeMicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3164 onestep.rar_565700.exe 3380 onestep.rar_565700.exe 3380 onestep.rar_565700.exe 3164 onestep.rar_565700.exe 3164 onestep.rar_565700.exe 3380 onestep.rar_565700.exe 3380 onestep.rar_565700.exe 2168 MicrosoftEdge.exe 5116 MicrosoftEdgeCP.exe 5116 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
onestep_817601070.exeonestep_817601070.tmpARPRecoveryToolboxLauncher.exevpn.exevpn.tmpcmd.execmd.exeVqAp5sVaOB.exemsiexec.exesvchost.exe7SM6wBMmEaoQOCO555Ki.exekomarjoba.exedescription pid process target process PID 652 wrote to memory of 2160 652 onestep_817601070.exe onestep_817601070.tmp PID 652 wrote to memory of 2160 652 onestep_817601070.exe onestep_817601070.tmp PID 652 wrote to memory of 2160 652 onestep_817601070.exe onestep_817601070.tmp PID 2160 wrote to memory of 2824 2160 onestep_817601070.tmp ARPRecoveryToolboxLauncher.exe PID 2160 wrote to memory of 2824 2160 onestep_817601070.tmp ARPRecoveryToolboxLauncher.exe PID 2160 wrote to memory of 2824 2160 onestep_817601070.tmp ARPRecoveryToolboxLauncher.exe PID 2824 wrote to memory of 3164 2824 ARPRecoveryToolboxLauncher.exe onestep.rar_565700.exe PID 2824 wrote to memory of 3164 2824 ARPRecoveryToolboxLauncher.exe onestep.rar_565700.exe PID 2824 wrote to memory of 3164 2824 ARPRecoveryToolboxLauncher.exe onestep.rar_565700.exe PID 2824 wrote to memory of 1136 2824 ARPRecoveryToolboxLauncher.exe l6ELr5JAGPv0A88WCXR4.exe PID 2824 wrote to memory of 1136 2824 ARPRecoveryToolboxLauncher.exe l6ELr5JAGPv0A88WCXR4.exe PID 2824 wrote to memory of 1136 2824 ARPRecoveryToolboxLauncher.exe l6ELr5JAGPv0A88WCXR4.exe PID 2824 wrote to memory of 2464 2824 ARPRecoveryToolboxLauncher.exe VqAp5sVaOB.exe PID 2824 wrote to memory of 2464 2824 ARPRecoveryToolboxLauncher.exe VqAp5sVaOB.exe PID 2824 wrote to memory of 2464 2824 ARPRecoveryToolboxLauncher.exe VqAp5sVaOB.exe PID 2824 wrote to memory of 1284 2824 ARPRecoveryToolboxLauncher.exe 7SM6wBMmEaoQOCO555Ki.exe PID 2824 wrote to memory of 1284 2824 ARPRecoveryToolboxLauncher.exe 7SM6wBMmEaoQOCO555Ki.exe PID 2824 wrote to memory of 1284 2824 ARPRecoveryToolboxLauncher.exe 7SM6wBMmEaoQOCO555Ki.exe PID 2824 wrote to memory of 596 2824 ARPRecoveryToolboxLauncher.exe vpn.exe PID 2824 wrote to memory of 596 2824 ARPRecoveryToolboxLauncher.exe vpn.exe PID 2824 wrote to memory of 596 2824 ARPRecoveryToolboxLauncher.exe vpn.exe PID 596 wrote to memory of 3876 596 vpn.exe vpn.tmp PID 596 wrote to memory of 3876 596 vpn.exe vpn.tmp PID 596 wrote to memory of 3876 596 vpn.exe vpn.tmp PID 3876 wrote to memory of 2792 3876 vpn.tmp cmd.exe PID 3876 wrote to memory of 2792 3876 vpn.tmp cmd.exe PID 3876 wrote to memory of 2792 3876 vpn.tmp cmd.exe PID 2792 wrote to memory of 2596 2792 cmd.exe tapinstall.exe PID 2792 wrote to memory of 2596 2792 cmd.exe tapinstall.exe PID 3876 wrote to memory of 4168 3876 vpn.tmp cmd.exe PID 3876 wrote to memory of 4168 3876 vpn.tmp cmd.exe PID 3876 wrote to memory of 4168 3876 vpn.tmp cmd.exe PID 4168 wrote to memory of 4224 4168 cmd.exe tapinstall.exe PID 4168 wrote to memory of 4224 4168 cmd.exe tapinstall.exe PID 2464 wrote to memory of 4264 2464 VqAp5sVaOB.exe komarjoba.exe PID 2464 wrote to memory of 4264 2464 VqAp5sVaOB.exe komarjoba.exe PID 2464 wrote to memory of 4264 2464 VqAp5sVaOB.exe komarjoba.exe PID 1868 wrote to memory of 4328 1868 msiexec.exe MsiExec.exe PID 1868 wrote to memory of 4328 1868 msiexec.exe MsiExec.exe PID 1868 wrote to memory of 4328 1868 msiexec.exe MsiExec.exe PID 4424 wrote to memory of 4456 4424 svchost.exe DrvInst.exe PID 4424 wrote to memory of 4456 4424 svchost.exe DrvInst.exe PID 1284 wrote to memory of 4620 1284 7SM6wBMmEaoQOCO555Ki.exe msiexec.exe PID 1284 wrote to memory of 4620 1284 7SM6wBMmEaoQOCO555Ki.exe msiexec.exe PID 1284 wrote to memory of 4620 1284 7SM6wBMmEaoQOCO555Ki.exe msiexec.exe PID 4424 wrote to memory of 4664 4424 svchost.exe DrvInst.exe PID 4424 wrote to memory of 4664 4424 svchost.exe DrvInst.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 3876 wrote to memory of 5048 3876 vpn.tmp mask_svc.exe PID 3876 wrote to memory of 5048 3876 vpn.tmp mask_svc.exe PID 3876 wrote to memory of 5048 3876 vpn.tmp mask_svc.exe PID 1868 wrote to memory of 4100 1868 msiexec.exe MsiExec.exe PID 1868 wrote to memory of 4100 1868 msiexec.exe MsiExec.exe PID 1868 wrote to memory of 4100 1868 msiexec.exe MsiExec.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 4264 wrote to memory of 4952 4264 komarjoba.exe komarjoba.exe PID 2464 wrote to memory of 4464 2464 VqAp5sVaOB.exe kamarjoba.exe PID 2464 wrote to memory of 4464 2464 VqAp5sVaOB.exe kamarjoba.exe PID 2464 wrote to memory of 4464 2464 VqAp5sVaOB.exe kamarjoba.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\onestep_817601070.exe"C:\Users\Admin\AppData\Local\Temp\onestep_817601070.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-57DOK.tmp\onestep_817601070.tmp"C:\Users\Admin\AppData\Local\Temp\is-57DOK.tmp\onestep_817601070.tmp" /SL5="$301DC,6635846,1072640,C:\Users\Admin\AppData\Local\Temp\onestep_817601070.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\ARP Recovery Toolbox\ARPRecoveryToolboxLauncher.exe"C:\Program Files (x86)\ARP Recovery Toolbox\ARPRecoveryToolboxLauncher.exe" onestep_817601070.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\onestep.rar_565700.exe"C:\Users\Admin\Documents\onestep.rar_565700.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\PKyNlNBe\l6ELr5JAGPv0A88WCXR4.exeC:\Users\Admin\AppData\Local\Temp\PKyNlNBe\l6ELr5JAGPv0A88WCXR4.exe /usthree SUB=d0c0c5e0627735d4066a1813f6a5738f4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 7325⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 7445⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 8485⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 9045⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 9445⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 9845⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 10085⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exeC:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exe /VERYSILENT4⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeC:\Users\Admin\AppData\Local\Temp\komarjoba.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeC:\Users\Admin\AppData\Local\Temp\komarjoba.exe6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\kamarjoba.exeC:\Users\Admin\AppData\Local\Temp\kamarjoba.exe5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exe & exit5⤵
-
C:\Windows\SysWOW64\PING.EXEping 06⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\2tlZmUUA\7SM6wBMmEaoQOCO555Ki.exeC:\Users\Admin\AppData\Local\Temp\2tlZmUUA\7SM6wBMmEaoQOCO555Ki.exe /quiet SILENT=1 AF=606xd0c0c5e0627735d4066a1813f6a5738f4⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msi" /quiet SILENT=1 AF=606xd0c0c5e0627735d4066a1813f6a5738f AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\2tlZmUUA\7SM6wBMmEaoQOCO555Ki.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\2tlZmUUA\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1626740015 /quiet SILENT=1 AF=606xd0c0c5e0627735d4066a1813f6a5738f " AF="606xd0c0c5e0627735d4066a1813f6a5738f" AI_CONTROL_VISUAL_STYLE="16578540;16578540;14988840;12422912"5⤵
-
C:\Users\Admin\AppData\Local\Temp\ae5D41eH\vpn.exeC:\Users\Admin\AppData\Local\Temp\ae5D41eH\vpn.exe /silent /subid=510xd0c0c5e0627735d4066a1813f6a5738f4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-C4BOI.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-C4BOI.tmp\vpn.tmp" /SL5="$30320,15170975,270336,C:\Users\Admin\AppData\Local\Temp\ae5D41eH\vpn.exe" /silent /subid=510xd0c0c5e0627735d4066a1813f6a5738f5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09017⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09017⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install6⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Documents\onestep.rar_565700.exe"C:\Users\Admin\Documents\onestep.rar_565700.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 92822B900698C9E42FC22FA23B026550 C2⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 807F88918C8EF8975096FCE97E43F24A2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\RequiredApplication_1\Weather_Installation.exe" -silent=1 -AF=606xd0c0c5e0627735d4066a1813f6a5738f -BF=default -uncf=default3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Weather\Weather.exe"C:\Users\Admin\AppData\Roaming\Weather\Weather.exe" "--NppV"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -NonInteractive -NoLogo -ExecutionPolicy AllSigned -Command "C:\Users\Admin\AppData\Local\Temp\AI_AEEE.ps1 -paths 'C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\file_deleter.ps1','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites\aipackagechainer.exe','C:\Users\Admin\AppData\Roaming\Weather\Weather\prerequisites' -retry_count 10"3⤵
- Blocklisted process makes network request
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2be3cf01-72fc-3a44-9140-8e6c5f7ecd46}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\ARP Recovery Toolbox\ARPRecoveryToolboxLauncher.exeMD5
87cc084c3d6abd37763900cc8b0bd70b
SHA1e55db6e2f69e00ff2d0fc4f65cf1263f69caa925
SHA25666f22ca716f050358073577bc6890291a1dd137995ff9258df90daabedbcbb13
SHA5126855ad6d885996274d8bf73aacf88afdc478917f6cb36428f48517c83135d0a8774a40d67414557fe8ba88672633275beac65b984099a326b7bb9b0de6f8e4d1
-
C:\Program Files (x86)\ARP Recovery Toolbox\ARPRecoveryToolboxLauncher.exeMD5
87cc084c3d6abd37763900cc8b0bd70b
SHA1e55db6e2f69e00ff2d0fc4f65cf1263f69caa925
SHA25666f22ca716f050358073577bc6890291a1dd137995ff9258df90daabedbcbb13
SHA5126855ad6d885996274d8bf73aacf88afdc478917f6cb36428f48517c83135d0a8774a40d67414557fe8ba88672633275beac65b984099a326b7bb9b0de6f8e4d1
-
C:\Program Files (x86)\MaskVPN\driver\win764\OemVista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\Program Files (x86)\MaskVPN\driver\win764\install.batMD5
3a05ce392d84463b43858e26c48f9cbf
SHA178f624e2c81c3d745a45477d61749b8452c129f1
SHA2565b56d8b121fc9a7f2d4e90edb1b29373cd2d06bac1c54ada8f6cb559b411180b
SHA5128a31fda09f0fa7779c4fb0c0629d4d446957c8aaae0595759dd2b434e84a17ecb6ffe4beff973a245caf0452a0c04a488d2ae7b232d8559f3bd1bfd68fed7cf1
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exeMD5
d10f74d86cd350732657f542df533f82
SHA1c54074f8f162a780819175e7169c43f6706ad46c
SHA256c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67
SHA5120d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exeMD5
d10f74d86cd350732657f542df533f82
SHA1c54074f8f162a780819175e7169c43f6706ad46c
SHA256c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67
SHA5120d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exeMD5
d10f74d86cd350732657f542df533f82
SHA1c54074f8f162a780819175e7169c43f6706ad46c
SHA256c9963a3f8abf6fedc8f983a9655a387d67c752bd59b0d16fd6fc2396b4b4ca67
SHA5120d7cb060e4a9482d4862ff47c9d6f52a060c4fb4e3b8388769fa2974ccf081af6bea7b1d4325c03d128bc4de6e0525d6e9bf3a42564391f2acd980435a0dd87e
-
C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.batMD5
9133a44bfd841b8849bddead9957c2c3
SHA13c1d92aa3f6247a2e7ceeaf0b811cf584ae87591
SHA256b8109f63a788470925ea267f1b6032bba281b1ac3afdf0c56412cb753df58392
SHA512d7f5f99325b9c77939735df3a61097a24613f85e7acc2d84875f78f60b0b70e3504f34d9fff222c593e1daadd9db71080a23b588fe7009ce93b5a4cbe9785545
-
C:\Program Files (x86)\MaskVPN\mask_svc.exeMD5
c6b1934d3e588271f27a38bfeed42abb
SHA108072ecb9042e6f7383d118c78d45b42a418864f
SHA25635ec7f4d10493f28d582440719e6f622d9a2a102e40a0bc7c4924a3635a7f5a8
SHA5121db865c5fee202b825888a8eb6a202100e57fe2192baf08e47bc8e6bf68c7fe78b4b16aa7700d8655d1be8494eb6fd69103d706c52372b07c7c6ab415ba29692
-
C:\Program Files (x86)\MaskVPN\mask_svc.exeMD5
c6b1934d3e588271f27a38bfeed42abb
SHA108072ecb9042e6f7383d118c78d45b42a418864f
SHA25635ec7f4d10493f28d582440719e6f622d9a2a102e40a0bc7c4924a3635a7f5a8
SHA5121db865c5fee202b825888a8eb6a202100e57fe2192baf08e47bc8e6bf68c7fe78b4b16aa7700d8655d1be8494eb6fd69103d706c52372b07c7c6ab415ba29692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18BMD5
308bfcddc5996ac924ce0f7626bfa415
SHA1045e8a872663b4788517d3577d4dadd98711b3cd
SHA2560986cd4c6cbeafe67b53278e6a5077d71c1b35101858dbc9b68655b53f3a1578
SHA512c385e0f42dce18f8693b0064abe232996be97818c93265e6a9a9cb0e1708e893bcde548b70c9919b4f00ba5dfabdc9c8295e666c26a7cf737879293e6ccd6ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7MD5
4a52c1b3525665a541c5605fc00a630d
SHA10709d2951432a377e161444d1edf8aa24fbfd321
SHA2564d117408d5564f068321fe39cb85018fe7657bfabde3e22ff8c2173d740d05bb
SHA51231a68c60e3012bea998fc227e8813db207dd6350e90ea068008c3945591b7dc6fb574c598ee8e4f3f1bd6d4689ac0c52708f52f079d8f066d29817e78ce8996c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
b4091432342d65d174e1a2e6147809e4
SHA12d09fdf8597a9b36c50a2727b102a5e129411b83
SHA256a12b8fd85752f998707aa8179159a5768a3dccefe40ad05d3bb0b619a65b61a5
SHA512e39341664e492623ddbf5d7eb4d17be0f72478a05bcb5325e1568a25bcd785b7e52cabcf8c5102a4321d9dc18bb2d1f4ada5f46b79e97acc55cf4ddd0b0301b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_79CFD3DF2894C4BFDA2ADFD6675FA18BMD5
547483f15e310af6715563131852a930
SHA1c7c16f8795f6aeeeb317cdcb6d6456b51f521c38
SHA256fbbe29c1c94c1627aa864db5fdbef575830a7c8d6a9a3fa922c1e58af4d005d7
SHA512c0faeaeadf9841f7b55aa8fd41235ec0b89e093765f4080283b65c969af4911c8f674e57c6447971179f00fb4c08f095abdaae3c2c83785fb52bffa6d8066afe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157MD5
4743ca12d4b15b0f2d27aca7b39d54f4
SHA1005246864f0996386386ad14d2d08e800aa48d46
SHA256ae162c012d2d1a91baede98b8ce87cb8162706ac4612acaf08ef76ffbb322360
SHA512dad5aa4ca5616e138ad2007eec2c2a58055904b5f9a585f62f2c3c547e2294ce8bad4a2c7ed1e20987efd2d58c4312aa33c576a7f56a19833c9412e699b8d344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7D11549FC90445E1CE90F96A21958A17_FB353789C9BBDA933068CD2920BDF3B7MD5
3cc66e10baad528c0543b0a9047365a7
SHA1f8e56e1c4859b748d486fcce4c421941d4b5de73
SHA256b5bc7365a6ee3b7ced8384cba6ff20b676b5a9dd1b0944f85253faab26a6b7e8
SHA5122ee23677000b4faece42aa8456ce7dc0de1bdd3fc5075fc14858b7664749a6898753631399f2cf733f973d46e02294751413427e7068959185d64c09e8b52f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691MD5
2d816fd5402268044801241c73788ae9
SHA134145eefa36a77d0f32883d8960e0d4dc6fd29f6
SHA25684f9d9af22e98c561f8888da8f70ca1cb418f17e59ba5f3cda7e9403628cd2d8
SHA5129720de201e64213bd57fbc116344841bb82cbeef8e78d0ac4decb09d046e9f900f004838dbbd8e14db238921013ef1c6571b33eb7b162f0cb96d316431e94fbd
-
C:\Users\Admin\AppData\Local\Temp\2tlZmUUA\7SM6wBMmEaoQOCO555Ki.exeMD5
58e3716e2d8beb72e74380e9c112091f
SHA1fd82c0b8ac0c6a6ec6ff03854a1b97ca3847b99e
SHA25607aa23a689c082439a7513a8271241306c89d458b7fd5f3ada9bd9fb96f21068
SHA5124860922f22a013f800ceae276327f0e6dd0203a6a665c63bbfbe98b49507e09aaf1d80320559642cf4ce5fa968e033e46e8baa00c7d09fc6579dd208f8436a51
-
C:\Users\Admin\AppData\Local\Temp\2tlZmUUA\7SM6wBMmEaoQOCO555Ki.exeMD5
58e3716e2d8beb72e74380e9c112091f
SHA1fd82c0b8ac0c6a6ec6ff03854a1b97ca3847b99e
SHA25607aa23a689c082439a7513a8271241306c89d458b7fd5f3ada9bd9fb96f21068
SHA5124860922f22a013f800ceae276327f0e6dd0203a6a665c63bbfbe98b49507e09aaf1d80320559642cf4ce5fa968e033e46e8baa00c7d09fc6579dd208f8436a51
-
C:\Users\Admin\AppData\Local\Temp\MSICC5F.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
C:\Users\Admin\AppData\Local\Temp\MSID038.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
C:\Users\Admin\AppData\Local\Temp\MSID114.tmpMD5
d51a7e3bce34c74638e89366deee2aab
SHA10e68022b52c288e8cdffe85739de1194253a7ef0
SHA2567c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5
SHA5128ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0
-
C:\Users\Admin\AppData\Local\Temp\PKyNlNBe\l6ELr5JAGPv0A88WCXR4.exeMD5
e7b1214fb0b33a62e339c1ea9c04a851
SHA162fb2a8252fd97d4884c9e9cfc614025b5e9e172
SHA256ffb0041f29506f76de65af1d75430aacdd0174545fc11c672e7584715ed8958f
SHA51298183cb5653ad148089684746e13daf0464f8b7a12965542e6dcec830202d165c9f456ea3f634c92adf428e90baa6e8dcdafb4901e58c20df654c8a966c50941
-
C:\Users\Admin\AppData\Local\Temp\PKyNlNBe\l6ELr5JAGPv0A88WCXR4.exeMD5
e7b1214fb0b33a62e339c1ea9c04a851
SHA162fb2a8252fd97d4884c9e9cfc614025b5e9e172
SHA256ffb0041f29506f76de65af1d75430aacdd0174545fc11c672e7584715ed8958f
SHA51298183cb5653ad148089684746e13daf0464f8b7a12965542e6dcec830202d165c9f456ea3f634c92adf428e90baa6e8dcdafb4901e58c20df654c8a966c50941
-
C:\Users\Admin\AppData\Local\Temp\ae5D41eH\vpn.exeMD5
eec63fa459ab525bb53132765c8432f6
SHA1314aa0e74a4925a332bf99feded8a29cffbded11
SHA256081c0fe2da356ca3a0d9589cb6c0a0d0733757c2f128214f7c6ab1ec29e7442c
SHA512b93144b92e68197a447ef987e54efc9c0c56fbcdb011d8754d9387439fd76b3ebe9d8b90069ccb31930e6d48a5d6c084c603777acd2549ea4809caa73cc4644d
-
C:\Users\Admin\AppData\Local\Temp\ae5D41eH\vpn.exeMD5
eec63fa459ab525bb53132765c8432f6
SHA1314aa0e74a4925a332bf99feded8a29cffbded11
SHA256081c0fe2da356ca3a0d9589cb6c0a0d0733757c2f128214f7c6ab1ec29e7442c
SHA512b93144b92e68197a447ef987e54efc9c0c56fbcdb011d8754d9387439fd76b3ebe9d8b90069ccb31930e6d48a5d6c084c603777acd2549ea4809caa73cc4644d
-
C:\Users\Admin\AppData\Local\Temp\is-57DOK.tmp\onestep_817601070.tmpMD5
d29ce8253581f4e5834248d382d702ce
SHA13a4df8a10258222d2b0dae93e0a7c6f6c2c1cc94
SHA2560a10d9196da130f1bc1693f1f0cf31b84b9a5d35be7e298afc66ecb5d2a622be
SHA512647b6ea5487f99a16e2841eb6827b39b8ca2f038cc03ba6467394c1d2c2eb3019a2d3cfef3c0d631b6c42ce2bfb22bc588feff35b90489c0b1dc61db52b72267
-
C:\Users\Admin\AppData\Local\Temp\is-57DOK.tmp\onestep_817601070.tmpMD5
d29ce8253581f4e5834248d382d702ce
SHA13a4df8a10258222d2b0dae93e0a7c6f6c2c1cc94
SHA2560a10d9196da130f1bc1693f1f0cf31b84b9a5d35be7e298afc66ecb5d2a622be
SHA512647b6ea5487f99a16e2841eb6827b39b8ca2f038cc03ba6467394c1d2c2eb3019a2d3cfef3c0d631b6c42ce2bfb22bc588feff35b90489c0b1dc61db52b72267
-
C:\Users\Admin\AppData\Local\Temp\is-C4BOI.tmp\vpn.tmpMD5
37f03ddbc88693fc7e881fae6db48597
SHA166a403b52105f4d50a5864436e4ec3d2f6731c01
SHA256ba33c982aa974234538f5443ffa5945ec81d3004caef526054105b724f232002
SHA512254ab837890e56fbec09600fd2dfd340a7d4957b105501f127715636cc4ef2ff3a56f155a2bcd1af475955b8e4bbc6df999387dead218a3af4317ae0cb4cdb2d
-
C:\Users\Admin\AppData\Local\Temp\is-C4BOI.tmp\vpn.tmpMD5
37f03ddbc88693fc7e881fae6db48597
SHA166a403b52105f4d50a5864436e4ec3d2f6731c01
SHA256ba33c982aa974234538f5443ffa5945ec81d3004caef526054105b724f232002
SHA512254ab837890e56fbec09600fd2dfd340a7d4957b105501f127715636cc4ef2ff3a56f155a2bcd1af475955b8e4bbc6df999387dead218a3af4317ae0cb4cdb2d
-
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeMD5
fbdbef98a789f759df730fba17a05508
SHA1acb54a62cc34a4d89e288089f6dd76d5762bc2ac
SHA256f28943ad4df3573c2f4c2eec0f52da167b738e35af05f9d755a2df41fcd0ab7b
SHA5126c43d3037f0e36cca1ffe95835e3dca92807b0b28d9413224283a16de8b05d86b113a3c81e581e19a37ec5b4b19dc652513c5ca57fb397e1ede08f7deda2e190
-
C:\Users\Admin\AppData\Local\Temp\komarjoba.exeMD5
fbdbef98a789f759df730fba17a05508
SHA1acb54a62cc34a4d89e288089f6dd76d5762bc2ac
SHA256f28943ad4df3573c2f4c2eec0f52da167b738e35af05f9d755a2df41fcd0ab7b
SHA5126c43d3037f0e36cca1ffe95835e3dca92807b0b28d9413224283a16de8b05d86b113a3c81e581e19a37ec5b4b19dc652513c5ca57fb397e1ede08f7deda2e190
-
C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exeMD5
f784802e44bab1190fd00a4ac36d92d0
SHA170f0c9906e138c8c21bd332162f1a3f5553c5614
SHA256e6ae6e37f920f847faea8bee7c09ed55204a25550d18cc1f7f9d8ae55f5a8d01
SHA512cabe35a3851baffbf2c0cba913b550115318694adaad6b8b7ea9d333124e17f3d7909349c1b2c4c4a6bc9967bf71a2041ae0303be2cd83ce093c6534031904c9
-
C:\Users\Admin\AppData\Local\Temp\vVcM1PmS\VqAp5sVaOB.exeMD5
f784802e44bab1190fd00a4ac36d92d0
SHA170f0c9906e138c8c21bd332162f1a3f5553c5614
SHA256e6ae6e37f920f847faea8bee7c09ed55204a25550d18cc1f7f9d8ae55f5a8d01
SHA512cabe35a3851baffbf2c0cba913b550115318694adaad6b8b7ea9d333124e17f3d7909349c1b2c4c4a6bc9967bf71a2041ae0303be2cd83ce093c6534031904c9
-
C:\Users\Admin\AppData\Local\Temp\{2BE3C~1\tap0901.catMD5
c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
C:\Users\Admin\AppData\Local\Temp\{2BE3C~1\tap0901.sysMD5
d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
C:\Users\Admin\AppData\Local\Temp\{2be3cf01-72fc-3a44-9140-8e6c5f7ecd46}\oemvista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\FD7DF1F\Weather Installation.msiMD5
4e083b65ec8e6514c226a494349c86a5
SHA111596c314f02f364b57fa793b97b0192ac013f5a
SHA25601b7abb7fe51a27d626845d5586c018e504869c1df4b037565b3b7bfa286ee2c
SHA512924c25a8c8e591bac9b41a73eeab74c69b93cb11d36ff0a172e6207378de59fa655353ce69d5bb4180f0806a2dfdb411e40b82a328a1d05344c13caef8b8489e
-
C:\Users\Admin\Documents\onestep.rar_565700.exeMD5
de6267b92d1df4db2b0fca29ddbc618d
SHA1293242e21c3f6ee597efe4f35c0d32ab706b8a94
SHA2563728e20d50bc42cbde99dac6e9c53c98ad6d4fe4e7db81a849ef68f97a6bd455
SHA5120a9ebf3bd6d76b94ccc7abb8a5461438b0db1303b905373aa72aba04c982efb979d4a6f0244308dec2a6a0f348e5e64e6f712a571f553351abdb30e243110a97
-
C:\Users\Admin\Documents\onestep.rar_565700.exeMD5
de6267b92d1df4db2b0fca29ddbc618d
SHA1293242e21c3f6ee597efe4f35c0d32ab706b8a94
SHA2563728e20d50bc42cbde99dac6e9c53c98ad6d4fe4e7db81a849ef68f97a6bd455
SHA5120a9ebf3bd6d76b94ccc7abb8a5461438b0db1303b905373aa72aba04c982efb979d4a6f0244308dec2a6a0f348e5e64e6f712a571f553351abdb30e243110a97
-
C:\Users\Admin\Documents\onestep.rar_565700.exeMD5
de6267b92d1df4db2b0fca29ddbc618d
SHA1293242e21c3f6ee597efe4f35c0d32ab706b8a94
SHA2563728e20d50bc42cbde99dac6e9c53c98ad6d4fe4e7db81a849ef68f97a6bd455
SHA5120a9ebf3bd6d76b94ccc7abb8a5461438b0db1303b905373aa72aba04c982efb979d4a6f0244308dec2a6a0f348e5e64e6f712a571f553351abdb30e243110a97
-
C:\Windows\INF\oem2.PNFMD5
e41dc3b51af8bcc40df74788219a4597
SHA1817d855f7c1dccd3cac38927273dc31e5e68b5d3
SHA2564cdb83fd5a6efa2101251e9e786b6bc892ef65b05c2369e52e61d380fc7d75f9
SHA51292fe64a91592768abd5a94942a71e54feb8eebe66475b17dd4421d5a1c20a78fa03b653fba0fb8eb4bbee6a740bddd754800929ea7abebe3bda52baba41ded0e
-
C:\Windows\INF\oem2.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\Windows\Installer\MSIDE30.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
C:\Windows\System32\DRIVER~1\FILERE~1\OEMVIS~1.INF\tap0901.sysMD5
d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.infMD5
87868193626dc756d10885f46d76f42e
SHA194a5ce8ed7633ed77531b6cb14ceb1927c5cae1f
SHA256b5728e42ea12c67577cb9188b472005ee74399b6ac976e7f72b48409baee3b41
SHA51279751330bed5c16d66baf3e5212be0950f312ffd5b80b78be66eaea3cc7115f8a9472d2a43b5ce702aa044f3b45fd572775ff86572150df91cc27866f88f8277
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.catMD5
c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
\??\c:\PROGRA~2\maskvpn\driver\win764\tap0901.sysMD5
d765f43cbea72d14c04af3d2b9c8e54b
SHA1daebe266073616e5fc931c319470fcf42a06867a
SHA25689c5ca1440df186497ce158eb71c0c6bf570a75b6bc1880eac7c87a0250201c0
SHA512ff83225ed348aa8558fb3055ceb43863bad5cf775e410ed8acda7316b56cd5c9360e63ed71abbc8929f7dcf51fd9a948b16d58242a7a2b16108e696c11d548b2
-
\??\c:\program files (x86)\maskvpn\driver\win764\tap0901.catMD5
c757503bc0c5a6679e07fe15b93324d6
SHA16a81aa87e4b07c7fea176c8adf1b27ddcdd44573
SHA25691ebea8ad199e97832cf91ea77328ed7ff49a1b5c06ddaacb0e420097a9b079e
SHA512efd1507bc7aa0cd335b0e82cddde5f75c4d1e35490608d32f24a2bed0d0fbcac88919728e3b3312665bd1e60d3f13a325bdcef4acfddab0f8c2d9f4fb2454d99
-
\Users\Admin\AppData\Local\Temp\MSICC5F.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
\Users\Admin\AppData\Local\Temp\MSID038.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
\Users\Admin\AppData\Local\Temp\MSID114.tmpMD5
d51a7e3bce34c74638e89366deee2aab
SHA10e68022b52c288e8cdffe85739de1194253a7ef0
SHA2567c6bdf16a0992db092b7f94c374b21de5d53e3043f5717a6eecae614432e0df5
SHA5128ed246747cdd05cac352919d7ded3f14b1e523ccc1f7f172db85eed800b0c5d24475c270b34a7c25e7934467ace7e363542a586cdeb156bfc484f7417c3a4ab0
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dllMD5
b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\ApiTool.dllMD5
b5e330f90e1bab5e5ee8ccb04e679687
SHA13360a68276a528e4b651c9019b6159315c3acca8
SHA2562900d536923740fe530891f481e35e37262db5283a4b98047fe5335eacaf3441
SHA51241ab8f239cfff8e5ddcff95cdf2ae11499d57b2ebe8f0786757a200047fd022bfd6975be95e9cfcc17c405e631f069b9951591cf74faf3e6a548191e63a8439c
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\InnoCallback.dllMD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\InnoCallback.dllMD5
1c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\botva2.dllMD5
ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\botva2.dllMD5
ef899fa243c07b7b82b3a45f6ec36771
SHA14a86313cc8766dcad1c2b00c2b8f9bbe0cf8bbbe
SHA256da7d0368712ee419952eb2640a65a7f24e39fb7872442ed4d2ee847ec4cfde77
SHA5123f98b5ad9adfad2111ebd1d8cbab9ae423d624d1668cc64c0bfcdbfedf30c1ce3ea6bc6bcf70f7dd1b01172a4349e7c84fb75d395ee5af73866574c1d734c6e8
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\libMaskVPN.dllMD5
3d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
\Users\Admin\AppData\Local\Temp\is-JU9OA.tmp\libMaskVPN.dllMD5
3d88c579199498b224033b6b66638fb8
SHA16f6303288e2206efbf18e4716095059fada96fc4
SHA2565bccb86319fc90210d065648937725b14b43fa0c96f9da56d9984e027adebbc3
SHA5129740c521ed38643201ed4c2574628454723b9213f12e193c11477e64a2c03daa58d2a48e70df1a7e9654c50a80049f3cf213fd01f2b74e585c3a86027db19ec9
-
\Users\Admin\AppData\Local\Temp\is-N0QG5.tmp\_isetup\_iscrypt.dllMD5
a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
\Users\Admin\AppData\Roaming\Weather\Weather 1.0.0\install\decoder.dllMD5
15aa573cee52cc4c11527dee98bea20c
SHA132fe5da57bbe66425c3d3c89a28e7125fb0097b3
SHA2566889ea3a9d69f176351a389f92537d521abc851d1b71b47ab21c3b821cff8622
SHA5124b357dc6eb8bdc152b63bc0a5f5bce6196cf65e02a71d32ee6568d477b359c2a4ab04892249cfdb8712eb5c8ab1a78e675db47f8b3150cf2c107dc61032cd085
-
\Windows\Installer\MSIDE30.tmpMD5
20c782eb64c81ac14c83a853546a8924
SHA1a1506933d294de07a7a2ae1fbc6be468f51371d6
SHA2560ed6836d55180af20f71f7852e3d728f2defe22aa6d2526c54cfbbb4b48cc6a1
SHA512aff21e3e00b39f8983d101a0c616ca84cc3dc72d6464a0dd331965cf6beccf9b45025a7db2042d6e8b05221d3eb5813445c8ada69ae96e2727a607398a3de3d9
-
memory/596-147-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/596-143-0x0000000000000000-mapping.dmp
-
memory/652-115-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/1136-131-0x0000000000000000-mapping.dmp
-
memory/1136-166-0x0000000000400000-0x00000000008C1000-memory.dmpFilesize
4.8MB
-
memory/1136-165-0x00000000009C0000-0x0000000000B0A000-memory.dmpFilesize
1.3MB
-
memory/1284-138-0x0000000000000000-mapping.dmp
-
memory/1604-279-0x0000000000000000-mapping.dmp
-
memory/2160-119-0x0000000000870000-0x0000000000871000-memory.dmpFilesize
4KB
-
memory/2160-116-0x0000000000000000-mapping.dmp
-
memory/2464-134-0x0000000000000000-mapping.dmp
-
memory/2596-172-0x0000000000000000-mapping.dmp
-
memory/2792-169-0x0000000000000000-mapping.dmp
-
memory/2824-121-0x0000000000000000-mapping.dmp
-
memory/2824-125-0x00000000041D0000-0x00000000041D1000-memory.dmpFilesize
4KB
-
memory/2824-124-0x0000000000400000-0x0000000001727000-memory.dmpFilesize
19.2MB
-
memory/3164-129-0x00000000001E0000-0x00000000001E3000-memory.dmpFilesize
12KB
-
memory/3164-130-0x0000000000D70000-0x0000000000D93000-memory.dmpFilesize
140KB
-
memory/3164-126-0x0000000000000000-mapping.dmp
-
memory/3380-141-0x0000000000AB0000-0x0000000000BFA000-memory.dmpFilesize
1.3MB
-
memory/3876-151-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/3876-163-0x0000000009570000-0x0000000009585000-memory.dmpFilesize
84KB
-
memory/3876-164-0x00000000093D0000-0x00000000093D1000-memory.dmpFilesize
4KB
-
memory/3876-148-0x0000000000000000-mapping.dmp
-
memory/3876-154-0x0000000007410000-0x00000000076F0000-memory.dmpFilesize
2.9MB
-
memory/3876-155-0x0000000002430000-0x0000000002431000-memory.dmpFilesize
4KB
-
memory/3876-160-0x00000000093E0000-0x00000000093EF000-memory.dmpFilesize
60KB
-
memory/4016-278-0x0000000000000000-mapping.dmp
-
memory/4100-223-0x0000000000000000-mapping.dmp
-
memory/4168-176-0x0000000000000000-mapping.dmp
-
memory/4224-178-0x0000000000000000-mapping.dmp
-
memory/4228-276-0x0000000000000000-mapping.dmp
-
memory/4264-212-0x0000000005300000-0x0000000005301000-memory.dmpFilesize
4KB
-
memory/4264-190-0x0000000000920000-0x0000000000921000-memory.dmpFilesize
4KB
-
memory/4264-181-0x0000000000000000-mapping.dmp
-
memory/4264-201-0x0000000005130000-0x0000000005131000-memory.dmpFilesize
4KB
-
memory/4264-209-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/4328-184-0x0000000000000000-mapping.dmp
-
memory/4420-288-0x0000000006D70000-0x0000000006D71000-memory.dmpFilesize
4KB
-
memory/4420-295-0x00000000080F0000-0x00000000080F1000-memory.dmpFilesize
4KB
-
memory/4420-293-0x0000000007CE0000-0x0000000007CE1000-memory.dmpFilesize
4KB
-
memory/4420-291-0x0000000007B50000-0x0000000007B51000-memory.dmpFilesize
4KB
-
memory/4420-290-0x0000000007340000-0x0000000007341000-memory.dmpFilesize
4KB
-
memory/4420-294-0x0000000007BD0000-0x0000000007BD1000-memory.dmpFilesize
4KB
-
memory/4420-289-0x0000000006D72000-0x0000000006D73000-memory.dmpFilesize
4KB
-
memory/4420-287-0x00000000073B0000-0x00000000073B1000-memory.dmpFilesize
4KB
-
memory/4420-286-0x0000000004880000-0x0000000004881000-memory.dmpFilesize
4KB
-
memory/4420-283-0x0000000000000000-mapping.dmp
-
memory/4456-193-0x0000000000000000-mapping.dmp
-
memory/4464-251-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/4464-252-0x0000000002580000-0x0000000002599000-memory.dmpFilesize
100KB
-
memory/4464-274-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/4464-273-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/4464-260-0x0000000004F44000-0x0000000004F46000-memory.dmpFilesize
8KB
-
memory/4464-248-0x00000000008B0000-0x00000000009FA000-memory.dmpFilesize
1.3MB
-
memory/4464-249-0x0000000000400000-0x00000000008AF000-memory.dmpFilesize
4.7MB
-
memory/4464-250-0x00000000024A0000-0x00000000024BB000-memory.dmpFilesize
108KB
-
memory/4464-259-0x0000000004F43000-0x0000000004F44000-memory.dmpFilesize
4KB
-
memory/4464-238-0x0000000000000000-mapping.dmp
-
memory/4464-258-0x0000000004F42000-0x0000000004F43000-memory.dmpFilesize
4KB
-
memory/4464-257-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/4612-247-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/4612-246-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/4612-243-0x0000000000000000-mapping.dmp
-
memory/4620-202-0x0000000000000000-mapping.dmp
-
memory/4664-207-0x0000000000000000-mapping.dmp
-
memory/4688-263-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/4688-265-0x00000000001B0000-0x00000000001B1000-memory.dmpFilesize
4KB
-
memory/4688-268-0x00000000345E0000-0x0000000034638000-memory.dmpFilesize
352KB
-
memory/4688-267-0x0000000034480000-0x00000000345D8000-memory.dmpFilesize
1.3MB
-
memory/4688-264-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/4688-266-0x0000000033B00000-0x0000000033CC6000-memory.dmpFilesize
1.8MB
-
memory/4904-280-0x0000000000000000-mapping.dmp
-
memory/4952-239-0x00000000055F0000-0x00000000055F1000-memory.dmpFilesize
4KB
-
memory/4952-233-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB
-
memory/4952-242-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/4952-241-0x00000000054A0000-0x0000000005AA6000-memory.dmpFilesize
6.0MB
-
memory/4952-269-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/4952-228-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4952-270-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/4952-229-0x0000000000417E42-mapping.dmp
-
memory/4952-232-0x0000000005AB0000-0x0000000005AB1000-memory.dmpFilesize
4KB
-
memory/4952-234-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/4968-275-0x0000000000000000-mapping.dmp
-
memory/5048-237-0x0000000000400000-0x00000000015D7000-memory.dmpFilesize
17.8MB
-
memory/5048-236-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/5048-240-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/5048-220-0x0000000000000000-mapping.dmp