Analysis
-
max time kernel
122s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
25-10-2021 12:25
Static task
static1
Behavioral task
behavioral1
Sample
e774dd9c86af55f5f4f64ce0e6096341.exe
Resource
win7-en-20210920
General
-
Target
e774dd9c86af55f5f4f64ce0e6096341.exe
-
Size
6.3MB
-
MD5
e774dd9c86af55f5f4f64ce0e6096341
-
SHA1
d645b5c74e4c2659b1db2efe45cb14eca554bddc
-
SHA256
c8aa42e07176d24c933d1e2bc4f0052b2973f98fc6e395d90f09e07dbf7c0585
-
SHA512
ad0f726ef0190f231b46b174ced45e1f8b7646b0abe6cda24d883d9584a7581d9fc67348718895b3186df763840d993e2fab1e76e2c853e7a9f109ad0508e3c6
Malware Config
Extracted
redline
V4
3.17.66.208:50383
Extracted
vidar
41.5
915
https://mas.to/@xeroxxx
-
profile_id
915
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\FastPc\FastPc\Fast_.exe family_redline C:\Program Files (x86)\FastPc\FastPc\Fast_.exe family_redline -
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Vidar Stealer 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2288-128-0x0000000000400000-0x00000000008E3000-memory.dmp family_vidar behavioral2/memory/2288-127-0x0000000000E00000-0x0000000000ED6000-memory.dmp family_vidar behavioral2/memory/1332-156-0x0000000004E70000-0x0000000005476000-memory.dmp family_vidar -
Blocklisted process makes network request 52 IoCs
Processes:
MsiExec.execmd.exeflow pid process 37 1908 MsiExec.exe 39 1908 MsiExec.exe 41 1908 MsiExec.exe 43 1908 MsiExec.exe 45 1908 MsiExec.exe 46 1908 MsiExec.exe 47 1908 MsiExec.exe 48 1908 MsiExec.exe 49 1908 MsiExec.exe 50 1908 MsiExec.exe 51 1908 MsiExec.exe 52 1908 MsiExec.exe 53 1908 MsiExec.exe 54 1908 MsiExec.exe 55 1908 MsiExec.exe 56 1908 MsiExec.exe 57 1908 MsiExec.exe 58 1908 MsiExec.exe 61 1908 MsiExec.exe 62 1908 MsiExec.exe 63 1908 MsiExec.exe 64 1908 MsiExec.exe 65 1908 MsiExec.exe 68 1908 MsiExec.exe 69 1908 MsiExec.exe 70 1908 MsiExec.exe 71 1908 MsiExec.exe 72 1908 MsiExec.exe 73 1908 MsiExec.exe 74 1908 MsiExec.exe 75 1908 MsiExec.exe 76 1908 MsiExec.exe 77 1908 MsiExec.exe 78 1908 MsiExec.exe 79 1908 MsiExec.exe 80 1908 MsiExec.exe 81 1908 MsiExec.exe 82 1908 MsiExec.exe 83 1908 MsiExec.exe 84 1908 MsiExec.exe 85 1908 MsiExec.exe 86 1908 MsiExec.exe 87 1908 MsiExec.exe 88 1908 MsiExec.exe 89 1908 MsiExec.exe 90 1908 MsiExec.exe 91 1908 MsiExec.exe 92 1908 MsiExec.exe 106 2372 cmd.exe 106 2372 cmd.exe 106 2372 cmd.exe 129 2372 cmd.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\SET7FDA.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET7FDA.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe -
Executes dropped EXE 15 IoCs
Processes:
Faster.exeFast_.exeFast.exe13.exeinstaller.exevpn.exevpn.tmptapinstall.exetapinstall.exemask_svc.exemask_svc.exemask_svc.exeSettings Installation.exeMaskVPNUpdate.exenote866.exepid process 1472 Faster.exe 1332 Fast_.exe 2288 Fast.exe 3412 13.exe 1892 installer.exe 3896 vpn.exe 1404 vpn.tmp 2024 tapinstall.exe 1324 tapinstall.exe 2332 mask_svc.exe 1068 mask_svc.exe 4004 mask_svc.exe 2524 Settings Installation.exe 1316 MaskVPNUpdate.exe 3444 note866.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Faster.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International\Geo\Nation Faster.exe -
Loads dropped DLL 47 IoCs
Processes:
installer.exeFast.exeMsiExec.exeMsiExec.exeMsiExec.exevpn.tmpmask_svc.exeSettings Installation.exeMaskVPNUpdate.exepid process 1892 installer.exe 1892 installer.exe 2288 Fast.exe 2288 Fast.exe 1892 installer.exe 2104 MsiExec.exe 2104 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1892 installer.exe 1908 MsiExec.exe 1908 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1540 MsiExec.exe 1908 MsiExec.exe 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 1404 vpn.tmp 1404 vpn.tmp 2524 Settings Installation.exe 1316 MaskVPNUpdate.exe 1316 MaskVPNUpdate.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
note866.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA note866.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
installer.exemsiexec.exedescription ioc process File opened (read-only) \??\R: installer.exe File opened (read-only) \??\Y: installer.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\E: installer.exe File opened (read-only) \??\F: installer.exe File opened (read-only) \??\Q: installer.exe File opened (read-only) \??\T: installer.exe File opened (read-only) \??\U: installer.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: installer.exe File opened (read-only) \??\L: installer.exe File opened (read-only) \??\M: installer.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: installer.exe File opened (read-only) \??\S: installer.exe File opened (read-only) \??\V: installer.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\K: installer.exe File opened (read-only) \??\O: installer.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: installer.exe File opened (read-only) \??\G: installer.exe File opened (read-only) \??\Z: installer.exe File opened (read-only) \??\X: installer.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\A: installer.exe File opened (read-only) \??\N: installer.exe File opened (read-only) \??\W: installer.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: installer.exe File opened (read-only) \??\P: installer.exe File opened (read-only) \??\V: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 25 IoCs
Processes:
DrvInst.exemask_svc.exetapinstall.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.cat DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft mask_svc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8408FE5CA4467EE4DA84A76EF238FE3 mask_svc.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C21.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C21.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C23.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C22.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C23.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF tapinstall.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.PNF DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache mask_svc.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404} DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData mask_svc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 mask_svc.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\SET7C22.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{0dd3acaa-55d3-4946-b185-ec11db1c8404}\tap0901.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_a572b7f20c402d28\oemvista.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content mask_svc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 mask_svc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8408FE5CA4467EE4DA84A76EF238FE3 mask_svc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
mask_svc.exemask_svc.exemask_svc.exepid process 2332 mask_svc.exe 1068 mask_svc.exe 4004 mask_svc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
vpn.tmpnote866.exemsiexec.exeMaskVPNUpdate.execmd.exee774dd9c86af55f5f4f64ce0e6096341.exedescription ioc process File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-6POC4.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-2OS4O.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-V4LSJ.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-I1BKT.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\tunnle.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-EHQAH.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-8IG95.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-6C2PE.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-EJ0J5.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FastPc\FastPc\d.INTEG.RAW note866.exe File created C:\Program Files (x86)\FastPc\FastPc\d.jfm note866.exe File created C:\Program Files (x86)\AW Manager\Windows Manager\AdvancedWindowsManager.exe msiexec.exe File created C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-E6P9B.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-VFACK.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-K0ME4.tmp vpn.tmp File created C:\Program Files (x86)\AW Manager\Windows Manager\Uninstall.lnk msiexec.exe File created C:\Program Files (x86)\MaskVPN\is-HC5RU.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-NUQ31.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-GVB94.tmp vpn.tmp File created C:\Program Files (x86)\FastPc\FastPc\d note866.exe File opened for modification C:\Program Files (x86)\MaskVPN\version MaskVPNUpdate.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Windows Updater.ini msiexec.exe File created C:\Program Files (x86)\MaskVPN\is-6RF4A.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-12THI.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp32\is-OAE2B.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FastPc\FastPc\ cmd.exe File opened for modification C:\Program Files (x86)\FastPc\FastPc\13.exe e774dd9c86af55f5f4f64ce0e6096341.exe File opened for modification C:\Program Files (x86)\MaskVPN\mask_svc.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-6EP8L.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-QOH5Q.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-TL1A5.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-9VBB6.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FastPc\FastPc\Fast.exe e774dd9c86af55f5f4f64ce0e6096341.exe File opened for modification C:\Program Files (x86)\FastPc\FastPc\Fast_.exe e774dd9c86af55f5f4f64ce0e6096341.exe File opened for modification C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-TB18C.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-PJBQC.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ipseccmd.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-B78TM.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-J60L0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-B4NH0.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-R5S7O.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\winxp64\is-QNITT.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\unins000.dat vpn.tmp File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\Privacy.url msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-FE7HS.tmp vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\ssleay32.dll vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-HTMUM.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-M4OUK.tmp vpn.tmp File opened for modification C:\Program Files (x86)\FastPc\FastPc\d note866.exe File opened for modification C:\Program Files (x86)\AW Manager\Windows Manager\EULA.url msiexec.exe File opened for modification C:\Program Files (x86)\MaskVPN\libCommon.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\MaskVPN.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-D3SQ7.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-9946O.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win764\is-NCA5C.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\unins000.msg vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\libeay32.dll vpn.tmp File opened for modification C:\Program Files (x86)\MaskVPN\driver\winxp32\devcon.exe vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-JH5RG.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\is-KMEIU.tmp vpn.tmp File created C:\Program Files (x86)\MaskVPN\driver\win732\is-MC55M.tmp vpn.tmp -
Drops file in Windows directory 40 IoCs
Processes:
msiexec.exeDrvInst.exeDrvInst.exesvchost.execmd.exetapinstall.exedescription ioc process File opened for modification C:\Windows\Installer\MSI24E4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2B08.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI2C91.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI1C23.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI20BC.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI2534.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\logo.exe msiexec.exe File opened for modification C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI1B46.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1FE0.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI1CEF.tmp msiexec.exe File opened for modification C:\Windows\Installer\f7614ad.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI232E.tmp msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\Tasks\13.job cmd.exe File created C:\Windows\Installer\f7614ad.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1D8C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2749.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI299F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2A5B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1A8A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1F04.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2882.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Installer\MSI1BE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2940.tmp msiexec.exe File created C:\Windows\Installer\f7614b0.msi msiexec.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\INF\oem2.PNF DrvInst.exe File created C:\Windows\Installer\SourceHash{C845414C-903C-4218-9DE7-132AB97FDF62} msiexec.exe File opened for modification C:\Windows\Installer\MSI28E1.tmp msiexec.exe File created C:\Windows\Installer\{C845414C-903C-4218-9DE7-132AB97FDF62}\SystemFoldermsiexec.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI17F9.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
tapinstall.exeDrvInst.exesvchost.exeDrvInst.exetapinstall.exesvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_SANU&PROD_SANU_DVD-ROM\4&37CE57BA&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0051 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Fast.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Fast.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Fast.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 700 timeout.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1316 taskkill.exe 3476 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
mask_svc.exeDrvInst.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-201 = "US Mountain Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-771 = "Montevideo Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-982 = "Kamchatka Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-791 = "SA Western Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-282 = "Central Europe Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2771 = "Omsk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2412 = "Marquesas Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2392 = "Aleutian Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-52 = "Greenland Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-162 = "Central Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2341 = "Haiti Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1471 = "Magadan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2041 = "Eastern Daylight Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-32 = "Mid-Atlantic Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-121 = "SA Pacific Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-2451 = "Saint Pierre Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1042 = "Ulaanbaatar Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-221 = "Alaskan Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-91 = "Pacific SA Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-364 = "Middle East Daylight Time" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" mask_svc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\17\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" mask_svc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs mask_svc.exe -
Modifies registry class 30 IoCs
Processes:
vpn.tmpmsiexec.exeFaster.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32 vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A} vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node vpn.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BE49FBDF-9D0C-4705-9235-FD3A1AF3C76A}\ProxyStubClsid32\ = "{94512587-22D8-4197-B757-6BA2F3DE6DEC}" vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\5785CBDF4ABB5AD409841A692AF14EA9\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance Faster.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\DeploymentFlags = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductIcon = "C:\\Windows\\Installer\\{C845414C-903C-4218-9DE7-132AB97FDF62}\\logo.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\ProductName = "Windows Manager" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\C414548CC3098124D97E31A29BF7FD26\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\PackageName = "Windows Manager - Postback Y.msi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Roaming\\AW Manager\\Windows Manager 1.0.0\\install\\97FDF62\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface vpn.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\PackageCode = "6BBF4B2F4524B25478C17BFBEE2559F7" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\C414548CC3098124D97E31A29BF7FD26\Version = "16777216" msiexec.exe -
Processes:
tapinstall.exeinstaller.exevpn.tmpdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 0300000001000000140000005e66e0ca2367757e800e65b770629026e131a7dc2000000001000000ba060000308206b63082059ea003020102021004d54dc0a2016b263eeeb255d321056e300d06092a864886f70d0101050500306f310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312e302c060355040313254469676943657274204173737572656420494420436f6465205369676e696e672043412d31301e170d3133303831333030303030305a170d3136303930323132303030305a308181310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100a10462099150b2575bc037614701c292ba96e98270fdb06e1d1f40343e720e259d6f9fdf59bcb9365f8cea69689aed7a4354591db75509826ad71ab3f00cb18ed11157effc5eb3bf5730b33b5ba76fd73f3fd7f1b2256410223a7f8f5f52b6fb8b31a979cc50f831880fc837c81168e74dd4f57368ef55a1dbe480a815128e0d944d4d70be02ed65efe486a020f50dfdfe6d2a0dfab3ff9885fdb1bc39b79bb0a38183e42d557a60da66883c3307c208655da1a43eeb2393ea10b200f55ddfd66da47eae911eebe43113c7aafdf8e13d2fef2604eac2e3739021816b323dc9ef0f8411a1a7921023ff3cd7f1f4d4307f6ad13816d47b93823c9683069315088d0203010001a382033930820335301f0603551d230418301680147b68ce29aac017be497ae1e53fd6a7f7458f3532301d0603551d0e041604149afe50cc7c723e76b49c036a97a88c8135cb6651300e0603551d0f0101ff04040302078030130603551d25040c300a06082b0601050507030330730603551d1f046c306a3033a031a02f862d687474703a2f2f63726c332e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c3033a031a02f862d687474703a2f2f63726c342e64696769636572742e636f6d2f617373757265642d63732d32303131612e63726c308201c40603551d20048201bb308201b7308201b306096086480186fd6c0301308201a4303a06082b06010505070201162e687474703a2f2f7777772e64696769636572742e636f6d2f73736c2d6370732d7265706f7369746f72792e68746d3082016406082b06010505070202308201561e8201520041006e007900200075007300650020006f00660020007400680069007300200043006500720074006900660069006300610074006500200063006f006e0073007400690074007500740065007300200061006300630065007000740061006e006300650020006f00660020007400680065002000440069006700690043006500720074002000430050002f00430050005300200061006e00640020007400680065002000520065006c00790069006e0067002000500061007200740079002000410067007200650065006d0065006e00740020007700680069006300680020006c0069006d006900740020006c0069006100620069006c00690074007900200061006e0064002000610072006500200069006e0063006f00720070006f00720061007400650064002000680065007200650069006e0020006200790020007200650066006500720065006e00630065002e30818206082b0601050507010104763074302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304c06082b060105050730028640687474703a2f2f636163657274732e64696769636572742e636f6d2f4469676943657274417373757265644944436f64655369676e696e6743412d312e637274300c0603551d130101ff04023000300d06092a864886f70d0101050500038201010035d3e402ab7e93e4c84f74475c2403fbaf99335beb29aef76c0cbadf9eed476e26ae26aa5e87bb55e851926d2db986d674efd71abe7ecdc4b57c98d65b862725bd09e466949c3cf68cb40631d734ee948e4a7e5c849edf9757530a17e85c91e3dbc61e31a5d30b7250e83316c23728cc3fc0c721f61780a9f8542b575131652426be91885d9756313eff308755b60ccf6ade5f7bd7e32690a51c0b470a3bfe9dbedad74b535349ff469baa3e4d741d7db011501f80afdc4138a345c36e78710681be9d5b2bd45620bfaddf8e4ebd58e0820296f5c40c06fc48db187ff49fcaf489866fdae7c4d7224e3548bac384a5e7b59175c8fd6a667fa6ee3838802ce9be vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 030000000100000014000000cbc64d0fc770b1694df723bb18b5679ce09b61ca20000000010000000c06000030820608308204f0a00302010202100ebd24bdfbd4adddd2edd27e8fb1953c300d06092a864886f70d01010b0500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b302906035504031322446967694365727420455620436f6465205369676e696e6720434120285348413229301e170d3136303230393030303030305a170d3139303231333132303030305a3082011d311d301b060355040f0c1450726976617465204f7267616e697a6174696f6e31133011060b2b0601040182373c0201031302555331193017060b2b0601040182373c020102130844656c61776172653110300e06035504051307333736313235363129302706035504091320353938302053746f6e6572696467652044726976652c20537569746520313033310e300c060355041113053934353838310b3009060355040613025553311330110603550408130a43616c69666f726e6961311330110603550407130a506c656173616e746f6e31233021060355040a131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e312330210603550403131a4f70656e56504e20546563686e6f6c6f676965732c20496e632e30820122300d06092a864886f70d01010105000382010f003082010a0282010100dbfa60e717145ef04d047ef2824532ee8a363d6b8fda58b639832f07eccba53b0446715d150e886195607af12d04e77a0f90bca14e70a782603b0ee5b9dca6cf43d5befb9887c54a3a507a82c7dd4a3fec3aed83171ff020b0c1ca50b87751a597b13454a31bd07796eea97ee55631a43d92cbc7275dfc6da478de5f3c8e2c3431db592d2410de2e789465cf73498df4e042aaa085855603e5165b84e25f27c6d29f77a1cc7bf2875da81395715c662b0333b025b37fcac7bd2f3b50a497613d972182c25e796e0dc453264c6e5340bd4962d5d3d37db06dfc03efb0ba8215b9ef2ef52c15d369db3a732259d286a9aa761ccafff0558c8efdab678d785cfe370203010001a38201f1308201ed301f0603551d230418301680148fe87ef06d326a000523c770976a3a90ff6bead4301d0603551d0e041604149bb182bc8ec73483e7d3569d57448488d1803437302e0603551d1104273025a02306082b06010505070803a01730150c1355532d44454c41574152452d33373631323536300e0603551d0f0101ff04040302078030130603551d25040c300a06082b06010505070303307b0603551d1f047430723037a035a0338631687474703a2f2f63726c332e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c3037a035a0338631687474703a2f2f63726c342e64696769636572742e636f6d2f4556436f64655369676e696e67534841322d67312e63726c304b0603551d2004443042303706096086480186fd6c0302302a302806082b06010505070201161c68747470733a2f2f7777772e64696769636572742e636f6d2f4350533007060567810c0103307e06082b0601050507010104723070302406082b060105050730018618687474703a2f2f6f6373702e64696769636572742e636f6d304806082b06010505073002863c687474703a2f2f636163657274732e64696769636572742e636f6d2f44696769436572744556436f64655369676e696e6743412d534841322e637274300c0603551d130101ff04023000300d06092a864886f70d01010b050003820101006c24a9a7e30a7db2301b344f60cd1b1daf32fce4207ff625bd635f062f8a65301a7d66fade8ba809d0863421631692ef527119eaed4d1f012a98606727c8682aaf1099ca03ab9e996184f4186bce0ca7739c9e6e7144972012ac6eb4ac7db2122b244546f09647fa477a0613401f42e72f4a56fd687d946c4a41e1d1238fe8959e0b6e0cb692e92d96ccc7bde669843c60a374d001608328688790f65ababb20c78c59dad5b32bd79d67c60341c754eae510e08f897e6190c3af2d171261bcea2905545682ace869cd7cc3e66e635dd4f6420dcdc0909b780456523f685aec28b7a5585fae78f36ae3b84d0690f5ee0aa522245546508b2fadb6975f6082d11f vpn.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 installer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA vpn.tmp Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\CBC64D0FC770B1694DF723BB18B5679CE09B61CA\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\5E66E0CA2367757E800E65B770629026E131A7DC\Blob = 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 tapinstall.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Faster.exe13.exeFast.exeMsiExec.exeMsiExec.exemsiexec.execmd.exeFast_.exevpn.tmpmask_svc.execmd.exemask_svc.exemask_svc.exepid process 1472 Faster.exe 1472 Faster.exe 1472 Faster.exe 3412 13.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2288 Fast.exe 2104 MsiExec.exe 2104 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 1908 MsiExec.exe 3468 msiexec.exe 3468 msiexec.exe 3100 cmd.exe 1332 Fast_.exe 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 2332 mask_svc.exe 2332 mask_svc.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 1068 mask_svc.exe 1068 mask_svc.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 4004 mask_svc.exe 4004 mask_svc.exe 2372 cmd.exe 2372 cmd.exe 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 4004 mask_svc.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe 2372 cmd.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
cmd.exepid process 3100 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Faster.exemsiexec.exeinstaller.exedescription pid process Token: SeDebugPrivilege 1472 Faster.exe Token: SeSecurityPrivilege 3468 msiexec.exe Token: SeCreateTokenPrivilege 1892 installer.exe Token: SeAssignPrimaryTokenPrivilege 1892 installer.exe Token: SeLockMemoryPrivilege 1892 installer.exe Token: SeIncreaseQuotaPrivilege 1892 installer.exe Token: SeMachineAccountPrivilege 1892 installer.exe Token: SeTcbPrivilege 1892 installer.exe Token: SeSecurityPrivilege 1892 installer.exe Token: SeTakeOwnershipPrivilege 1892 installer.exe Token: SeLoadDriverPrivilege 1892 installer.exe Token: SeSystemProfilePrivilege 1892 installer.exe Token: SeSystemtimePrivilege 1892 installer.exe Token: SeProfSingleProcessPrivilege 1892 installer.exe Token: SeIncBasePriorityPrivilege 1892 installer.exe Token: SeCreatePagefilePrivilege 1892 installer.exe Token: SeCreatePermanentPrivilege 1892 installer.exe Token: SeBackupPrivilege 1892 installer.exe Token: SeRestorePrivilege 1892 installer.exe Token: SeShutdownPrivilege 1892 installer.exe Token: SeDebugPrivilege 1892 installer.exe Token: SeAuditPrivilege 1892 installer.exe Token: SeSystemEnvironmentPrivilege 1892 installer.exe Token: SeChangeNotifyPrivilege 1892 installer.exe Token: SeRemoteShutdownPrivilege 1892 installer.exe Token: SeUndockPrivilege 1892 installer.exe Token: SeSyncAgentPrivilege 1892 installer.exe Token: SeEnableDelegationPrivilege 1892 installer.exe Token: SeManageVolumePrivilege 1892 installer.exe Token: SeImpersonatePrivilege 1892 installer.exe Token: SeCreateGlobalPrivilege 1892 installer.exe Token: SeCreateTokenPrivilege 1892 installer.exe Token: SeAssignPrimaryTokenPrivilege 1892 installer.exe Token: SeLockMemoryPrivilege 1892 installer.exe Token: SeIncreaseQuotaPrivilege 1892 installer.exe Token: SeMachineAccountPrivilege 1892 installer.exe Token: SeTcbPrivilege 1892 installer.exe Token: SeSecurityPrivilege 1892 installer.exe Token: SeTakeOwnershipPrivilege 1892 installer.exe Token: SeLoadDriverPrivilege 1892 installer.exe Token: SeSystemProfilePrivilege 1892 installer.exe Token: SeSystemtimePrivilege 1892 installer.exe Token: SeProfSingleProcessPrivilege 1892 installer.exe Token: SeIncBasePriorityPrivilege 1892 installer.exe Token: SeCreatePagefilePrivilege 1892 installer.exe Token: SeCreatePermanentPrivilege 1892 installer.exe Token: SeBackupPrivilege 1892 installer.exe Token: SeRestorePrivilege 1892 installer.exe Token: SeShutdownPrivilege 1892 installer.exe Token: SeDebugPrivilege 1892 installer.exe Token: SeAuditPrivilege 1892 installer.exe Token: SeSystemEnvironmentPrivilege 1892 installer.exe Token: SeChangeNotifyPrivilege 1892 installer.exe Token: SeRemoteShutdownPrivilege 1892 installer.exe Token: SeUndockPrivilege 1892 installer.exe Token: SeSyncAgentPrivilege 1892 installer.exe Token: SeEnableDelegationPrivilege 1892 installer.exe Token: SeManageVolumePrivilege 1892 installer.exe Token: SeImpersonatePrivilege 1892 installer.exe Token: SeCreateGlobalPrivilege 1892 installer.exe Token: SeCreateTokenPrivilege 1892 installer.exe Token: SeAssignPrimaryTokenPrivilege 1892 installer.exe Token: SeLockMemoryPrivilege 1892 installer.exe Token: SeIncreaseQuotaPrivilege 1892 installer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
installer.exevpn.tmppid process 1892 installer.exe 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp 1404 vpn.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cmd.exeMaskVPNUpdate.exepid process 2372 cmd.exe 1316 MaskVPNUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e774dd9c86af55f5f4f64ce0e6096341.exe13.exeFaster.exedescription pid process target process PID 3464 wrote to memory of 1472 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Faster.exe PID 3464 wrote to memory of 1472 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Faster.exe PID 3464 wrote to memory of 1332 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast_.exe PID 3464 wrote to memory of 1332 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast_.exe PID 3464 wrote to memory of 1332 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast_.exe PID 3464 wrote to memory of 2288 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast.exe PID 3464 wrote to memory of 2288 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast.exe PID 3464 wrote to memory of 2288 3464 e774dd9c86af55f5f4f64ce0e6096341.exe Fast.exe PID 3464 wrote to memory of 3412 3464 e774dd9c86af55f5f4f64ce0e6096341.exe 13.exe PID 3464 wrote to memory of 3412 3464 e774dd9c86af55f5f4f64ce0e6096341.exe 13.exe PID 3464 wrote to memory of 3412 3464 e774dd9c86af55f5f4f64ce0e6096341.exe 13.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 1472 wrote to memory of 1892 1472 Faster.exe installer.exe PID 1472 wrote to memory of 1892 1472 Faster.exe installer.exe PID 1472 wrote to memory of 1892 1472 Faster.exe installer.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe PID 3412 wrote to memory of 3100 3412 13.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e774dd9c86af55f5f4f64ce0e6096341.exe"C:\Users\Admin\AppData\Local\Temp\e774dd9c86af55f5f4f64ce0e6096341.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\FastPc\FastPc\Faster.exe"C:\Program Files (x86)\FastPc\FastPc\Faster.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /qn CAMPAIGN="710"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1892 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msi" /qn CAMPAIGN=710 AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\installer.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1634905328 /qn CAMPAIGN=""710"" " CAMPAIGN="710"4⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\vpn.exe"C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=7203⤵
- Executes dropped EXE
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\is-05Q9H.tmp\vpn.tmp"C:\Users\Admin\AppData\Local\Temp\is-05Q9H.tmp\vpn.tmp" /SL5="$401E4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\vpn.exe" /silent /subid=7204⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\uninstall.bat" "5⤵PID:1548
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe remove tap09016⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\MaskVPN\driver\win764\install.bat" "5⤵PID:2536
-
C:\Program Files (x86)\MaskVPN\driver\win764\tapinstall.exetapinstall.exe install OemVista.inf tap09016⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
PID:1324 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" uninstall5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe" install5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe"C:\Users\Admin\AppData\Local\Temp\Settings Installation.exe" SID=775 SID CID=775 SILENT=1 /quiet3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\note866.exe"C:\Users\Admin\AppData\Local\Temp\note866.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
PID:3444 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 100 > Nul & Del "C:\Program Files (x86)\FastPc\FastPc\Faster.exe"& ping 1.1.1.1 -n 1 -w 900 > Nul & Del "C:\Program Files (x86)\FastPc\FastPc\Faster.exe"3⤵PID:656
-
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 1004⤵
- Runs ping.exe
PID:2220 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 9004⤵
- Runs ping.exe
PID:2280 -
C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"C:\Program Files (x86)\FastPc\FastPc\Fast_.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Program Files (x86)\FastPc\FastPc\Fast.exe"C:\Program Files (x86)\FastPc\FastPc\Fast.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im Fast.exe /f & timeout /t 6 & del /f /q "C:\Program Files (x86)\FastPc\FastPc\Fast.exe" & del C:\ProgramData\*.dll & exit3⤵PID:1456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im Fast.exe /f4⤵
- Kills process with taskkill
PID:1316 -
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
PID:700 -
C:\Program Files (x86)\FastPc\FastPc\13.exe"C:\Program Files (x86)\FastPc\FastPc\13.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Blocklisted process makes network request
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2372
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 37942376F286DA41580A91B1C6493257 C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2939CB285E5DB1B6290A8280472A018C2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe" /im AdvancedWindowsManager* /f3⤵
- Kills process with taskkill
PID:3476 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 995185AFBC86BF092114DDD452C8D755 E Global\MSI00002⤵
- Loads dropped DLL
PID:1540
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3780 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{279c873a-bb2e-404f-be4d-be4e3689cf0e}\oemvista.inf" "9" "4d14a44ff" "0000000000000174" "WinSta0\Default" "0000000000000178" "208" "c:\program files (x86)\maskvpn\driver\win764"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2840 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oemvista.inf:3beb73aff103cc24:tap0901.ndi:9.0.0.21:tap0901," "4d14a44ff" "0000000000000174"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3528
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
PID:376
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s NetSetupSvc1⤵PID:1160
-
C:\Program Files (x86)\MaskVPN\mask_svc.exe"C:\Program Files (x86)\MaskVPN\mask_svc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4004 -
C:\Program Files (x86)\MaskVPN\MaskVPNUpdate.exeMaskVPNUpdate.exe /silent2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\FastPc\FastPc\13.exeMD5
9cd16c67cb53894f94a5d732ecd3f009
SHA1126d45dbe070ceb6fe1eb8a8cef99a2349a59f5e
SHA25695f799d8cf5da3d15fc6cc66807f8a0d5bcdf5755ae933513f24d37347845631
SHA512bf50a855da003bcfa1e8c6fffe0492adbf86e73ed85eef8151da2cc6f39600531f902d2729637328c5b3d37690c021f336d64c768574c68b3b2856c6c47148e0
-
C:\Program Files (x86)\FastPc\FastPc\13.exeMD5
9cd16c67cb53894f94a5d732ecd3f009
SHA1126d45dbe070ceb6fe1eb8a8cef99a2349a59f5e
SHA25695f799d8cf5da3d15fc6cc66807f8a0d5bcdf5755ae933513f24d37347845631
SHA512bf50a855da003bcfa1e8c6fffe0492adbf86e73ed85eef8151da2cc6f39600531f902d2729637328c5b3d37690c021f336d64c768574c68b3b2856c6c47148e0
-
C:\Program Files (x86)\FastPc\FastPc\Fast.exeMD5
37f9ed9d61e6463796aeeb8b72fe3b37
SHA10a70b57a1a674a881ca23405532848e31acfe770
SHA256a391af39b144458767e805699ef1964bf65f1e5ca82ef6980796c8af4e86e25c
SHA512979565d457ad31a5ad2bda417aa8dace2532083ada0ed1391a017b9a67701c819e9f3dc898a8dba429006e83138eb14ca43b6cbd3a891f50dbaafacb036b53e1
-
C:\Program Files (x86)\FastPc\FastPc\Fast.exeMD5
37f9ed9d61e6463796aeeb8b72fe3b37
SHA10a70b57a1a674a881ca23405532848e31acfe770
SHA256a391af39b144458767e805699ef1964bf65f1e5ca82ef6980796c8af4e86e25c
SHA512979565d457ad31a5ad2bda417aa8dace2532083ada0ed1391a017b9a67701c819e9f3dc898a8dba429006e83138eb14ca43b6cbd3a891f50dbaafacb036b53e1
-
C:\Program Files (x86)\FastPc\FastPc\Fast_.exeMD5
bb7db2a053187c745dbafd790698bb40
SHA159c2abc023c9e7d6ffe37253cd6b3b041be694af
SHA256f3f66f68f10dd0291956577ad36fc5a3a1fb25114128fa61206b00e274315bf3
SHA512da6edcb05483571faecd00fd4aaab48a1e82a5bd91af2783044dea142f933dd0a929cd8c9f4e6f3e0dfcec6f47fa17db0ce42d0876c6b79525d412efe61f6c0c
-
C:\Program Files (x86)\FastPc\FastPc\Fast_.exeMD5
bb7db2a053187c745dbafd790698bb40
SHA159c2abc023c9e7d6ffe37253cd6b3b041be694af
SHA256f3f66f68f10dd0291956577ad36fc5a3a1fb25114128fa61206b00e274315bf3
SHA512da6edcb05483571faecd00fd4aaab48a1e82a5bd91af2783044dea142f933dd0a929cd8c9f4e6f3e0dfcec6f47fa17db0ce42d0876c6b79525d412efe61f6c0c
-
C:\Program Files (x86)\FastPc\FastPc\Faster.exeMD5
f711d75ce1395b0508eb9e070c049ddc
SHA184d0d9ac0cbd18ee40bf8ea5677924199cc86682
SHA256e1df59a397c7669a857c4e796ba9461522ca40147654e7e66f0996e12b45158c
SHA512c83056b9484d2a066be74e2f1e8ecca8a49d165fb54736eb69bfde279023af20a506514ced2160d12ed9875d441313d0fadc710beebb3c739c69286e85deaa96
-
C:\Program Files (x86)\FastPc\FastPc\Faster.exeMD5
f711d75ce1395b0508eb9e070c049ddc
SHA184d0d9ac0cbd18ee40bf8ea5677924199cc86682
SHA256e1df59a397c7669a857c4e796ba9461522ca40147654e7e66f0996e12b45158c
SHA512c83056b9484d2a066be74e2f1e8ecca8a49d165fb54736eb69bfde279023af20a506514ced2160d12ed9875d441313d0fadc710beebb3c739c69286e85deaa96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44DMD5
2fc55093a53844dfdbd49c44bb78d9ca
SHA18445ede766f298f57a802c28bba86bf393dc7aac
SHA25651425152a85473161de0acca3b3a45d50384b657bc9bca22e7660337adb29bc1
SHA5122709654a3416f6093d0b0d451b99ab5746a3ecefde02e5b6dd1e85984749be80687d878f7e8dfc599be62d061de7a154995a640456b826891f610dd6267ab2c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_7ACDCC18BE3F9272783F723CF7E4C78BMD5
7b817f23f6f2d980fd6e1f17a621d829
SHA151c602046a3886e1daa85e1df19bc81dfeb1a5a9
SHA256158500324d7811cec6ead0f8ca1c0795d41eb41be984acb4d6855adec637d812
SHA51289e35b02db3617b9a52235e2d4a1faab6488de60bd60cb91f32b6a42527ba93213988417b52de77f070a83e6974e04dc8af034d0df867af1d66e944b79b9b1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44DMD5
9fb900a32ce9852bbce823836fc4a1ca
SHA1d397d0eb031774138421e621dafa34247d242811
SHA256dad6a8537a36d5725ad517dbb2cc307f8109a3672a536e42b173121a0b17bba5
SHA51283f898c141f3650a839a7790db1992c9c1f8b5ac77c0707f60f8f1793eafa614487357f24a9fa724a0e98e18f99be5b648c1d72b380620c09d3194b20b06ffd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_7ACDCC18BE3F9272783F723CF7E4C78BMD5
71af597cb7a4d933cdaca0a327f736b3
SHA1d15ff507da807477e475c911176ac94ee1b6c6f4
SHA25652dffe9e590b7b157e84d1a69a0a3a94916ac3dfe02f265ce08fdc928cbde466
SHA51272dab8c2ac1ce5afd654d203be0b0b97dc0eedb449a259d25c2b8759a12c458d168240875e0c40c0789d6e57cf02440980a14c0a70482f51baf11460991452e3
-
C:\Users\Admin\AppData\Local\AdvinstAnalytics\6073fee5118372253d99d22b\1.0.0\tracking.iniMD5
32d217cadc8f82951dc3911142145a00
SHA1ab36486c62021741cf971d2aee7e7dc568ea0d13
SHA256ce4e24c096ce15535c3afcdf1de062bfd2cf198d0dafe4a776f66e2f2ec0b03c
SHA5121c522570c83633eed252095ed680a5efd1d315ba437d59274071f8fde4b87ba1993011776901d7c1eebe5c3a421a875d253908f0b49f3dcbbe72abe72f83ffec
-
C:\Users\Admin\AppData\Local\Temp\MSIDC9.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Users\Admin\AppData\Local\Temp\MSIFAF.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
C:\Users\Admin\AppData\Local\Temp\installer.exeMD5
c313ddb7df24003d25bf62c5a218b215
SHA120a3404b7e17b530885fa0be130e784f827986ee
SHA256e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1
SHA512542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff
-
C:\Users\Admin\AppData\Local\Temp\installer.exeMD5
c313ddb7df24003d25bf62c5a218b215
SHA120a3404b7e17b530885fa0be130e784f827986ee
SHA256e3bc81a59fc45dfdfcc57b0078437061cb8c3396e1d593fcf187e3cdf0373ed1
SHA512542e2746626a066f3e875ae2f0d15e2c4beb5887376bb0218090f0e8492a6fdb11fa02b035d7d4200562811df7d2187b8a993a0b7f65489535919bdf11eb4cff
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\AdvancedWindowsManager.exeMD5
a2dbd075d730064e16829e8a8d74d74a
SHA19906b678376c3e6e52b26416daee0961bcf8bfcf
SHA256152a160eca0475f99245a347ee8ffdde2f55e8a395862d03ed389234dcdd0f25
SHA512c8a251da36188a3d5a27da53a401b286086101132c651a915e86b614fc9bfa6b85e075e280b34dce2c5f824836ead4f503d743e13eb19a6f542ccc1041bbd325
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Manager - Postback Y.msiMD5
98e537669f4ce0062f230a14bcfcaf35
SHA1a19344f6a5e59c71f51e86119f5fa52030a92810
SHA2566f515aac05311f411968ee6e48d287a1eb452e404ffeff75ee0530dcf3243735
SHA5121ebc254289610be65882a6ceb1beebbf2be83006117f0a6ccbddd19ab7dc807978232a13ad5fa39b6f06f694d4f7c75760b773d70b87c0badef1da89bb7af3ac
-
C:\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\97FDF62\Windows Updater.exeMD5
7c7d186aed388bd4f7ba5e147dc9a4a2
SHA17a56bb4c919ad25ab25ee6a8c372b23d6803e14e
SHA2569f4ffb459ec20f1122b726aee14e402910440084d31f764e4488023111021766
SHA512e2e40684481349c83ee5707f7ed1fe91caaf831c6948618e1017bceef344896e8afe50eeb89464ea69ed1db27ac4fc3663f0b04a0693d85ddd86ba38b3e440a3
-
C:\Windows\Installer\MSI17F9.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
C:\Windows\Installer\MSI1A8A.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Windows\Installer\MSI1B46.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Windows\Installer\MSI1BE4.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Windows\Installer\MSI1C23.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Windows\Installer\MSI1CEF.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
C:\Windows\Installer\MSI1D8C.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
C:\Windows\Installer\MSI1F04.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
C:\Windows\Installer\MSI1FE0.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
C:\Windows\Installer\MSI20BC.tmpMD5
5f1b243813a203c66ba735139d8ce0c7
SHA1c60a57668d348a61e4e2f12115afb9f9024162ba
SHA25652d5b228221cd5276e4ee2a038e0ce0cf494d5af9c23ac45dcbfadc3115c8cb2
SHA512083c6d1af44847db4b6fb90349234128141a838d1d438d5c24f5063539a8087f0814d06cfa162aeace20e162292f64c7635b4a0e81b2ca972706cfbc484adfb5
-
C:\Windows\Installer\MSI232E.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
C:\Windows\Installer\MSI2534.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI2749.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI2882.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI28E1.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI2940.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI299F.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
C:\Windows\Installer\MSI2A5B.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\Users\Admin\AppData\Local\Temp\INAD0C.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Users\Admin\AppData\Local\Temp\MSIDC9.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Users\Admin\AppData\Local\Temp\MSIFAF.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllMD5
2ca6d4ed5dd15fb7934c87e857f5ebfc
SHA1383a55cc0ab890f41b71ca67e070ac7c903adeb6
SHA25639412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc
SHA512ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4
-
\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllMD5
2ca6d4ed5dd15fb7934c87e857f5ebfc
SHA1383a55cc0ab890f41b71ca67e070ac7c903adeb6
SHA25639412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc
SHA512ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4
-
\Users\Admin\AppData\Roaming\AW Manager\Windows Manager 1.0.0\install\decoder.dllMD5
2ca6d4ed5dd15fb7934c87e857f5ebfc
SHA1383a55cc0ab890f41b71ca67e070ac7c903adeb6
SHA25639412aacdcddc4b2b3cfeb126456edb125ce8cadb131ca5c23c031db4431c5fc
SHA512ce11aa5bd7b0da4baf07146e8377ff0331c1d4b04aaa4408373b4dd0fe2c3f82c84b179d9a90d26cdaa02180f22276d96cf491f9ede66f5f1da6f43cc72e5ac4
-
\Windows\Installer\MSI17F9.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Windows\Installer\MSI1A8A.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Windows\Installer\MSI1B46.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Windows\Installer\MSI1BE4.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Windows\Installer\MSI1C23.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Windows\Installer\MSI1CEF.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Windows\Installer\MSI1D8C.tmpMD5
43d68e8389e7df33189d1c1a05a19ac8
SHA1caf9cc610985e5cfdbae0c057233a6194ecbfed4
SHA25685dc7518ad5aa46ef572f17050e3b004693784d1855cca9390da1143a64fceae
SHA51258a76b4cb8f53cee73a8fc2afbd69388a1f2ea30ea3c0007beaa361cb0cc3d4d18c1fa8ccf036a2d2cf8fa07b01451000a704a626d95bd050afe6ba808e6de1e
-
\Windows\Installer\MSI1F04.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Windows\Installer\MSI1FE0.tmpMD5
0981d5c068a9c33f4e8110f81ffbb92e
SHA1badb871adf6f24aba6923b9b21b211cea2aeca77
SHA256b3f5e10fb1b7352a6dbbcbb10ed605a8fda24f3f9c31f954835bd5a41eb6ea68
SHA51259cccdcde1964e61fa63078fde776eee91c462d7d3db308ada02e27e6ce584c41ad1f7970642e02ce331d805215a2cc868fb0512c01accfa70cda52e9329e1d8
-
\Windows\Installer\MSI20BC.tmpMD5
5f1b243813a203c66ba735139d8ce0c7
SHA1c60a57668d348a61e4e2f12115afb9f9024162ba
SHA25652d5b228221cd5276e4ee2a038e0ce0cf494d5af9c23ac45dcbfadc3115c8cb2
SHA512083c6d1af44847db4b6fb90349234128141a838d1d438d5c24f5063539a8087f0814d06cfa162aeace20e162292f64c7635b4a0e81b2ca972706cfbc484adfb5
-
\Windows\Installer\MSI232E.tmpMD5
7468eca4e3b4dbea0711a81ae9e6e3f2
SHA14a0c34c342ee7c9df2a0d58d0b5e8bfe94d1251d
SHA25673af1e816ec70be2a3e087af6ed7abc783c50c06b9df224f101e13a792df9837
SHA5123f93a70c8cc05426e08a404c9d1922a46dd4122e7f42bc292f3b5064903a15e13069b58cb615918cc06deaf31bd5805a925cbd656aabc5d78068eb7224a63f56
-
\Windows\Installer\MSI2534.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI2749.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI2882.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI28E1.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI2940.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI299F.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
\Windows\Installer\MSI2A5B.tmpMD5
9824aa0d785bef52b2f5ca21b7eacf8e
SHA154ae25b7ea5e6bd3e0a77f10650c6f441a0b1764
SHA256e59b2b4d1466e834f1c797319b920ea13b3cdb04a7777dac9a31c6551ff5715a
SHA51267d421cc29d53fca937e5afa492610ea3e6370dc46edcdc8568255ea53de8d04498cec43ee3e2a6c91fde92c4b2b6552fd3ae02cb3d6c88f28f1f3f4ede6e07a
-
memory/656-386-0x0000000000000000-mapping.dmp
-
memory/700-194-0x0000000000000000-mapping.dmp
-
memory/1068-321-0x0000000000000000-mapping.dmp
-
memory/1068-326-0x00000000017E0000-0x000000000192A000-memory.dmpFilesize
1.3MB
-
memory/1316-193-0x0000000000000000-mapping.dmp
-
memory/1316-338-0x0000000000000000-mapping.dmp
-
memory/1316-339-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB
-
memory/1324-305-0x0000000000000000-mapping.dmp
-
memory/1332-222-0x0000000006100000-0x0000000006101000-memory.dmpFilesize
4KB
-
memory/1332-221-0x0000000005A90000-0x0000000005A91000-memory.dmpFilesize
4KB
-
memory/1332-144-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/1332-237-0x0000000006750000-0x0000000006751000-memory.dmpFilesize
4KB
-
memory/1332-231-0x0000000005E50000-0x0000000005E51000-memory.dmpFilesize
4KB
-
memory/1332-148-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/1332-156-0x0000000004E70000-0x0000000005476000-memory.dmpFilesize
6.0MB
-
memory/1332-157-0x0000000004EF0000-0x0000000004EF1000-memory.dmpFilesize
4KB
-
memory/1332-140-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/1332-248-0x0000000006970000-0x0000000006971000-memory.dmpFilesize
4KB
-
memory/1332-120-0x0000000000000000-mapping.dmp
-
memory/1332-249-0x0000000007070000-0x0000000007071000-memory.dmpFilesize
4KB
-
memory/1332-136-0x0000000000670000-0x0000000000671000-memory.dmpFilesize
4KB
-
memory/1332-228-0x0000000005EF0000-0x0000000005EF1000-memory.dmpFilesize
4KB
-
memory/1332-169-0x0000000004F30000-0x0000000004F31000-memory.dmpFilesize
4KB
-
memory/1332-225-0x0000000005DD0000-0x0000000005DD1000-memory.dmpFilesize
4KB
-
memory/1404-286-0x0000000000000000-mapping.dmp
-
memory/1404-290-0x00000000023E0000-0x00000000023E1000-memory.dmpFilesize
4KB
-
memory/1404-289-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/1404-301-0x00000000093D0000-0x00000000093D1000-memory.dmpFilesize
4KB
-
memory/1456-192-0x0000000000000000-mapping.dmp
-
memory/1472-134-0x000000001B314000-0x000000001B316000-memory.dmpFilesize
8KB
-
memory/1472-133-0x000000001B312000-0x000000001B314000-memory.dmpFilesize
8KB
-
memory/1472-132-0x000000001B310000-0x000000001B312000-memory.dmpFilesize
8KB
-
memory/1472-145-0x000000001B316000-0x000000001B318000-memory.dmpFilesize
8KB
-
memory/1472-118-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/1472-115-0x0000000000000000-mapping.dmp
-
memory/1540-232-0x0000000000000000-mapping.dmp
-
memory/1540-233-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1540-234-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1548-302-0x0000000000000000-mapping.dmp
-
memory/1892-158-0x0000000000000000-mapping.dmp
-
memory/1908-197-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/1908-196-0x0000000000FB0000-0x0000000000FB1000-memory.dmpFilesize
4KB
-
memory/1908-195-0x0000000000000000-mapping.dmp
-
memory/1976-184-0x0000000000000000-mapping.dmp
-
memory/1976-185-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/1976-186-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/2024-303-0x0000000000000000-mapping.dmp
-
memory/2104-179-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/2104-178-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/2104-177-0x0000000000000000-mapping.dmp
-
memory/2220-387-0x0000000000000000-mapping.dmp
-
memory/2280-388-0x0000000000000000-mapping.dmp
-
memory/2288-127-0x0000000000E00000-0x0000000000ED6000-memory.dmpFilesize
856KB
-
memory/2288-123-0x0000000000000000-mapping.dmp
-
memory/2288-126-0x0000000000B16000-0x0000000000B92000-memory.dmpFilesize
496KB
-
memory/2288-128-0x0000000000400000-0x00000000008E3000-memory.dmpFilesize
4.9MB
-
memory/2332-316-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/2332-308-0x0000000000000000-mapping.dmp
-
memory/2372-320-0x0000000000400000-0x000000000053C000-memory.dmpFilesize
1.2MB
-
memory/2372-262-0x00007FF8AE9A0000-0x00007FF8AEB7B000-memory.dmpFilesize
1.9MB
-
memory/2372-261-0x0000000000950000-0x0000000000959000-memory.dmpFilesize
36KB
-
memory/2372-256-0x0000000000000000-mapping.dmp
-
memory/2524-337-0x0000000000000000-mapping.dmp
-
memory/2536-304-0x0000000000000000-mapping.dmp
-
memory/2840-306-0x0000000000000000-mapping.dmp
-
memory/3100-146-0x0000000000580000-0x0000000000582000-memory.dmpFilesize
8KB
-
memory/3100-138-0x0000000000000000-mapping.dmp
-
memory/3100-139-0x0000000077BB9000-0x0000000077BBA000-memory.dmpFilesize
4KB
-
memory/3100-251-0x00007FF8AE9A0000-0x00007FF8AEB7B000-memory.dmpFilesize
1.9MB
-
memory/3100-250-0x00000000008D0000-0x00000000008D8000-memory.dmpFilesize
32KB
-
memory/3412-129-0x0000000000000000-mapping.dmp
-
memory/3412-135-0x0000000000DB0000-0x0000000000DB1000-memory.dmpFilesize
4KB
-
memory/3444-341-0x0000000000030000-0x0000000000033000-memory.dmpFilesize
12KB
-
memory/3444-340-0x0000000000000000-mapping.dmp
-
memory/3468-174-0x000001E2CF290000-0x000001E2CF292000-memory.dmpFilesize
8KB
-
memory/3468-175-0x000001E2CF290000-0x000001E2CF292000-memory.dmpFilesize
8KB
-
memory/3476-201-0x0000000000000000-mapping.dmp
-
memory/3528-307-0x0000000000000000-mapping.dmp
-
memory/3896-283-0x0000000000000000-mapping.dmp
-
memory/3896-288-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/4004-336-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB