Analysis
-
max time kernel
111s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:46
Static task
static1
Behavioral task
behavioral1
Sample
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe
Resource
win10v2004-20220414-en
General
-
Target
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe
-
Size
10.4MB
-
MD5
51fc6af2fca0debc1b2a9cd657c51f08
-
SHA1
717598e0090355ea6879466379672318f32f0338
-
SHA256
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9
-
SHA512
b98935bfa8b76c503e41cd1040c95dde20b6cbd15ed1c90656725098c2d48afcf7ba65d19e6fe6287622dec9b5bb39c2a9e6dd2c0fab8136ad3dbc1874d122a4
Malware Config
Extracted
C:\Program Files\OpenVPN\doc\openvpn.8.html
HREF="mailto:[email protected]">[email protected]</A></B>
HREF="mailto:[email protected]">[email protected]</A>
HREF="mailto:[email protected]">[email protected]</A>
HREF="mailto:[email protected]">[email protected]</A>>
HREF="mailto:[email protected]">[email protected]</A>>
http-proxy
Signatures
-
Drops file in Drivers directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\System32\drivers\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SETA009.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETA009.tmp DrvInst.exe -
Executes dropped EXE 8 IoCs
Processes:
hidec.exedevcon64.exedevcon64.exeopenvpn-install-2.4.8-I602-Win10.exetap-windows.exetapinstall.exetapinstall.exeopenvpnserv.exepid process 4644 hidec.exe 3168 devcon64.exe 3292 devcon64.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 1128 tap-windows.exe 972 tapinstall.exe 4688 tapinstall.exe 3328 openvpnserv.exe -
Modifies Installed Components in the registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe -
Loads dropped DLL 41 IoCs
Processes:
openvpn-install-2.4.8-I602-Win10.exetap-windows.exepid process 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 1128 tap-windows.exe 1128 tap-windows.exe 1128 tap-windows.exe 1128 tap-windows.exe 1128 tap-windows.exe 1128 tap-windows.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 16 IoCs
Processes:
DrvInst.exetapinstall.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\tap0901.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdf\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B8.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdf\tap0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdf\tap0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdf\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B8.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{e87902c0-d9c4-7542-bbfc-7fa63d10ee4d}\SET90B9.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
Processes:
openvpn-install-2.4.8-I602-Win10.exexcopy.exetap-windows.exedescription ioc process File created C:\Program Files\OpenVPN\bin\libpkcs11-helper-1.dll openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\devcon32.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\config xcopy.exe File created C:\Program Files\OpenVPN\bin\openvpnserv.exe openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\config\README.txt openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\Uninstall.exe openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\devcon64.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x32\oemwin2k.inf xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x64\oemwin2k.inf xcopy.exe File created C:\Program Files\TAP-Windows\bin\addtap.bat tap-windows.exe File opened for modification C:\Program Files\OpenVPN\bin\devcon64.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x32\tap0901.sys xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x64 xcopy.exe File created C:\Program Files\OpenVPN\sample-config\sample.ovpn openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\log\README.txt openvpn-install-2.4.8-I602-Win10.exe File opened for modification C:\Program Files\OpenVPN\hidec.exe xcopy.exe File created C:\Program Files\OpenVPN\sample-config\server.ovpn openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\TAP-Windows\Uninstall.exe tap-windows.exe File created C:\Program Files\TAP-Windows\license.txt tap-windows.exe File created C:\Program Files\OpenVPN\bin\openvpn-gui.exe openvpn-install-2.4.8-I602-Win10.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x32\tap0901.cat xcopy.exe File created C:\Program Files\OpenVPN\bin\tap\x64\tap0901.cat xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x64\tap0901.cat xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\devcon32.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tapadd.au3 xcopy.exe File created C:\Program Files\OpenVPN\bin\openvpn.exe openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\doc\INSTALL-win32.txt openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\doc\openvpn.8.html openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\icon.ico openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\hidec.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\autoit3.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tapdel.bat xcopy.exe File created C:\Program Files\TAP-Windows\bin\deltapall.bat tap-windows.exe File created C:\Program Files\TAP-Windows\icon.ico tap-windows.exe File opened for modification C:\Program Files\OpenVPN xcopy.exe File created C:\Program Files\OpenVPN\openvpn.ico xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\openvpn-run.exe xcopy.exe File created C:\Program Files\TAP-Windows\bin\tapinstall.exe tap-windows.exe File created C:\Program Files\OpenVPN\bin\tap\x32\tap0901.sys xcopy.exe File created C:\Program Files\OpenVPN\bin\tap\x64\oemwin2k.inf xcopy.exe File created C:\Program Files\OpenVPN\sample-config\client.ovpn openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\openvpnserv2.exe openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\liblzo2-2.dll openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\openvpn-run.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap xcopy.exe File created C:\Program Files\OpenVPN\bin\tapadd.au3 xcopy.exe File created C:\Program Files\OpenVPN\bin\tapadd.cer xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x64\tap0901.sys xcopy.exe File created C:\Program Files\TAP-Windows\driver\tap0901.sys tap-windows.exe File created C:\Program Files\OpenVPN\bin\openssl.exe openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\bin\libcrypto-1_1-x64.dll openvpn-install-2.4.8-I602-Win10.exe File created C:\Program Files\OpenVPN\doc\license.txt openvpn-install-2.4.8-I602-Win10.exe File opened for modification C:\Program Files\OpenVPN\openvpn.ico xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tapadd.bat xcopy.exe File created C:\Program Files\TAP-Windows\driver\tap0901.cat tap-windows.exe File created C:\Program Files\OpenVPN\bin\autoit3.exe xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tapadd.cer xcopy.exe File opened for modification C:\Program Files\OpenVPN\bin\tap\x32 xcopy.exe File created C:\Program Files\OpenVPN\bin\tap\x64\tap0901.sys xcopy.exe File created C:\Program Files\OpenVPN\bin\tap\x32\tap0901.cat xcopy.exe File created C:\Program Files\OpenVPN\config\asdushkin.ovpn xcopy.exe File created C:\Program Files\TAP-Windows\driver\OemVista.inf tap-windows.exe File created C:\Program Files\OpenVPN\bin\libssl-1_1-x64.dll openvpn-install-2.4.8-I602-Win10.exe File opened for modification C:\Program Files\OpenVPN\bin xcopy.exe -
Drops file in Windows directory 6 IoCs
Processes:
DrvInst.exeDrvInst.exetapinstall.exesvchost.exedescription ioc process File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\tap-windows.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\tap-windows.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\tap-windows.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\tap-windows.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
tapinstall.exeDrvInst.exesvchost.exedevcon64.exedevcon64.exeDrvInst.exetapinstall.exesvchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 3412 taskkill.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
DrvInst.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 15 IoCs
Processes:
openvpn-install-2.4.8-I602-Win10.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\run openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\run\ = "Start OpenVPN on this config file" openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\run\command openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\ = "OpenVPN Config File" openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\DefaultIcon openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ovpn openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\open\command openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ovpn\ = "OpenVPNFile" openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\DefaultIcon\ = "C:\\Program Files\\OpenVPN\\icon.ico,0" openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\open\command\ = "notepad.exe \"%1\"" openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\run\command\ = "\"C:\\Program Files\\OpenVPN\\bin\\openvpn.exe\" --pause-exit --config \"%1\"" openvpn-install-2.4.8-I602-Win10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\ = "open" openvpn-install-2.4.8-I602-Win10.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\OpenVPNFile\shell\open openvpn-install-2.4.8-I602-Win10.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
openvpn-install-2.4.8-I602-Win10.exepid process 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe 4732 openvpn-install-2.4.8-I602-Win10.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exesvchost.exetapinstall.exeDrvInst.exesvchost.exedescription pid process Token: SeDebugPrivilege 3412 taskkill.exe Token: SeAuditPrivilege 3744 svchost.exe Token: SeSecurityPrivilege 3744 svchost.exe Token: SeLoadDriverPrivilege 4688 tapinstall.exe Token: SeRestorePrivilege 1336 DrvInst.exe Token: SeBackupPrivilege 1336 DrvInst.exe Token: SeLoadDriverPrivilege 1336 DrvInst.exe Token: SeLoadDriverPrivilege 1336 DrvInst.exe Token: SeLoadDriverPrivilege 1336 DrvInst.exe Token: SeShutdownPrivilege 1676 svchost.exe Token: SeCreatePagefilePrivilege 1676 svchost.exe Token: SeLoadDriverPrivilege 1676 svchost.exe Token: SeLoadDriverPrivilege 1676 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exehidec.execmd.exeopenvpn-install-2.4.8-I602-Win10.exetap-windows.exedescription pid process target process PID 5028 wrote to memory of 4644 5028 ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe hidec.exe PID 5028 wrote to memory of 4644 5028 ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe hidec.exe PID 5028 wrote to memory of 4644 5028 ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe hidec.exe PID 4644 wrote to memory of 4896 4644 hidec.exe cmd.exe PID 4644 wrote to memory of 4896 4644 hidec.exe cmd.exe PID 4644 wrote to memory of 4896 4644 hidec.exe cmd.exe PID 4896 wrote to memory of 4104 4896 cmd.exe chcp.com PID 4896 wrote to memory of 4104 4896 cmd.exe chcp.com PID 4896 wrote to memory of 4104 4896 cmd.exe chcp.com PID 4896 wrote to memory of 4984 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 4984 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 4984 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 1152 4896 cmd.exe find.exe PID 4896 wrote to memory of 1152 4896 cmd.exe find.exe PID 4896 wrote to memory of 1152 4896 cmd.exe find.exe PID 4896 wrote to memory of 1568 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 1568 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 1568 4896 cmd.exe cmd.exe PID 4896 wrote to memory of 4184 4896 cmd.exe find.exe PID 4896 wrote to memory of 4184 4896 cmd.exe find.exe PID 4896 wrote to memory of 4184 4896 cmd.exe find.exe PID 4896 wrote to memory of 3412 4896 cmd.exe taskkill.exe PID 4896 wrote to memory of 3412 4896 cmd.exe taskkill.exe PID 4896 wrote to memory of 3412 4896 cmd.exe taskkill.exe PID 4896 wrote to memory of 3216 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3216 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3216 4896 cmd.exe PING.EXE PID 4896 wrote to memory of 3168 4896 cmd.exe devcon64.exe PID 4896 wrote to memory of 3168 4896 cmd.exe devcon64.exe PID 4896 wrote to memory of 3292 4896 cmd.exe devcon64.exe PID 4896 wrote to memory of 3292 4896 cmd.exe devcon64.exe PID 4896 wrote to memory of 4256 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4256 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4256 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4252 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4252 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4252 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4456 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4456 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4456 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2212 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2212 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2212 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2692 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2692 4896 cmd.exe reg.exe PID 4896 wrote to memory of 2692 4896 cmd.exe reg.exe PID 4896 wrote to memory of 1360 4896 cmd.exe reg.exe PID 4896 wrote to memory of 1360 4896 cmd.exe reg.exe PID 4896 wrote to memory of 1360 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4232 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4232 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4232 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4196 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4196 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4196 4896 cmd.exe reg.exe PID 4896 wrote to memory of 4732 4896 cmd.exe openvpn-install-2.4.8-I602-Win10.exe PID 4896 wrote to memory of 4732 4896 cmd.exe openvpn-install-2.4.8-I602-Win10.exe PID 4896 wrote to memory of 4732 4896 cmd.exe openvpn-install-2.4.8-I602-Win10.exe PID 4732 wrote to memory of 1128 4732 openvpn-install-2.4.8-I602-Win10.exe tap-windows.exe PID 4732 wrote to memory of 1128 4732 openvpn-install-2.4.8-I602-Win10.exe tap-windows.exe PID 4732 wrote to memory of 1128 4732 openvpn-install-2.4.8-I602-Win10.exe tap-windows.exe PID 1128 wrote to memory of 972 1128 tap-windows.exe tapinstall.exe PID 1128 wrote to memory of 972 1128 tap-windows.exe tapinstall.exe PID 1128 wrote to memory of 4688 1128 tap-windows.exe tapinstall.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe"C:\Users\Admin\AppData\Local\Temp\ab4a399d20b831bbec26573ce82b72c6d71b7e978accd943cf26e3a75d3e87a9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\hidec.exe"C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\hidec.exe" "C:\Windows\system32\cmd.exe" /C "install.bat %~1 & ping 127.0.0.1 -n 11 & cd .. && rmdir /S /Q "C:\Users\Admin\AppData\Local\Temp\OpenVPN""2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "install.bat %~1 & ping 127.0.0.1 -n 11 & cd .. && rmdir /S /Q "C:\Users\Admin\AppData\Local\Temp\OpenVPN""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp.com 8664⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver.exe 2>nul"4⤵
-
C:\Windows\SysWOW64\find.exefind.exe " 6."4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver.exe 2>nul"4⤵
-
C:\Windows\SysWOW64\find.exefind.exe " 5."4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /F /T /IM "openvpn*" /IM "openssl.exe" /IM "autoit3.exe" /IM "devcon.exe" /IM "devcon32.exe" /IM "devcon64.exe" /IM "tap-windows.exe" /IM "openvpn-run.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping.exe 127.0.0.1 -n 24⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exe"C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exe" remove "tap0901"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exe"C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exe" remove "tap0801"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\SYSTEM\CurrentControlSet\Services\tap0801" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\SOFTWARE\OpenVPN" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\SOFTWARE\OpenVPN-GUI" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\SOFTWARE\Wow6432Node\OpenVPN" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKLM\SOFTWARE\Wow6432Node\OpenVPN-GUI" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\.ovpn" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCR\OpenVPN" /F4⤵
-
C:\Windows\SysWOW64\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ovpn" /F4⤵
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exe"C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exe" /S4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tap-windows.exe"C:\Users\Admin\AppData\Local\Temp\tap-windows.exe" /S /SELECT_UTILITIES=15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\TAP-Windows\bin\tapinstall.exe"C:\Program Files\TAP-Windows\bin\tapinstall.exe" hwids tap09016⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Program Files\TAP-Windows\bin\tapinstall.exe"C:\Program Files\TAP-Windows\bin\tapinstall.exe" install "C:\Program Files\TAP-Windows\driver\OemVista.inf" tap09016⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\xcopy.exexcopy.exe /E /C /Q /H /R /Y /Z "C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files" "C:\Program Files\OpenVPN\"4⤵
- Drops file in Program Files directory
- Enumerates system info in registry
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ver.exe 2>nul"4⤵
-
C:\Windows\SysWOW64\find.exefind.exe " 6."4⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles.exe /C "C:\Windows\system32\cmd.exe /C if @isdir==TRUE ( rmdir /S /Q @path )" /M "OpenVPN"4⤵
-
C:\Windows\SysWOW64\cmd.exe/C if TRUE==TRUE ( rmdir /S /Q "C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\OpenVPN" )5⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles.exe /C "C:\Windows\system32\cmd.exe /C if @isdir==FALSE ( del /A /F /Q @path )" /M "OpenVPN GUI.lnk"4⤵
-
C:\Windows\SysWOW64\cmd.exe/C if FALSE==FALSE ( del /A /F /Q "C:\Users\Public\Desktop\OpenVPN GUI.lnk" )5⤵
-
C:\Windows\SysWOW64\forfiles.exeforfiles.exe /C "C:\Windows\system32\cmd.exe /C if @isdir==TRUE ( rmdir /S /Q @path )" /M "TAP-Windows"4⤵
-
C:\Windows\SysWOW64\cmd.exe/C if TRUE==TRUE ( rmdir /S /Q "C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\TAP-Windows" )5⤵
-
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\OpenVPN\shortcut.vbs" "C:\Program Files\OpenVPN\bin\openvpn-run.exe" "AllUsersPrograms" "OpenVPN" "VPN-клиент" "C:\Program Files\OpenVPN\openvpn.ico"4⤵
-
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\OpenVPN\shortcut.vbs" "C:\Program Files\OpenVPN\bin\openvpn-run.exe" "AllUsersDesktop" "OpenVPN" "VPN-клиент" "C:\Program Files\OpenVPN\openvpn.ico"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 114⤵
- Runs ping.exe
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{56f364b8-0744-de49-bdc8-02fa4c1157d1}\oemvista.inf" "9" "4d14a44ff" "0000000000000140" "WinSta0\Default" "00000000000000B8" "208" "c:\program files\tap-windows\driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tap0901.ndi:9.24.2.601:tap0901," "4d14a44ff" "0000000000000170"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s NetSetupSvc1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\OpenVPN\bin\openvpnserv.exe"C:\Program Files\OpenVPN\bin\openvpnserv.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\TAP-Windows\bin\tapinstall.exeFilesize
495KB
MD5e313336c82eb265542664cc7a360c5ff
SHA1184211a456e09ac606db76f814332cc912c0f5eb
SHA256b6b33f4cd19c606e4c616f08c11fd4ae775accb24b78ef66eb31c279ca403381
SHA512f156f2f55af7026f5b3d2c5634806c5764fd230521d71969e80bbf6f6571730636dd5f6fe6c1138fa742e12003e5cc5f7d82e729ef7506057f8b510384e52386
-
C:\Program Files\TAP-Windows\bin\tapinstall.exeFilesize
495KB
MD5e313336c82eb265542664cc7a360c5ff
SHA1184211a456e09ac606db76f814332cc912c0f5eb
SHA256b6b33f4cd19c606e4c616f08c11fd4ae775accb24b78ef66eb31c279ca403381
SHA512f156f2f55af7026f5b3d2c5634806c5764fd230521d71969e80bbf6f6571730636dd5f6fe6c1138fa742e12003e5cc5f7d82e729ef7506057f8b510384e52386
-
C:\Program Files\TAP-Windows\bin\tapinstall.exeFilesize
495KB
MD5e313336c82eb265542664cc7a360c5ff
SHA1184211a456e09ac606db76f814332cc912c0f5eb
SHA256b6b33f4cd19c606e4c616f08c11fd4ae775accb24b78ef66eb31c279ca403381
SHA512f156f2f55af7026f5b3d2c5634806c5764fd230521d71969e80bbf6f6571730636dd5f6fe6c1138fa742e12003e5cc5f7d82e729ef7506057f8b510384e52386
-
C:\Program Files\TAP-Windows\driver\OemVista.infFilesize
7KB
MD550d29ca2e3ddb8a696923420ec2ac4fa
SHA1d85f4e65fe10f13ded1780ddbd074edfc75f2d25
SHA256817dff7f4944a255a0a33b8d74eb60a755d8d268cc7afd46fce41e102e0a004b
SHA51203778a9cddd23639c88e24bb5d0446da3a400bb6b3321fb35887cd23d88d0f7ad3fe911642cc7f8d16d29cd9e42106851b0028379e8dbcb3c6721c238fc4a0d3
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exeFilesize
80KB
MD53904d0698962e09da946046020cbcb17
SHA1edae098e7e8452ca6c125cf6362dda3f4d78f0ae
SHA256a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289
SHA512c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exeFilesize
80KB
MD53904d0698962e09da946046020cbcb17
SHA1edae098e7e8452ca6c125cf6362dda3f4d78f0ae
SHA256a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289
SHA512c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\devcon64.exeFilesize
80KB
MD53904d0698962e09da946046020cbcb17
SHA1edae098e7e8452ca6c125cf6362dda3f4d78f0ae
SHA256a51e25acc489948b31b1384e1dc29518d19b421d6bc0ced90587128899275289
SHA512c24ab680981d8d6db042b52b7b5c5e92078df83650cad798874fc09ce8c8a25462e1b69340083f4bcad20d67068668abcfa8097e549cfa5ad4f1ee6a235d6eea
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\bin\tapdel.batFilesize
493B
MD520be78849f16f8008914d8146b5a06f3
SHA17025a9cf11277fcafb527a1b6bd72fa9e467d6e2
SHA256fac6e63efe3b4fbf2013b68f8e420b4d6ab6dd820a1205f75cf774bf27c9d0b2
SHA5120f8f5b7a7b678667bc263017df6b43b48451c8d6a9dd111103504943a81feba7da89d2eec0b1fc2fc3129e11f8037f4877aa41f5583afb2a2750e2dfd05deae0
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\hidec.exeFilesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\Files\hidec.exeFilesize
1KB
MD5abc6379205de2618851c4fcbf72112eb
SHA11ed7b1e965eab56f55efda975f9f7ade95337267
SHA25622e7528e56dffaa26cfe722994655686c90824b13eb51184abfe44d4e95d473f
SHA512180c7f400dd13092b470e3a91bf02e98ef6247c1193bf349e3710e8d1e9003f3bc9b792bb776eacb746e9c67b3041f2333cc07f28c5f046d59274742230fb7c1
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\install.batFilesize
7KB
MD5f3016c2cb0997158a76b6d5c6f2c4aab
SHA1654ebbde8cb295f79e265c4bcfe79fd2e5fcb335
SHA256ccc338c1528ce628db9053bafc6c55c79d364f6ebd397e3057618ac73c5a8a6b
SHA5127abb64fba592571e03b3ea62fa05256c317fd4cd759558866eb6494b2a8703e2fb41c5afd8ddc4fb8bef00f6a2b158471a4425edac6d21ec26ab4a42dd5545f3
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exeFilesize
4.1MB
MD56213c12277d643e14451a44a410d2688
SHA19c3fa39b6dc1ca9a02bf940c0509cf58a13fdf7d
SHA256d8f861de1519c680c4e506b4e08b4d80db7c385a4ccc2fcc56e2278d41c1cabe
SHA5126a2ef83c8d4f42cd39ad0e9c09c7a1deabb857f413243ddc18710f6128047e26d7bd0fba2a0b62414bd3aa8385dcb4af1fddc6c3494cf4a6c6696900dee4bea1
-
C:\Users\Admin\AppData\Local\Temp\OpenVPN\openvpn-install-2.4.8-I602-Win10.exeFilesize
4.1MB
MD56213c12277d643e14451a44a410d2688
SHA19c3fa39b6dc1ca9a02bf940c0509cf58a13fdf7d
SHA256d8f861de1519c680c4e506b4e08b4d80db7c385a4ccc2fcc56e2278d41c1cabe
SHA5126a2ef83c8d4f42cd39ad0e9c09c7a1deabb857f413243ddc18710f6128047e26d7bd0fba2a0b62414bd3aa8385dcb4af1fddc6c3494cf4a6c6696900dee4bea1
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\SimpleSC.dllFilesize
61KB
MD5d63975ce28f801f236c4aca5af726961
SHA13d93ad9816d3b3dba1e63dfcbfa3bd05f787a8c9
SHA256e0c580bbe48a483075c21277c6e0f23f3cbd6ce3eb2ccd3bf48cf68f05628f43
SHA5128357e1955560bf0c42a8f4091550c87c19b4939bf1e6a53a54173d1c163b133b9c517014af6f7614eddc0c9bbf93b3b987c4977b024b10b05b3dc4eb20141810
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\System.dllFilesize
23KB
MD52e025e2cee2953cce0160c3cd2e1a64e
SHA1dec3da040ea72d63528240598bf14f344efb2a76
SHA256d821a62802900b068dcf61ddc9fdff2f7ada04b706815ab6e5038b21543da8a5
SHA5123cafce382b605a68e5a3f35f95b32761685112c5a9da9f87b0a06ec13da4155145bd06ffb63131bf87c3dc8bd61cb085884c5e78c832386d70397e3974854860
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\System.dllFilesize
23KB
MD52e025e2cee2953cce0160c3cd2e1a64e
SHA1dec3da040ea72d63528240598bf14f344efb2a76
SHA256d821a62802900b068dcf61ddc9fdff2f7ada04b706815ab6e5038b21543da8a5
SHA5123cafce382b605a68e5a3f35f95b32761685112c5a9da9f87b0a06ec13da4155145bd06ffb63131bf87c3dc8bd61cb085884c5e78c832386d70397e3974854860
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\UserInfo.dllFilesize
6KB
MD59f0cb655a832fdecb9433dd781004637
SHA1bea6b32a5d2d6d152a52847db1184fab956a9d3b
SHA256a94fd67daf9137b26e2d98aa4cf46614439bd64263c5c211369a232c444862ea
SHA5125fd32197a5d9bb7cc65e3917791023fbe2b80a34899d4363475a7fb05fb1051c0a17c72359f3c215d0fd41bbb2dfed0bb95c766131fc175c18ac91cf54b05551
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\nsExec.dllFilesize
9KB
MD51139fb5cc942e668c8277f8b8f1e5f20
SHA194bbb2454dad420b70553c0fca4899f120d3ed43
SHA2569cb71f00c19397723d39861ff809c70f9d2cdbcf91b3dd8021060714512a39cb
SHA51208e8eb820801875208d9f28fb1416e0fc66abf5cc343e7ac973cc6736dbcd0f85b1bf42e8d110ad8c9a9ced204c00cf530099b8c411871762615051e1f7061d0
-
C:\Users\Admin\AppData\Local\Temp\nsa6D14.tmp\nsProcess.dllFilesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\ShellLink.dllFilesize
4KB
MD5aad75be0bdd1f1bac758b521c9f1d022
SHA15d444b8432c8834f5b5cd29225101856cebb8ecf
SHA256d1d1642f3e70386af125ec32f41734896427811770d617729d8d5ebdf18f8aa7
SHA5124c6e155cdf62cc8b65f3d0699c73c9032accefaa0f51e8b9a5c2f340ec8c6f5fab0ea02aad0abed476b3537292ba22d898589812850968e105ac83680d2f87d0
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\ShellLink.dllFilesize
4KB
MD5aad75be0bdd1f1bac758b521c9f1d022
SHA15d444b8432c8834f5b5cd29225101856cebb8ecf
SHA256d1d1642f3e70386af125ec32f41734896427811770d617729d8d5ebdf18f8aa7
SHA5124c6e155cdf62cc8b65f3d0699c73c9032accefaa0f51e8b9a5c2f340ec8c6f5fab0ea02aad0abed476b3537292ba22d898589812850968e105ac83680d2f87d0
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\UserInfo.dllFilesize
4KB
MD57836f464ae0102452e94a363b491b759
SHA159909a48448b99e2eb9cd336d81d60764da59f31
SHA25611adf8916947b5a20a071b494fa034cf62769dcc6293a1340b29a5bb29ac8e87
SHA5125ed63eefa1b3b3caad4cb762ccb8419c05bcad3da3a7415235cda2d2a1f79eb018503ca30a0a92d6b72160327decea9a70c48e0c28de94dd67303d4aea4a02db
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\nsExec.dllFilesize
6KB
MD550ba20cad29399e2db9fa75a1324bd1d
SHA13850634bb15a112623222972ef554c8d1eca16f4
SHA256e7b145abc7c519e6bd91dc06b7b83d1e73735ac1ac37d30a7889840a6eed38fc
SHA512893e053fcb0a2d3742e2b13b869941a3a485b2bda3a92567f84190cb1be170b67d20cc71c6a2cb92f4202140c8afd9c40a358496947d709e0c4b68d43a368754
-
C:\Users\Admin\AppData\Local\Temp\nsk861A.tmp\nsExec.dllFilesize
6KB
MD550ba20cad29399e2db9fa75a1324bd1d
SHA13850634bb15a112623222972ef554c8d1eca16f4
SHA256e7b145abc7c519e6bd91dc06b7b83d1e73735ac1ac37d30a7889840a6eed38fc
SHA512893e053fcb0a2d3742e2b13b869941a3a485b2bda3a92567f84190cb1be170b67d20cc71c6a2cb92f4202140c8afd9c40a358496947d709e0c4b68d43a368754
-
C:\Users\Admin\AppData\Local\Temp\tap-windows.exeFilesize
574KB
MD5ceaf53b33e459cd4d30db5dfca3455e1
SHA12dc03ec37fa11783f1d1965961a93237cde12f69
SHA2561782d56568092e8fba575fe7e11b2e86f04518f40a18a4ce594bd1209e0cb547
SHA512dc331bc2cca943985150b892cf9369da78c627c68b75bd883e08f2ffcfddb349ec864ff2195b9b85ade7d6474751b3e156c10d38b996441dad31e9e026adc17f
-
C:\Users\Admin\AppData\Local\Temp\tap-windows.exeFilesize
574KB
MD5ceaf53b33e459cd4d30db5dfca3455e1
SHA12dc03ec37fa11783f1d1965961a93237cde12f69
SHA2561782d56568092e8fba575fe7e11b2e86f04518f40a18a4ce594bd1209e0cb547
SHA512dc331bc2cca943985150b892cf9369da78c627c68b75bd883e08f2ffcfddb349ec864ff2195b9b85ade7d6474751b3e156c10d38b996441dad31e9e026adc17f
-
C:\Users\Admin\AppData\Local\Temp\{56F36~1\tap0901.catFilesize
10KB
MD5225e7ba0e5e2d46813e5c858a4d0d5b0
SHA15dd49014764f634164520583fd0cec87ab1a1625
SHA256b0baf5cb84fa4acb34b77a6231052061da6b8676d216833724b7a602622161fb
SHA5129c77adf7e71aca94489dfeb536f796a017b7c05771962274bae2c614e2ae6799cceb36cc58ac470184c37f52deac75988bb14e6a329f432c6d7cedbca18272a8
-
C:\Users\Admin\AppData\Local\Temp\{56F36~1\tap0901.sysFilesize
38KB
MD5059e578d456043a8c3b76ec365b375f3
SHA142189b6a1b8c736397113bfc2283f5e1e1a44e8e
SHA256a0170cf78105ce757e0549d79e4ae7c412240e8b81d262a24d76a047f181f881
SHA51299e6b6af018d0e3509d9dbe00301a7d5d6645a2070a8144acff04842f8bbaccd81e7651578d08f47639cd2b7d00eb64acddfa8725bce9a073580b7fcf7964e6a
-
C:\Users\Admin\AppData\Local\Temp\{56f364b8-0744-de49-bdc8-02fa4c1157d1}\oemvista.infFilesize
7KB
MD550d29ca2e3ddb8a696923420ec2ac4fa
SHA1d85f4e65fe10f13ded1780ddbd074edfc75f2d25
SHA256817dff7f4944a255a0a33b8d74eb60a755d8d268cc7afd46fce41e102e0a004b
SHA51203778a9cddd23639c88e24bb5d0446da3a400bb6b3321fb35887cd23d88d0f7ad3fe911642cc7f8d16d29cd9e42106851b0028379e8dbcb3c6721c238fc4a0d3
-
C:\Windows\INF\oem2.infFilesize
7KB
MD550d29ca2e3ddb8a696923420ec2ac4fa
SHA1d85f4e65fe10f13ded1780ddbd074edfc75f2d25
SHA256817dff7f4944a255a0a33b8d74eb60a755d8d268cc7afd46fce41e102e0a004b
SHA51203778a9cddd23639c88e24bb5d0446da3a400bb6b3321fb35887cd23d88d0f7ad3fe911642cc7f8d16d29cd9e42106851b0028379e8dbcb3c6721c238fc4a0d3
-
C:\Windows\System32\DriverStore\FileRepository\OEMVIS~1.INF\tap0901.sysFilesize
38KB
MD5059e578d456043a8c3b76ec365b375f3
SHA142189b6a1b8c736397113bfc2283f5e1e1a44e8e
SHA256a0170cf78105ce757e0549d79e4ae7c412240e8b81d262a24d76a047f181f881
SHA51299e6b6af018d0e3509d9dbe00301a7d5d6645a2070a8144acff04842f8bbaccd81e7651578d08f47639cd2b7d00eb64acddfa8725bce9a073580b7fcf7964e6a
-
C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_6d4bec28a2ef0cdf\oemvista.infFilesize
7KB
MD550d29ca2e3ddb8a696923420ec2ac4fa
SHA1d85f4e65fe10f13ded1780ddbd074edfc75f2d25
SHA256817dff7f4944a255a0a33b8d74eb60a755d8d268cc7afd46fce41e102e0a004b
SHA51203778a9cddd23639c88e24bb5d0446da3a400bb6b3321fb35887cd23d88d0f7ad3fe911642cc7f8d16d29cd9e42106851b0028379e8dbcb3c6721c238fc4a0d3
-
\??\c:\PROGRA~1\TAP-WI~1\driver\tap0901.sysFilesize
38KB
MD5059e578d456043a8c3b76ec365b375f3
SHA142189b6a1b8c736397113bfc2283f5e1e1a44e8e
SHA256a0170cf78105ce757e0549d79e4ae7c412240e8b81d262a24d76a047f181f881
SHA51299e6b6af018d0e3509d9dbe00301a7d5d6645a2070a8144acff04842f8bbaccd81e7651578d08f47639cd2b7d00eb64acddfa8725bce9a073580b7fcf7964e6a
-
\??\c:\program files\tap-windows\driver\tap0901.catFilesize
10KB
MD5225e7ba0e5e2d46813e5c858a4d0d5b0
SHA15dd49014764f634164520583fd0cec87ab1a1625
SHA256b0baf5cb84fa4acb34b77a6231052061da6b8676d216833724b7a602622161fb
SHA5129c77adf7e71aca94489dfeb536f796a017b7c05771962274bae2c614e2ae6799cceb36cc58ac470184c37f52deac75988bb14e6a329f432c6d7cedbca18272a8
-
memory/860-238-0x0000000000000000-mapping.dmp
-
memory/972-214-0x0000000000000000-mapping.dmp
-
memory/1128-206-0x0000000000000000-mapping.dmp
-
memory/1152-137-0x0000000000000000-mapping.dmp
-
memory/1336-228-0x0000000000000000-mapping.dmp
-
memory/1360-153-0x0000000000000000-mapping.dmp
-
memory/1444-245-0x0000000000000000-mapping.dmp
-
memory/1568-138-0x0000000000000000-mapping.dmp
-
memory/1756-223-0x0000000000000000-mapping.dmp
-
memory/2212-151-0x0000000000000000-mapping.dmp
-
memory/2352-239-0x0000000000000000-mapping.dmp
-
memory/2596-236-0x0000000000000000-mapping.dmp
-
memory/2692-152-0x0000000000000000-mapping.dmp
-
memory/3168-143-0x0000000000000000-mapping.dmp
-
memory/3168-242-0x0000000000000000-mapping.dmp
-
memory/3216-141-0x0000000000000000-mapping.dmp
-
memory/3292-146-0x0000000000000000-mapping.dmp
-
memory/3412-140-0x0000000000000000-mapping.dmp
-
memory/3468-240-0x0000000000000000-mapping.dmp
-
memory/3920-241-0x0000000000000000-mapping.dmp
-
memory/4036-234-0x0000000000000000-mapping.dmp
-
memory/4104-135-0x0000000000000000-mapping.dmp
-
memory/4184-139-0x0000000000000000-mapping.dmp
-
memory/4196-155-0x0000000000000000-mapping.dmp
-
memory/4232-154-0x0000000000000000-mapping.dmp
-
memory/4252-149-0x0000000000000000-mapping.dmp
-
memory/4256-148-0x0000000000000000-mapping.dmp
-
memory/4456-150-0x0000000000000000-mapping.dmp
-
memory/4504-243-0x0000000000000000-mapping.dmp
-
memory/4540-235-0x0000000000000000-mapping.dmp
-
memory/4644-130-0x0000000000000000-mapping.dmp
-
memory/4664-244-0x0000000000000000-mapping.dmp
-
memory/4688-218-0x0000000000000000-mapping.dmp
-
memory/4732-164-0x00000000034E0000-0x00000000034F3000-memory.dmpFilesize
76KB
-
memory/4732-156-0x0000000000000000-mapping.dmp
-
memory/4896-133-0x0000000000000000-mapping.dmp
-
memory/4984-136-0x0000000000000000-mapping.dmp
-
memory/5028-237-0x0000000000000000-mapping.dmp