Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 17:46
Static task
static1
Behavioral task
behavioral1
Sample
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe
Resource
win7-20220414-en
General
-
Target
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe
-
Size
3.7MB
-
MD5
b1960674d8dac395802c5c0b97f63889
-
SHA1
98ad4fd4bd19007ab5617324657f1a8461e21533
-
SHA256
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e
-
SHA512
eaa11f79e84063b48e5646e2cc81ec52b236933f8327e86c35662152a13fbaf7a26ae27cb720a62008cab5d3fdddee6e4c5264b52ee24b7e93afc035bf666a0c
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Executes dropped EXE 3 IoCs
Processes:
vncautoclick.exetapinstall.exetapinstall.exepid process 4244 vncautoclick.exe 1884 tapinstall.exe 3628 tapinstall.exe -
Processes:
resource yara_rule behavioral2/memory/2600-130-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/2600-133-0x0000000002350000-0x00000000033DE000-memory.dmp upx behavioral2/memory/2600-163-0x0000000002350000-0x00000000033DE000-memory.dmp upx -
Loads dropped DLL 9 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exepid process 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process File opened (read-only) \??\L: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\M: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\Q: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\U: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\Z: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\I: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\S: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\V: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\W: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\X: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\H: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\K: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\N: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\O: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\P: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\R: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\T: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\Y: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\G: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\F: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\J: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened (read-only) \??\E: 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process File opened for modification C:\autorun.inf 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Drops file in System32 directory 9 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\sslvna.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\vna0901.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4EB.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4EB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4EC.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4EC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\vna0901.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4FC.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\SETC4FC.tmp DrvInst.exe -
Drops file in Program Files directory 39 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\sslservice.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\mfc100.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\msvcr100.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\driver\sslvna.inf 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\HTCSPApi.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\SpOrder.Dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\SKFAPI.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\NonIFSLSP.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\GEC00001.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\msvcp100.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\vncautoclick.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\KeySniffer.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\sso_client.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\addtap.bat 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\driver\vna0901.sys 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\config\backgroud.bmp 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\driver\vna0901.cat 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\msvcrt.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\SSLVPNCSClient.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\sslvpn.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\deltapall.bat 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\config\default.gif 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\HTCSPApi.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\GEC00001.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\SkipCertAlert.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\sslvpncp.exe 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File created C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\GEA00001.dll 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Drops file in Windows directory 4 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exetapinstall.exesvchost.exeDrvInst.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 16 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
tapinstall.exesvchost.exetapinstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe -
Modifies data under HKEY_USERS 42 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Processes:
tapinstall.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 tapinstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81\Blob = 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 tapinstall.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81 tapinstall.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exepid process 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription pid process Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Token: SeDebugPrivilege 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
vncautoclick.exepid process 4244 vncautoclick.exe 4244 vncautoclick.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exenet.exesvchost.exeDrvInst.exedescription pid process target process PID 2600 wrote to memory of 784 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 792 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 384 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe dwm.exe PID 2600 wrote to memory of 2364 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe sihost.exe PID 2600 wrote to memory of 2376 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 2704 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe taskhostw.exe PID 2600 wrote to memory of 2652 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Explorer.EXE PID 2600 wrote to memory of 3016 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 3268 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe DllHost.exe PID 2600 wrote to memory of 3372 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe StartMenuExperienceHost.exe PID 2600 wrote to memory of 3436 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 3520 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe SearchApp.exe PID 2600 wrote to memory of 3784 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 4300 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 1952 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe backgroundTaskHost.exe PID 2600 wrote to memory of 4456 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 4620 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe net.exe PID 2600 wrote to memory of 4620 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe net.exe PID 2600 wrote to memory of 4620 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe net.exe PID 4620 wrote to memory of 1492 4620 net.exe net1.exe PID 4620 wrote to memory of 1492 4620 net.exe net1.exe PID 4620 wrote to memory of 1492 4620 net.exe net1.exe PID 2600 wrote to memory of 4244 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe vncautoclick.exe PID 2600 wrote to memory of 4244 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe vncautoclick.exe PID 2600 wrote to memory of 4244 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe vncautoclick.exe PID 2600 wrote to memory of 1884 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe tapinstall.exe PID 2600 wrote to memory of 1884 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe tapinstall.exe PID 2600 wrote to memory of 3628 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe tapinstall.exe PID 2600 wrote to memory of 3628 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe tapinstall.exe PID 4980 wrote to memory of 1264 4980 svchost.exe DrvInst.exe PID 4980 wrote to memory of 1264 4980 svchost.exe DrvInst.exe PID 1264 wrote to memory of 4796 1264 DrvInst.exe rundll32.exe PID 1264 wrote to memory of 4796 1264 DrvInst.exe rundll32.exe PID 2600 wrote to memory of 784 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 792 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 384 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe dwm.exe PID 2600 wrote to memory of 2364 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe sihost.exe PID 2600 wrote to memory of 2376 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 2704 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe taskhostw.exe PID 2600 wrote to memory of 2652 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Explorer.EXE PID 2600 wrote to memory of 3016 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 3268 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe DllHost.exe PID 2600 wrote to memory of 3372 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe StartMenuExperienceHost.exe PID 2600 wrote to memory of 3436 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 3520 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe SearchApp.exe PID 2600 wrote to memory of 3784 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 4300 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 4456 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe PID 2600 wrote to memory of 4244 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe vncautoclick.exe PID 2600 wrote to memory of 4244 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe vncautoclick.exe PID 2600 wrote to memory of 3628 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe tapinstall.exe PID 2600 wrote to memory of 3540 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Conhost.exe PID 2600 wrote to memory of 4796 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe rundll32.exe PID 2600 wrote to memory of 784 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 792 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe fontdrvhost.exe PID 2600 wrote to memory of 384 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe dwm.exe PID 2600 wrote to memory of 2364 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe sihost.exe PID 2600 wrote to memory of 2376 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 2704 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe taskhostw.exe PID 2600 wrote to memory of 2652 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe Explorer.EXE PID 2600 wrote to memory of 3016 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe svchost.exe PID 2600 wrote to memory of 3268 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe DllHost.exe PID 2600 wrote to memory of 3372 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe StartMenuExperienceHost.exe PID 2600 wrote to memory of 3436 2600 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe RuntimeBroker.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe"C:\Users\Admin\AppData\Local\Temp\78087d3040620aedcf3732eb1b994646f65fdf8135319bba4999bb7b0be2b23e.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\net.exenet stop SSLVPNService3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SSLVPNService4⤵
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\vncautoclick.exe"C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\vncautoclick.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exe"C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exe" hwids vna09013⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exe"C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exe" install "C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\driver\sslvna.inf" vna09013⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies system certificate store
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a8d94080-f6d2-9040-9e29-5188d8a2a5b3}\sslvna.inf" "9" "4aef3f52f" "0000000000000148" "WinSta0\Default" "0000000000000150" "208" "c:\program files (x86)\ssl vpn ¿í»§¶ë\driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{15dcea90-3e9b-8f4d-b33f-5947aaf228cc} Global\{4068cd11-006f-ef4f-9e93-44ed9c9cf098} C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\sslvna.inf C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\vna0901.cat3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exeFilesize
79KB
MD5c536846bd98a1f36e928b38d4dd456d6
SHA1acba4cc3ab9df6f88b89752c74774e8378cc3d54
SHA2563671fc4dac369eecddbfc79a8cb595455ac07e2fe864aa80fa789c39561edc8c
SHA512b544fa74ba3cba0fc22f7cb1c8d7019b851417ce4dcfd68aed949e4b98475f3a677e9a1605b484459055a4a98a40d8241398db58763082c06878f2046360c9fd
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exeFilesize
79KB
MD5c536846bd98a1f36e928b38d4dd456d6
SHA1acba4cc3ab9df6f88b89752c74774e8378cc3d54
SHA2563671fc4dac369eecddbfc79a8cb595455ac07e2fe864aa80fa789c39561edc8c
SHA512b544fa74ba3cba0fc22f7cb1c8d7019b851417ce4dcfd68aed949e4b98475f3a677e9a1605b484459055a4a98a40d8241398db58763082c06878f2046360c9fd
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\tapinstall.exeFilesize
79KB
MD5c536846bd98a1f36e928b38d4dd456d6
SHA1acba4cc3ab9df6f88b89752c74774e8378cc3d54
SHA2563671fc4dac369eecddbfc79a8cb595455ac07e2fe864aa80fa789c39561edc8c
SHA512b544fa74ba3cba0fc22f7cb1c8d7019b851417ce4dcfd68aed949e4b98475f3a677e9a1605b484459055a4a98a40d8241398db58763082c06878f2046360c9fd
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\vncautoclick.exeFilesize
188KB
MD538e7690b697f9abb53d0e16baf0af4b3
SHA1f0e7ccf6628dc84fcf8a758f80117cd3d3d1d8f5
SHA2569d8515a00ad4943165fc6a05ee9ea2af648aefdf76480729a207caf04d5d9f5c
SHA512a858d50eee22ebc681edd557d113eca80c5ce49783855d3be5169ba8f7094ae4a02870d8441342664ac63db9e19194020bf0443d4b5cdf03b492c834c39fb49b
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\bin\vncautoclick.exeFilesize
188KB
MD538e7690b697f9abb53d0e16baf0af4b3
SHA1f0e7ccf6628dc84fcf8a758f80117cd3d3d1d8f5
SHA2569d8515a00ad4943165fc6a05ee9ea2af648aefdf76480729a207caf04d5d9f5c
SHA512a858d50eee22ebc681edd557d113eca80c5ce49783855d3be5169ba8f7094ae4a02870d8441342664ac63db9e19194020bf0443d4b5cdf03b492c834c39fb49b
-
C:\Program Files (x86)\SSL VPN ¿Í»§¶Ë\driver\sslvna.infFilesize
4KB
MD583381d3ac8f7606e4ac91caf8aa1c8da
SHA1558e2e4206b8bf1f7b462aaf2ad594c989a917b6
SHA2564ed4780304ba4072b6aa59cba27a345903c61ae8a6069137c14f5e23975172b7
SHA512563425b6a710c4291ffd130ce2c362fa114e9700a681c42bf6cf884434834b67203ad9b2880cf3c99abe8acb9eb77d75469360a7898182b5f025eac9728e3302
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\FindProcDLL.dllFilesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\FindProcDLL.dllFilesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\System.dllFilesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\nsnA84D.tmp\nsExec.dllFilesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
C:\Users\Admin\AppData\Local\Temp\{A8D94~1\vna0901.catFilesize
17KB
MD5eac48f063056340405681a749ee5fbd9
SHA1eb3967cc993f1cd6f9160839b88de0d12aec784e
SHA2562d6f1908727ebc71bba85c3e69336113176dadd337bcbce2e2958b70610bd4c7
SHA512c8b01522eacda052e64667484640e68a888558b3290f4adeaa77c4dad1a9f991fffa5a76d960b2d6a6f2af24a620b7e2afd75cad7030798e23e934af4c3c9344
-
C:\Users\Admin\AppData\Local\Temp\{A8D94~1\vna0901.sysFilesize
45KB
MD57ab36b8fec3eaa6dc9710914a73b7af1
SHA1ff123dbbfb4bddca0d746a35e605ecb3acdd5472
SHA2561264b0359069cdcab329b5604cbc27637c5aa87c3eb9ede6f4b66d5351c9f891
SHA512c457c73a0e1b06c1bc4caf4e07168184dae9956f36abdcca54a9ae134d562de3fb011ff82ed55211ba42ffd1d86ffc898bf6ff476ae38d2c4aaba01038a64e71
-
C:\Users\Admin\AppData\Local\Temp\{a8d94080-f6d2-9040-9e29-5188d8a2a5b3}\sslvna.infFilesize
4KB
MD583381d3ac8f7606e4ac91caf8aa1c8da
SHA1558e2e4206b8bf1f7b462aaf2ad594c989a917b6
SHA2564ed4780304ba4072b6aa59cba27a345903c61ae8a6069137c14f5e23975172b7
SHA512563425b6a710c4291ffd130ce2c362fa114e9700a681c42bf6cf884434834b67203ad9b2880cf3c99abe8acb9eb77d75469360a7898182b5f025eac9728e3302
-
C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\sslvna.infFilesize
4KB
MD583381d3ac8f7606e4ac91caf8aa1c8da
SHA1558e2e4206b8bf1f7b462aaf2ad594c989a917b6
SHA2564ed4780304ba4072b6aa59cba27a345903c61ae8a6069137c14f5e23975172b7
SHA512563425b6a710c4291ffd130ce2c362fa114e9700a681c42bf6cf884434834b67203ad9b2880cf3c99abe8acb9eb77d75469360a7898182b5f025eac9728e3302
-
C:\Windows\System32\DriverStore\Temp\{748e726b-78e6-9f40-b9b1-6927c237eab1}\vna0901.catFilesize
17KB
MD5eac48f063056340405681a749ee5fbd9
SHA1eb3967cc993f1cd6f9160839b88de0d12aec784e
SHA2562d6f1908727ebc71bba85c3e69336113176dadd337bcbce2e2958b70610bd4c7
SHA512c8b01522eacda052e64667484640e68a888558b3290f4adeaa77c4dad1a9f991fffa5a76d960b2d6a6f2af24a620b7e2afd75cad7030798e23e934af4c3c9344
-
\??\c:\PROGRA~2\SSLVPN~1\driver\vna0901.sysFilesize
45KB
MD57ab36b8fec3eaa6dc9710914a73b7af1
SHA1ff123dbbfb4bddca0d746a35e605ecb3acdd5472
SHA2561264b0359069cdcab329b5604cbc27637c5aa87c3eb9ede6f4b66d5351c9f891
SHA512c457c73a0e1b06c1bc4caf4e07168184dae9956f36abdcca54a9ae134d562de3fb011ff82ed55211ba42ffd1d86ffc898bf6ff476ae38d2c4aaba01038a64e71
-
\??\c:\program files (x86)\ssl vpn ¿í»§¶ë\driver\vna0901.catFilesize
17KB
MD5eac48f063056340405681a749ee5fbd9
SHA1eb3967cc993f1cd6f9160839b88de0d12aec784e
SHA2562d6f1908727ebc71bba85c3e69336113176dadd337bcbce2e2958b70610bd4c7
SHA512c8b01522eacda052e64667484640e68a888558b3290f4adeaa77c4dad1a9f991fffa5a76d960b2d6a6f2af24a620b7e2afd75cad7030798e23e934af4c3c9344
-
memory/1264-156-0x0000000000000000-mapping.dmp
-
memory/1492-140-0x0000000000000000-mapping.dmp
-
memory/1884-145-0x0000000000000000-mapping.dmp
-
memory/2600-132-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2600-130-0x0000000002350000-0x00000000033DE000-memory.dmpFilesize
16.6MB
-
memory/2600-164-0x0000000000400000-0x0000000000441000-memory.dmpFilesize
260KB
-
memory/2600-136-0x0000000005AE0000-0x0000000005AE3000-memory.dmpFilesize
12KB
-
memory/2600-163-0x0000000002350000-0x00000000033DE000-memory.dmpFilesize
16.6MB
-
memory/2600-133-0x0000000002350000-0x00000000033DE000-memory.dmpFilesize
16.6MB
-
memory/3628-151-0x0000000000000000-mapping.dmp
-
memory/4244-141-0x0000000000000000-mapping.dmp
-
memory/4620-139-0x0000000000000000-mapping.dmp
-
memory/4796-160-0x0000000000000000-mapping.dmp