Analysis
-
max time kernel
239s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 02:22
Static task
static1
Behavioral task
behavioral1
Sample
a9fe45f68df07a631b9ffda604af62c5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9fe45f68df07a631b9ffda604af62c5.exe
Resource
win10v2004-20220901-en
General
-
Target
a9fe45f68df07a631b9ffda604af62c5.exe
-
Size
38.1MB
-
MD5
a9fe45f68df07a631b9ffda604af62c5
-
SHA1
47baf9832d6812906af41b57bea1337b03969c19
-
SHA256
4f6cb888a4dfade727490683feaee96679d7044f0181799c18a8c7060cb8dab3
-
SHA512
f6e6857788492e1cd0ce4d6da4d5c11f04efc65b7895e0da084f3cea1c2b4ec0267d04bd54885eb191ed31ebf16db02f120048201ee176a6de62dc790f56e367
-
SSDEEP
786432:WHwiu9WaDmAq9AHhIbznxWBEZ2FACXPyXXaDPgG1pvUybb2d00aHMGae:WHwvWAmAq9yhIPEBAC/yHg9YybSd00Q/
Malware Config
Signatures
-
Babadeda Crypter 1 IoCs
resource yara_rule behavioral2/memory/3868-207-0x0000000003870000-0x0000000007D70000-memory.dmp family_babadeda -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Downloads MZ/PE file
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\DRIVERS\wintun.sys rundll32.exe File opened for modification C:\Windows\System32\drivers\SET6095.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET6095.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tapprotonvpn.sys DrvInst.exe File opened for modification C:\Windows\system32\DRIVERS\SET7872.tmp rundll32.exe File created C:\Windows\system32\DRIVERS\SET7872.tmp rundll32.exe -
Executes dropped EXE 27 IoCs
pid Process 3868 Mp3tag.exe 4200 client32.exe 3028 uninstall.exe 3856 go.microsoft.com 4040 MicrosoftEdgeUpdate.exe 64 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 3952 MicrosoftEdgeUpdateComRegisterShell64.exe 1944 MicrosoftEdgeUpdateComRegisterShell64.exe 612 MicrosoftEdgeUpdateComRegisterShell64.exe 3472 MicrosoftEdgeUpdate.exe 5064 MicrosoftEdgeUpdate.exe 4972 MicrosoftEdgeUpdate.exe 4640 MicrosoftEdgeUpdate.exe 2144 MicrosoftEdge_X64_106.0.1370.52.exe 4308 setup.exe 1312 MicrosoftEdgeUpdate.exe 4908 uninstall.exe 2232 ProtonVPNTap_1.1.4.exe 1960 tapinstall.exe 1892 tapinstall.exe 3012 tapinstall.exe 3784 ProtonVPNTun_0.13.1.exe 2596 uninstall.exe 1612 MSIEDFD.tmp 3476 ProtonVPN.exe 3512 ProtonVPNService.exe -
Registers COM server for autorun 1 TTPs 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d936918b-9c4b-555e-074a-c79314be04e1}\LocalServer32 ProtonVPN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{d936918b-9c4b-555e-074a-c79314be04e1}\LocalServer32 ProtonVPN.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\CLSID\{d936918b-9c4b-555e-074a-c79314be04e1}\LocalServer32\ = "\"C:\\Program Files (x86)\\Proton Technologies\\ProtonVPN\\ProtonVPN.exe\" -ToastActivated" ProtonVPN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{d936918b-9c4b-555e-074a-c79314be04e1}\LocalServer32\ = "\"C:\\Program Files (x86)\\Proton Technologies\\ProtonVPN\\ProtonVPN.exe\" -ToastActivated" ProtonVPN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ThreadingModel = "Both" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\INPROCSERVER32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe -
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MicrosoftEdgeUpdate.exe\DisableExceptionChainValidation = "0" MicrosoftEdgeUpdate.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation uninstall.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation ProtonVPN.exe -
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NetSupport.url Mp3tag.exe -
Loads dropped DLL 64 IoCs
pid Process 544 a9fe45f68df07a631b9ffda604af62c5.exe 544 a9fe45f68df07a631b9ffda604af62c5.exe 2540 MsiExec.exe 340 MsiExec.exe 340 MsiExec.exe 340 MsiExec.exe 340 MsiExec.exe 340 MsiExec.exe 544 a9fe45f68df07a631b9ffda604af62c5.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 3868 Mp3tag.exe 4200 client32.exe 4200 client32.exe 4200 client32.exe 4200 client32.exe 4200 client32.exe 4200 client32.exe 3028 uninstall.exe 3028 uninstall.exe 3536 MsiExec.exe 3536 MsiExec.exe 4040 MicrosoftEdgeUpdate.exe 64 MicrosoftEdgeUpdate.exe 1568 MicrosoftEdgeUpdate.exe 3952 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 1944 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 612 MicrosoftEdgeUpdateComRegisterShell64.exe 1568 MicrosoftEdgeUpdate.exe 3472 MicrosoftEdgeUpdate.exe 5064 MicrosoftEdgeUpdate.exe 4972 MicrosoftEdgeUpdate.exe 4972 MicrosoftEdgeUpdate.exe 5064 MicrosoftEdgeUpdate.exe 4640 MicrosoftEdgeUpdate.exe 1312 MicrosoftEdgeUpdate.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 3052 MsiExec.exe 4908 uninstall.exe 3028 uninstall.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\{E7AD46A7-6578-45D9-A690-BF58D33BA6B5} = "\"C:\\Users\\Admin\\AppData\\Roaming\\NetSupport_v_2.31941\\uninstall.exe\" /cmdloc \"HKCU\\Software\\Proton Technologies AG AiTemp\\{E7AD46A7-6578-45D9-A690-BF58D33BA6B5}\"" uninstall.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ProtonVPN = "C:\\Program Files (x86)\\Proton Technologies\\ProtonVPN\\ProtonVPN.exe" ProtonVPN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ProtonVPN.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\O: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\L: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: uninstall.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\B: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\H: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\E: uninstall.exe File opened (read-only) \??\T: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: uninstall.exe File opened (read-only) \??\N: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\P: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\U: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\Y: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: uninstall.exe File opened (read-only) \??\U: uninstall.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: uninstall.exe File opened (read-only) \??\Y: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: uninstall.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\F: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\E: uninstall.exe File opened (read-only) \??\Z: uninstall.exe File opened (read-only) \??\G: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\N: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: uninstall.exe File opened (read-only) \??\V: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\F: uninstall.exe File opened (read-only) \??\Q: a9fe45f68df07a631b9ffda604af62c5.exe File opened (read-only) \??\M: uninstall.exe File opened (read-only) \??\A: ProtonVPNTun_0.13.1.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: ProtonVPNTap_1.1.4.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: ProtonVPNTap_1.1.4.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum Mp3tag.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Mp3tag.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\wintun.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_ba4c0fa2d195a7ca\oemvista.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET7759.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET776A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET775A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET775A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_d97096a68f999890\wintun.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C5F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_ba4c0fa2d195a7ca\tapprotonvpn.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_d97096a68f999890\wintun.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C6F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET776A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C70.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\SET7759.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\wintun.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\tapprotonvpn.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_ba4c0fa2d195a7ca\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C70.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_ba4c0fa2d195a7ca\tapprotonvpn.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_d97096a68f999890\wintun.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C5F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\oemvista.inf DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\wintun.inf_amd64_d97096a68f999890\wintun.PNF rundll32.exe File created \??\c:\windows\system32\driverstore\filerepository\wintun.inf_amd64_d97096a68f999890\wintun.PNF rundll32.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\tapprotonvpn.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{dad22171-d0b9-3842-9cb4-1165b839c08c}\SET5C6F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{881bf341-486e-9d4c-b435-9f3b88ef2686}\wintun.cat DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\MEIPreload\preloaded_data.pb setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\identity_proxy\identity_helper.Sparse.Dev.msix setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_bn.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_ru.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\mr.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\VisualElements\SmallLogoCanary.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\WidevineCdm\_platform_specific\win_x64\widevinecdm.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\Mu\Entities setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\Sigma\Staging setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\ca.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_vi.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_az.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\identity_proxy\identity_helper.Sparse.Stable.msix setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\bg.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\mt.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\Sigma\Social setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\libcrypto-1_1-x64.dll msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\id.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\EBWebView\x86\EmbeddedBrowserWebView.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\Locales\pt-BR.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\sv.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\libGLESv2.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\msvcp140.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\sr-Cyrl-BA.pak setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_uk.dll go.microsoft.com File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\Mu\Fingerprinting setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\MLModels\autofill_labeling_email.ort setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\pt-BR.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\Locales\en-US.pak setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe.config msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\MicrosoftEdgeUpdateBroker.exe go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\el.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\km.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\EBWebView\x64\EmbeddedBrowserWebView.dll setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.RestoreInternet.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.Core.dll msiexec.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Extensions\external_extensions.json setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\msedge.dll.sig setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\pwahelper.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\eventlog_provider.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\Sigma\Other setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\SetupMetrics\20221027022704831_4308.pma setup.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_fr-CA.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\elevation_service.exe setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\VisualElements\SmallLogo.png setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Polly.Contrib.WaitAndRetry.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\pt-BR\ProtonVPN.Translations.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\System.Collections.Immutable.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\System.Threading.Tasks.Extensions.dll msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_lb.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\en-GB.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\sq.pak setup.exe File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Trust Protection Lists\manifest.json setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\nn.pak setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\tapprotonvpn.Sys msiexec.exe File created C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\msedgeupdateres_ar.dll go.microsoft.com File created C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\oneauth.dll setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\Locales\mk.pak setup.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeCore\106.0.1370.52\identity_proxy\identity_helper.Sparse.Beta.msix setup.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Newtonsoft.Json.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.Translations.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeWebView\Application\106.0.1370.52\identity_proxy\identity_helper.Sparse.Beta.msix setup.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Installer\e56c48d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4E5E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEC13.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI54D9.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\inf\oem2.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSICD20.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID2C2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDEDD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE21C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC549.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI54D9.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\{E7AD46A7-6578-45D9-A690-BF58D33BA6B5}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI4C67.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI648A.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{B1EBF050-CC3E-45B0-9DE5-339C6241F3DA} msiexec.exe File opened for modification C:\Windows\Installer\MSID1D4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE643.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEDBC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC740.tmp msiexec.exe File created C:\Windows\Installer\{87BDF456-9882-44E6-8FFC-F73B83E42EAD}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI54D9.tmp-\TapInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI74AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID330.tmp msiexec.exe File opened for modification C:\Windows\Installer\{B1EBF050-CC3E-45B0-9DE5-339C6241F3DA}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSID3DE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEBF2.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEDFE.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\Installer\e56c497.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log rundll32.exe File created C:\Windows\Installer\e56c498.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIED9C.tmp msiexec.exe File opened for modification C:\Windows\Installer\e56c48d.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIC84A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6E4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7056.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI79DF.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC5D6.tmp msiexec.exe File opened for modification C:\Windows\Installer\e56c490.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4F0B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI5209.tmp msiexec.exe File created C:\Windows\inf\oem2.inf DrvInst.exe File created C:\Windows\Installer\e56c490.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI6F4B.tmp msiexec.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\{E7AD46A7-6578-45D9-A690-BF58D33BA6B5}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\{87BDF456-9882-44E6-8FFC-F73B83E42EAD}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File created C:\Windows\Installer\{B1EBF050-CC3E-45B0-9DE5-339C6241F3DA}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSID263.tmp msiexec.exe File created C:\Windows\Installer\e56c49a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIEDFD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC6B2.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{416B37B1-D3E9-45A2-9ADF-BE98133119ED} msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\e56c494.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID79D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6F0B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAE4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIED0E.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters rundll32.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\20\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\ELEVATION MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2E1DD7EF-C12D-4F8E-8AD8-CF8CC265BAD0}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}\LocalServer32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3E102DC6-1EDB-46A1-8488-61F71B35ED5F} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{EA92A799-267E-4DF5-A6ED-6A7E0684BB8A}\PROGID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ = "IBrowserHttpRequest2" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6556DFF-AB15-4DC3-A890-AB54120BEAEC}\ = "IProcessLauncher2" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Proton Technologies ProtonVPN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE} MicrosoftEdgeUpdateComRegisterShell64.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353}\LOCALSERVER32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc.1.0\ = "Microsoft Edge Update Legacy On Demand" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassMachineFallback.1.0\CLSID\ = "{FF419FF9-90BE-4D9F-B410-A789F90E5A7C}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DDD4B5D4-FD54-497C-8789-0830F29A60EE} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2603C88B-F971-4167-9DE1-871EE4A3DC84}\NumMethods\ = "4" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7B3B7A69-7D88-4847-A6BC-90E246A41F69}\NumMethods MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.OnDemandCOMClassSvc\CLSID\ = "{A6B716CB-028B-404D-B72C-50E153DD68DA}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A6B716CB-028B-404D-B72C-50E153DD68DA}\ProgID MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E45E8446-680D-4668-A46C-D13892D6B640}\InprocHandler32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine_64.dll" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\NumMethods\ = "12" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.ProcessLauncher\CLSID\ = "{08D832B9-D2FD-481F-98CF-904D00DF63CC}" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E4518371-7326-4865-87F8-D9D3F3B287A3}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7584D24A-E056-4EB1-8E7B-632F2B0ADC69}\ = "IPolicyStatusValue" MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{837E40DA-EB1B-440C-8623-0F14DF158DC0}\NumMethods\ = "24" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\050FBE1BE3CC0B54D95E33C926143FAD\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0CCB8559-9E10-4759-AEFD-51815C3677E3}\InProcServer32\ = "C:\\Program Files (x86)\\Microsoft\\EdgeUpdate\\1.3.169.31\\psmachine.dll" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{492E1C30-A1A2-4695-87C8-7A8CAD6F936F}\VersionIndependentProgID MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C06EE550-7248-488E-971E-B60C0AB3A6E4}\NumMethods\ = "43" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7E29BE61-5809-443F-9B5D-CF22156694EB} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{3A49F783-1C7D-4D35-8F63-5C1C206B9B6E}\NumMethods\ = "17" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\Proton Technologies\ProtonVPN\ProtonVPN.exe\DisplayName = "ProtonVPN" ProtonVPN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C853632E-36CA-4999-B992-EC0D408CF5AB}\ProxyStubClsid32\ = "{0CCB8559-9E10-4759-AEFD-51815C3677E3}" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{177CAE89-4AD6-42F4-A458-00EC3389E3FE}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{AB4F4A7E-977C-4E23-AD8F-626A491715DF}\NumMethods\ = "41" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D1E8B1A6-32CE-443C-8E2E-EBA90C481353} MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A5135E58-384F-4244-9A5F-30FA9259413C} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\7A64DA7E87569D546A09FB853DB36A5B\Version = "33554438" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\NumMethods\ = "5" MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{79E0C401-B7BC-4DE5-8104-71350F3A9B67}\ = "IGoogleUpdate" MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\NumMethods MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6DFFE7FE-3153-4AF1-95D8-F8FCCA97E56B}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{60355531-5BFD-45AB-942C-7912628752C7}\ProxyStubClsid32 MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2EC826CB-5478-4533-9015-7580B3B5E03A} MicrosoftEdgeUpdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B5977F34-9264-4AC3-9B31-1224827FF6E8}\VersionIndependentProgID\ = "MicrosoftEdgeUpdate.PolicyStatusMachine" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{60355531-5BFD-45AB-942C-7912628752C7} MicrosoftEdgeUpdateComRegisterShell64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreMachineClass.1\ = "Microsoft Edge Update Core Class" MicrosoftEdgeUpdate.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\654FDB7828896E44F8CF7FB3384EE2DA\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MicrosoftEdgeUpdate.CoreClass\CLSID\ = "{8F09CD6C-5964-4573-82E3-EBFF7702865B}" MicrosoftEdgeUpdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9A6B447A-35E2-4F6B-A87B-5DEEBBFDAD17}\ProxyStubClsid32 MicrosoftEdgeUpdateComRegisterShell64.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1 uninstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 uninstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 uninstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 uninstall.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 uninstall.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 632 msiexec.exe 632 msiexec.exe 3536 MsiExec.exe 3536 MsiExec.exe 4040 MicrosoftEdgeUpdate.exe 4040 MicrosoftEdgeUpdate.exe 4040 MicrosoftEdgeUpdate.exe 4040 MicrosoftEdgeUpdate.exe 4040 MicrosoftEdgeUpdate.exe 4040 MicrosoftEdgeUpdate.exe 3052 MsiExec.exe 3052 MsiExec.exe 632 msiexec.exe 632 msiexec.exe 4284 rundll32.exe 4284 rundll32.exe 4284 rundll32.exe 632 msiexec.exe 632 msiexec.exe 4672 MsiExec.exe 4672 MsiExec.exe 632 msiexec.exe 632 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 632 msiexec.exe Token: SeCreateTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeAssignPrimaryTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeLockMemoryPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeIncreaseQuotaPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeMachineAccountPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeTcbPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSecurityPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeTakeOwnershipPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeLoadDriverPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemProfilePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemtimePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeProfSingleProcessPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeIncBasePriorityPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreatePagefilePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreatePermanentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeBackupPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeRestorePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeShutdownPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeDebugPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeAuditPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemEnvironmentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeChangeNotifyPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeRemoteShutdownPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeUndockPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSyncAgentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeEnableDelegationPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeManageVolumePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeImpersonatePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreateGlobalPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreateTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeAssignPrimaryTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeLockMemoryPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeIncreaseQuotaPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeMachineAccountPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeTcbPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSecurityPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeTakeOwnershipPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeLoadDriverPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemProfilePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemtimePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeProfSingleProcessPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeIncBasePriorityPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreatePagefilePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreatePermanentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeBackupPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeRestorePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeShutdownPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeDebugPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeAuditPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSystemEnvironmentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeChangeNotifyPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeRemoteShutdownPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeUndockPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeSyncAgentPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeEnableDelegationPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeManageVolumePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeImpersonatePrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreateGlobalPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeCreateTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeAssignPrimaryTokenPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeLockMemoryPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeIncreaseQuotaPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe Token: SeMachineAccountPrivilege 544 a9fe45f68df07a631b9ffda604af62c5.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 544 a9fe45f68df07a631b9ffda604af62c5.exe 2240 msiexec.exe 2240 msiexec.exe 4200 client32.exe 3028 uninstall.exe 3028 uninstall.exe 2436 msiexec.exe 2436 msiexec.exe 3204 msiexec.exe 3204 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3868 Mp3tag.exe 3868 Mp3tag.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 2540 632 msiexec.exe 86 PID 632 wrote to memory of 2540 632 msiexec.exe 86 PID 632 wrote to memory of 2540 632 msiexec.exe 86 PID 544 wrote to memory of 2240 544 a9fe45f68df07a631b9ffda604af62c5.exe 87 PID 544 wrote to memory of 2240 544 a9fe45f68df07a631b9ffda604af62c5.exe 87 PID 544 wrote to memory of 2240 544 a9fe45f68df07a631b9ffda604af62c5.exe 87 PID 632 wrote to memory of 340 632 msiexec.exe 88 PID 632 wrote to memory of 340 632 msiexec.exe 88 PID 632 wrote to memory of 340 632 msiexec.exe 88 PID 632 wrote to memory of 3868 632 msiexec.exe 93 PID 632 wrote to memory of 3868 632 msiexec.exe 93 PID 632 wrote to memory of 3868 632 msiexec.exe 93 PID 3868 wrote to memory of 4200 3868 Mp3tag.exe 96 PID 3868 wrote to memory of 4200 3868 Mp3tag.exe 96 PID 3868 wrote to memory of 4200 3868 Mp3tag.exe 96 PID 3868 wrote to memory of 3028 3868 Mp3tag.exe 97 PID 3868 wrote to memory of 3028 3868 Mp3tag.exe 97 PID 3868 wrote to memory of 3028 3868 Mp3tag.exe 97 PID 632 wrote to memory of 3536 632 msiexec.exe 98 PID 632 wrote to memory of 3536 632 msiexec.exe 98 PID 632 wrote to memory of 3536 632 msiexec.exe 98 PID 3028 wrote to memory of 3856 3028 uninstall.exe 101 PID 3028 wrote to memory of 3856 3028 uninstall.exe 101 PID 3028 wrote to memory of 3856 3028 uninstall.exe 101 PID 3856 wrote to memory of 4040 3856 go.microsoft.com 102 PID 3856 wrote to memory of 4040 3856 go.microsoft.com 102 PID 3856 wrote to memory of 4040 3856 go.microsoft.com 102 PID 4040 wrote to memory of 64 4040 MicrosoftEdgeUpdate.exe 103 PID 4040 wrote to memory of 64 4040 MicrosoftEdgeUpdate.exe 103 PID 4040 wrote to memory of 64 4040 MicrosoftEdgeUpdate.exe 103 PID 4040 wrote to memory of 1568 4040 MicrosoftEdgeUpdate.exe 104 PID 4040 wrote to memory of 1568 4040 MicrosoftEdgeUpdate.exe 104 PID 4040 wrote to memory of 1568 4040 MicrosoftEdgeUpdate.exe 104 PID 1568 wrote to memory of 3952 1568 MicrosoftEdgeUpdate.exe 105 PID 1568 wrote to memory of 3952 1568 MicrosoftEdgeUpdate.exe 105 PID 1568 wrote to memory of 1944 1568 MicrosoftEdgeUpdate.exe 106 PID 1568 wrote to memory of 1944 1568 MicrosoftEdgeUpdate.exe 106 PID 1568 wrote to memory of 612 1568 MicrosoftEdgeUpdate.exe 107 PID 1568 wrote to memory of 612 1568 MicrosoftEdgeUpdate.exe 107 PID 4040 wrote to memory of 3472 4040 MicrosoftEdgeUpdate.exe 108 PID 4040 wrote to memory of 3472 4040 MicrosoftEdgeUpdate.exe 108 PID 4040 wrote to memory of 3472 4040 MicrosoftEdgeUpdate.exe 108 PID 4040 wrote to memory of 5064 4040 MicrosoftEdgeUpdate.exe 109 PID 4040 wrote to memory of 5064 4040 MicrosoftEdgeUpdate.exe 109 PID 4040 wrote to memory of 5064 4040 MicrosoftEdgeUpdate.exe 109 PID 4972 wrote to memory of 4640 4972 MicrosoftEdgeUpdate.exe 111 PID 4972 wrote to memory of 4640 4972 MicrosoftEdgeUpdate.exe 111 PID 4972 wrote to memory of 4640 4972 MicrosoftEdgeUpdate.exe 111 PID 4972 wrote to memory of 2144 4972 MicrosoftEdgeUpdate.exe 113 PID 4972 wrote to memory of 2144 4972 MicrosoftEdgeUpdate.exe 113 PID 2144 wrote to memory of 4308 2144 MicrosoftEdge_X64_106.0.1370.52.exe 114 PID 2144 wrote to memory of 4308 2144 MicrosoftEdge_X64_106.0.1370.52.exe 114 PID 4972 wrote to memory of 1312 4972 MicrosoftEdgeUpdate.exe 115 PID 4972 wrote to memory of 1312 4972 MicrosoftEdgeUpdate.exe 115 PID 4972 wrote to memory of 1312 4972 MicrosoftEdgeUpdate.exe 115 PID 632 wrote to memory of 3052 632 msiexec.exe 116 PID 632 wrote to memory of 3052 632 msiexec.exe 116 PID 632 wrote to memory of 3052 632 msiexec.exe 116 PID 3052 wrote to memory of 4908 3052 MsiExec.exe 117 PID 3052 wrote to memory of 4908 3052 MsiExec.exe 117 PID 3052 wrote to memory of 4908 3052 MsiExec.exe 117 PID 3028 wrote to memory of 2232 3028 uninstall.exe 118 PID 3028 wrote to memory of 2232 3028 uninstall.exe 118 PID 3028 wrote to memory of 2232 3028 uninstall.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fe45f68df07a631b9ffda604af62c5.exe"C:\Users\Admin\AppData\Local\Temp\a9fe45f68df07a631b9ffda604af62c5.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH-Setup.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\a9fe45f68df07a631b9ffda604af62c5.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1666596928 " AI_EUIMSI=""2⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2240
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31B5C283BEF0890EE77EA4AEBB4AD15B C2⤵
- Loads dropped DLL
PID:2540
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2C199A6E5E400133FA7F42242C07AFA82⤵
- Loads dropped DLL
PID:340
-
-
C:\Users\Admin\AppData\Local\GMDH Streamline Manager\GMDH Streamline Manager\Mp3tag.exe"C:\Users\Admin\AppData\Local\GMDH Streamline Manager\GMDH Streamline Manager\Mp3tag.exe"2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\client32.exe"C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\client32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:4200
-
-
C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe"C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\WebView2 Runtime\go.microsoft.com"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\WebView2 Runtime\go.microsoft.com" /silent /install4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EUC4C7.tmp\MicrosoftEdgeUpdate.exe" /silent /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"5⤵
- Executes dropped EXE
- Sets file execution options in registry
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:64
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver6⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:3952
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:1944
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.169.31\MicrosoftEdgeUpdateComRegisterShell64.exe"7⤵
- Executes dropped EXE
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:612
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjkuMzEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjkuMzEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjE0MTYzOTgtNTNDRS00QTQ0LTgwRTktM0NBOUI1NEVDRDc2fSIgdXNlcmlkPSJ7RkFBMzIwMjQtOTUwRS00RUE0LUJFNzQtRkFBQUYzNzM2RDJDfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntGNjU5MDk3NC0zQkIzLTRCRTctOTJFNy0yNzk0MDI5MUM5RTZ9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O200Nks1SzV6MXZ2a05MSHI0YzF4L2hDamU3WlFMZHFLeVo1TndnelYzQTg9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNjcuMjEiIG5leHR2ZXJzaW9uPSIxLjMuMTY5LjMxIiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTA5MzE3MjYxIiBpbnN0YWxsX3RpbWVfbXM9IjEwNTUiLz48L2FwcD48L3JlcXVlc3Q-6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3472
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{F1416398-53CE-4A44-80E9-3CA9B54ECD76}" /silent6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap_1.1.4.exe"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap_1.1.4.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2232 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{87BDF456-9882-44E6-8FFC-F73B83E42EAD}\3E42EAD\ProtonVPNTap_1.1.4.msi AI_SETUPEXEPATH="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap_1.1.4.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1666596928 " AI_EUIMSI=""5⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:2436
-
-
-
C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTun\ProtonVPNTun_0.13.1.exe"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTun\ProtonVPNTun_0.13.1.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:3784 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{B1EBF050-CC3E-45B0-9DE5-339C6241F3DA}\241F3DA\ProtonVPNTun_0.13.1.msi AI_SETUPEXEPATH="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTun\ProtonVPNTun_0.13.1.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTun\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1666596928 " AI_EUIMSI=""5⤵
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
PID:3204
-
-
-
C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe"C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe" /i C:\Users\Admin\AppData\Local\Temp\{E7AD46A7-6578-45D9-A690-BF58D33BA6B5}\33BA6B5\ProtonVPN_win_v2.0.6.msi AI_EUIMSI=1 APPDIR="C:\Program Files (x86)\Proton Technologies\ProtonVPN" SECONDSEQUENCE="1" CLIENTPROCESSID="3028" AI_MORE_CMD_LINE=14⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies system certificate store
PID:2596
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 75FADBB788C23F6B5955FA70261A3D8E C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A063AA9540DC2530330B4085C6B24D2B C2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe"C:\Users\Admin\AppData\Roaming\NetSupport_v_2.31941\uninstall.exe" /groupsextract:100;101; /out:"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites" /callbackid:30523⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9B235BA068AC827D7DBB5547474A4975 C2⤵PID:5096
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AED243530036EC1AF2FD0FE7F10595AA2⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI54D9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240735453 299 TapInstaller!TapInstaller.CustomActions.InstallTapAdapter3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4284 -
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" hwids tapprotonvpn4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1960
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" install OemVista.inf tapprotonvpn4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1892
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" status tapprotonvpn4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3012
-
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C2AE815C738749888AC5B642401CD1C8 C2⤵PID:2220
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 40613D8292491458404715277924ECFA2⤵PID:2784
-
C:\Windows\system32\rundll32.exerundll32 "C:\Windows\Temp\4d58fe013e0c258dd53b9572b158da2f6772f9b5b496523da4968ff4b42e333a\wintun.dll",CreateAdapter "ProtonVPN" "ProtonVPN TUN" "{AFDEECBA-DFBA-CAFF-5044-013412BCEACD}"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2496
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5028
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding FE37660471F566C061F022EA8442033B2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 584A89FD42BEC52FF49409CB545AEE17 E Global\MSI00002⤵PID:4528
-
-
C:\Windows\Installer\MSIEDFD.tmp"C:\Windows\Installer\MSIEDFD.tmp" /EnforcedRunAsAdmin /DontWait /dir "C:\Program Files (x86)\Proton Technologies\ProtonVPN\" "C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe" /lang "en-US"2⤵
- Executes dropped EXE
PID:1612
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjkuMzEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjkuMzEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjE0MTYzOTgtNTNDRS00QTQ0LTgwRTktM0NBOUI1NEVDRDc2fSIgdXNlcmlkPSJ7RkFBMzIwMjQtOTUwRS00RUE0LUJFNzQtRkFBQUYzNzM2RDJDfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9InsyNkZBODk3MC1GNjUxLTQ3NzktOTVBRC1FRTdGNTZFREQ0MEF9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O3FXSlN6V3dQZmRjTFIrWEdJdjZ4clpmaVlPeGhQVTJzMU5XbWpXY2FGUGc9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249Ijg5LjAuNDM4OS4xMTQiIG5leHR2ZXJzaW9uPSI4OS4wLjQzODkuMTE0IiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMyIgc3lzdGVtX3VwdGltZV90aWNrcz0iNDkxNzc5NzQ2MiIvPjwvYXBwPjwvcmVxdWVzdD42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4640
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E5449C37-D0DF-412B-9F72-ACB7A8B69143}\MicrosoftEdge_X64_106.0.1370.52.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E5449C37-D0DF-412B-9F72-ACB7A8B69143}\MicrosoftEdge_X64_106.0.1370.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E5449C37-D0DF-412B-9F72-ACB7A8B69143}\EDGEMITMP_3265E.tmp\setup.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E5449C37-D0DF-412B-9F72-ACB7A8B69143}\EDGEMITMP_3265E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{E5449C37-D0DF-412B-9F72-ACB7A8B69143}\MicrosoftEdge_X64_106.0.1370.52.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
PID:4308
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xNjkuMzEiIHNoZWxsX3ZlcnNpb249IjEuMy4xNjkuMzEiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RjE0MTYzOTgtNTNDRS00QTQ0LTgwRTktM0NBOUI1NEVDRDc2fSIgdXNlcmlkPSJ7RkFBMzIwMjQtOTUwRS00RUE0LUJFNzQtRkFBQUYzNzM2RDJDfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9Ins3NjUxMjAxQi02NTRFLTQ5NTctQTkwRS05QjE1OUVENDUxQUR9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iREFEWSIgcHJvZHVjdF9uYW1lPSJTdGFuZGFyZCBQQyAoUTM1ICsgSUNIOSwgMjAwOSkiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NjA4IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NTExNjM3NjExIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iMTAwMSIgZG93bmxvYWRfdGltZV9tcz0iMjk2MzIiIGRvd25sb2FkZWQ9IjEzMzkyMjczNiIgdG90YWw9IjEzMzkyMjczNiIgcGFja2FnZV9jYWNoZV9yZXN1bHQ9IjAiIGluc3RhbGxfdGltZV9tcz0iMjU3MjUiLz48L2FwcD48L3JlcXVlc3Q-2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1944 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{5a367ae8-9bfc-9b4e-9e93-096b8f220d5f}\oemvista.inf" "9" "4334ff507" "0000000000000138" "WinSta0\Default" "0000000000000154" "208" "c:\program files (x86)\proton technologies\protonvpntap\windows10\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3608
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem2.inf" "oem2.inf:3beb73aff103cc24:tapprotonvpn.ndi:9.24.6.601:tapprotonvpn," "4334ff507" "0000000000000138"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:5012
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{ec07c28d-8bbe-8545-b65c-7b997c614577}\wintun.inf" "9" "42fcd255b" "0000000000000160" "WinSta0\Default" "00000000000000BC" "208" "C:\Windows\Temp\f614552359dafc7792c3d9e0883498ae3518e484a29ac5830bf093fe24504ef4"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4204
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4316
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe" /lang "en-US"1⤵
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Modifies registry class
PID:3476
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"1⤵
- Executes dropped EXE
PID:3512
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\LIBPQ.dll
Filesize247KB
MD52c78fd25db6f58f66a5a8b4279edac58
SHA1d8efb224382bd4a533891cd30a94479b103870be
SHA256be7ca5471f4bd0a21158fd0f31b5662ef0dbaa7e18d843f672a3e20d30ad42f4
SHA5125475bc9e853248baaf8f71a440d26986f774469ee7281fdbb55ecb69a4e50bc1541be6352f6e1f0fb567ad5e52a95c29c10cb3eb81d227b195170ce64bce6c23
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\Mp3tag.exe
Filesize8.6MB
MD592c1655770e49b1dc19359ea1f02e780
SHA116b459328f086dd988bfb2b45288d32652400301
SHA256bf9a506f8c9409fe9609c9590477fdb5cbd185c7b76344260a2494ec064feb28
SHA512b5e7d6eb435411449402840161d47ec17a6d7f24853e3536d0619dfec5b5fead9de9336560a434735c343e2d96f22d97b9be6c5a52e708c97ced6999808946f6
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\Mp3tagSetup.ini
Filesize68B
MD5193d596a9dfae1b99ec2d39a872f05b7
SHA17b8c32ce86f2aeb49aaad38f47f5c9864aab2eb8
SHA25659d189b0d6b992eee46798b1bd6b8cd062114e0ab94f3ea05f85ab72b3e3f67b
SHA512dd4f5f498261dd292db920342bc77d374d2f171b169483f15294b0229e4211dafbf4e56347c9e0cd66376df921c624c252f57d252881d71037a1386c711ae56c
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\Mp3tagUninstall.exe
Filesize175KB
MD54871a9fe3e0e70600fd13a57fc8c3698
SHA135d16ea83fbfe6723656585476b3c89961250d1b
SHA2567414ca5e3ef2096a2cb513ab4928f48bdb52eb5dbf386d70a4697aa5bcf18312
SHA5121caf65fef5012eedaaffd29f2d8a8b20120ac3e9eeb1a26ab6394bebfee763d5779c27db173e27e9afb80941e96b943018b4d3138152fb8fd7ff11102cde62f8
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-file-l1-2-0.dll
Filesize11KB
MD586279521328398e87699d248628eb13a
SHA1e4d4c39bda90635f1f5c2fc58b1304e2daac9caf
SHA2563c9b67616fd0ceb3dd92e605918b08556683ebab5537aa76dff300fbd54b0337
SHA5122cc328955611ad8369ff9facf9c1aabe99a20c3ded2977ad86c69e0f54acd78fa6f572ed688625c8c63016826a10b3578e3c186ef2b39c4bf393ab5e399913a6
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-file-l2-1-0.dll
Filesize11KB
MD5422adad24e8da100f85bf3de86b5f302
SHA17004b3ed8663b5890cd25e1a7899a766be912728
SHA256e04642684dc7376839c570bc11e9b46cae14420f1a85f7562fd2c4d656a22956
SHA512e689ecb1a1cb1e7735cb6a961fd054d87bcad01acf76950b14a3bf4e08ddb7a8d31805c203374ee081a4ec13c40b25b3dc83b3895b9bfbd9c135673e98e6ee63
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-handle-l1-1-0.dll
Filesize11KB
MD5c8d52cde743f4559e6eda1472ad44277
SHA109a19c5c5bc45dbf5391d882015b47cdad4b5631
SHA256d2926dcb85ab577be75ecab1fc8dcd062318f147e0a9262a3b807bb5acb62beb
SHA5123a031f282303cf664c6ab04c1561598595ef776799005d8ac7ae091ffd140e4d1d1e23b9f6783618c2bae4dc4d1cf741fdb3f83390d6854de97d85af4c940b23
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-heap-l1-1-0.dll
Filesize11KB
MD56e306654a55454e40889407e9334da0c
SHA10612894d9fbd8f92299541535f78db05fba3a78e
SHA256eb02fc995bb92b214dd684e24c1060735f61ad4884ccb4aafa86c7c1de66d621
SHA512f5a6980824cbfa82c47b20581658eb9fa8eeb2dbcf6bf9b148fe09099a3b131c2a4cc2a129135e708fb72f1cc43f083f93fc85a0e03209b75dfcc09106b977ac
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-interlocked-l1-1-0.dll
Filesize11KB
MD58dcf3111501ed0a01855ebb328537bf7
SHA12134bca1fa16133632a1b3f28fc38edc15e933ac
SHA25676f092341fbef40d5f35f70bab55f2eeb3e70a9b60f46043b342ceab7f79cef1
SHA5124cb596ca11b4941571f3b998c98707bdf45ad608c9f661e0f0ae528fdb797190c9bb22e58ff65a98e52e3e51396f4c8b22229eefe54f0a73eb49c79d07ce1604
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-libraryloader-l1-1-0.dll
Filesize11KB
MD5b0537a9eccc0f909c0715fc93b473d8d
SHA179e9929c83f5f73314c52f26be4147a74aa80e23
SHA2568784c4912a2f391d5f0c79b38f48baf88e98bf4fa61614ccb9232d9bd1e4ad54
SHA512d68e50361566e8800afb5fae32c65c90d2ac7877f9a02f3e2e6af61ccd8f99b484c808a9ba62ec9e4727481798b3d3f4f74d19b16c6ed80536cf89351071bab6
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-localization-l1-2-0.dll
Filesize13KB
MD5602a35b140d9d68d7b3e488896158365
SHA1f1ba615abb54ff786ddbc74dffffd56394bfc892
SHA25643b98f74476c86107c8317749f54a107e2955696e4f79d3d02683dd7034d1d52
SHA5124388947f90838cae8b5f8137c9ed2a099028b4341da8c574d536c6ad096bad0e217e105f0367750c70e3d3ca4857255b674955c71ecff0fda9c47a4b1951b8b6
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-memory-l1-1-0.dll
Filesize11KB
MD598b1e6d052cee5ccbb7e5af795b9f48c
SHA1357ef3f8011d7e7f1d4cb30beae58d24d6b05085
SHA2565c950723ff3118801884df67b6a14543978263a2d2a0437d8c8b2fe8ef3925d4
SHA51231d961ada87eedfc4c1bb8938b0c4b44842153f4450f48a0c1dc12208f5c1ba62b076ef91a0dbd1c3f98d1e96517904b95e072002c50d2873c8638ddb25417d7
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-namedpipe-l1-1-0.dll
Filesize11KB
MD5a8f889870885c5784afd47f5e3d33eed
SHA1494b86c51c8908d17e563c80da0d42350aaf1155
SHA2568979fe86afe23035caedd5df135786da2b28c095b69ce0179b6484fd680c9b91
SHA512bb18675a9b311e4c34806ec834886659a95207a4ec9b48b082f5fa0e05f016b9f946db29c7aa20662b4090c7f42a606f9f3a5df48d7ed20c5b404ccf91a1b7eb
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-processenvironment-l1-1-0.dll
Filesize12KB
MD556813b784a1f8cdabedcc10de6e84864
SHA1b636ba140e1ba7de5e59932702e7b4e53025d651
SHA25698ee724aa3f5a8ec4f3f8596be5aba5cd19b556f88ef9fbaff1569051a4d0dc1
SHA512f11739be9ff624044035678cf39b91d28a53f1ac56342baf985a4328da4c64c81107d7e1787ee50efb382472e4d46bb21c520918b8831edc7f6b3db70befa068
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-processthreads-l1-1-0.dll
Filesize13KB
MD52557484c75d4507688b68a64882e0022
SHA1ff78c6d44f7474d98402f8e17cfce5d712c41b95
SHA25650b3e4ffee430c1b45f0ca75959936608f756ae5eb0352e8f3f5f69c5adfaa20
SHA512e1c502e889664a46acaf0d8cab5d5082f46ad3f6f1a24ec702ec5174d077fff51cce7f80b13c5c22704937ce380ec3b14c088955d94eef1050d293c078869870
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-processthreads-l1-1-1.dll
Filesize11KB
MD5a07afa26ab56a8d3b8b16591a1962005
SHA12b6f3143487f747911ee20f039f1ffb1381858ac
SHA2566be230837149dc2a8c7772142a674c3f90930a55da7f91d791942d8276d5440b
SHA512b77b277d10cf6b8d209679684ead55b4347caef3213acdccdee35b5d4fe0e3fc136daf057830512c5473c4653a8d66357927c4b7d204c07d7508f792299d7fe9
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-profile-l1-1-0.dll
Filesize10KB
MD5258caf72fd7c60586b4bacfee6b37872
SHA14a473ff7cdf254336cf2ff3ddeb03bd047b35af5
SHA25604c0a5392a18a7555635cde23f9111ea4da550c309827b725a74bb6fd4f0cc64
SHA512121a366f79ca1c9212d109d1f72a53b31f0bf0394b947949e2a0191629ace8ed107118e512bc8f4e9b43a84b6c936422372be2ff497f2cf13276217b15d079c5
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-rtlsupport-l1-1-0.dll
Filesize10KB
MD5cec2f0ac232cd07d217299386118692b
SHA17cd8218afc5ccf528bb2807168e11e5820c8bddd
SHA256a5f4f23b01cac69058b7ec0e30b470f90bfc6d40de20e618c3045bf06e4a2cfd
SHA512e06fc36de71caec6732d2553b5afcd6daf0b8eb4f1aea7d6f6c2ae00b3e3f4172c932458ebb6644e41dd26a48b66dbe935a40bcee68aa7cad4af155befe7019f
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-string-l1-1-0.dll
Filesize11KB
MD501cbaa0aafba1275cc23c29f139d399e
SHA15ca1434545c02c3f34bc9facf9b2eecc89ec3a24
SHA256dcb3fc36c43a402b4b35644f1e7f6d6db31ef8d0a731c3b882e2cf3201a6714c
SHA512f5a3d05690bf409d2b8d7eb96ac4fde1e2d27add79945d6d9f2482ee61c6698ee0e167e9677a61a435d99175979e8651f34b92a6d057236254a0a2ba1a9cc79f
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-synch-l1-1-0.dll
Filesize13KB
MD5efbbbcef1514840d5ad9d8c084a0147e
SHA1d046a440556ff7b9857963d86dd050ccd6b0533c
SHA2569c1d190c85b9ccfb171d3db4ec363c97a3452bb365dd75dbda5ec9cad1a5d803
SHA512fe78850b3acaa725f4a3f65fccc3c2644ef43eebe3c0083c0d4e9e967cfb230d966dee87dcd8a27f4dc452d7e72ea7efb24ab7b9dbcd58ab81f78d0d110829bc
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-synch-l1-2-0.dll
Filesize11KB
MD5ed215daa7493bf93c5eadef178a261e0
SHA1b20c8dc7ba00f98a326f5f4fd55329b72f8e5699
SHA2568b7c8fc657e0dab0f2506001ca4bb76e675ffd18a2b4d9c1e03b876e008a7a26
SHA5123ed052eada11c3dc44f81f330bd2a2526170515bc6a90281872a93ee49f9add8c9ad36b9a9e9185e251d664c1694d06625e0148e113addc32e53d705d2655f03
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-sysinfo-l1-1-0.dll
Filesize12KB
MD5aed0b2511a396bb258a7bc7bb646b951
SHA1151b08d20538990b894afef34de451708b5f334e
SHA256fb7ffa16bfdf7392535b8e78a86db89ed9032f67a16b127a105582fab118cf2b
SHA512dd7cdb5f401dce1566e331a3184ebd2c71f6d2dc4eb59f384bfb2daea8ce8a146d7449d989da2193abf30cd568e67bc932e28c8b93c7d6beceac0c7cb9ae1f5c
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-timezone-l1-1-0.dll
Filesize11KB
MD5a9c7db516186c8e367fed757e238c61a
SHA11318d6496e7146e773aca85be6d0e9b87a09e284
SHA256ded52bac23633a03341969c5b98b0d94d24fa3284c1ddd0c489e453b39cec659
SHA5126aad003287afe86abccf34f6b15338c0c7380f4837805d919064a26380d2f3f7698515f927c148e618c12f0943d3621184bebc70a8b07eed64ad88689fbcc5cb
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-core-util-l1-1-0.dll
Filesize11KB
MD57294cef433dd8afa73982ea96dbd6f6a
SHA1c73b123197e6ad47b13febeafa912fdad566c8ee
SHA25621c57c8ae9407cedb50bcebf7f844a5933d274676f3194a87997672c7177cadb
SHA51224048bd06f0a3ce593eadab4fee4e26aa339faba52ae52dd36f0c66ee5d7c166f68fff8ff5dbfffde26588351ca4b6de033528dd4b0a15b0afe3ddcaf13b8661
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-conio-l1-1-0.dll
Filesize12KB
MD56e044455d104db0a31983ba722394d00
SHA1aec808b8c70326506b7a07241b6aac817ca8bfa6
SHA2567b5d400a141f363f553f61fa11e94a6851d1eeb510cb7988012862ed13208c97
SHA512eb092e48f9bc4edac67ba5cc11199ad06f313a37df1b29053e105843519a59ada48915a5448d74d464cd1b05e0750c0f4339e6aed6390b31acbeff2d84f9b166
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-convert-l1-1-0.dll
Filesize15KB
MD5c6385b316bb04ca36d76b077eeb9a61e
SHA1fc376f68798fecd41fb1c936eed1bce3f2ee6bef
SHA256060636cfc58587b4344a6d0ff4f44dd77266f2bbdb877cb50cb1b44a7e3969bc
SHA512bddf0f34bedb17ecf1d270a0613f27d174ae04f920192d7d1af6c15245175318b29691e748c36e2ce0a3027495b2f5a0bb688ae16095fad9dcd8c283b6d1b1d4
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-environment-l1-1-0.dll
Filesize11KB
MD5311e582d5d3d8421e883c4a8248eacc8
SHA1c99e61d1446fce0f883a2aad261af22d77953a59
SHA256369cc4d3bb05f4160a0bc9683feb1df2e94d02f061e4b23d53c3a6e2230cd5e4
SHA512050ed1310e667e6bb22bb7952794745df1eee0c78f18240cc2217e748a11213d094b48153964c3da0ad8141da1709ece637315633396c77c035bb0565fa981b4
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-filesystem-l1-1-0.dll
Filesize13KB
MD510731d3320c12abb62d3866d7e728cce
SHA1df4e131c825d1ca5cd14e00e5c04785d6ca508f7
SHA2569f3eb90963916194f167e98e049707b14fa84a3f11cb8cc7b940d95956601700
SHA5127eeef98682872fd95a38a03435546349c8488607e59870086b486b807e8b53893603175d9ad0f3b80c1924381daca8d14868a6079988a944b005783b4e2e358e
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-heap-l1-1-0.dll
Filesize12KB
MD5cf5f256e8cd76ba85e6c3047f078814a
SHA1b7cde77313ceaae76a46c1111b33b3d8f47c4214
SHA2569382fc8d5cbcc23c5d05e6f48f4188af3f96efbbdc5a7ec05b37e252440ecfc1
SHA512856eff4fff1d11a725af9c3e5ceac6d02a89297a16e97edec171839aa12c468fc37d60ec5df06d507cee695f71b7fbd4bc0ba51b7934d886e66a43b249e62da5
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-locale-l1-1-0.dll
Filesize11KB
MD560ffdc3ef20b127e3fd14a0719328c34
SHA1b510833350328f79a79fa464ea9d5e9455643659
SHA25643c9ea4ddecf2f34852559cf0b40b5261e6701d3743ab219f48d43a312707ad9
SHA512caef6ee08c9f6fabecef1f0be37ab34e2d4dc22f15a775b2f0dcacda1f0fcdf2259399e6fbab85f0f00e8e4b03d77fe88b85b901a9ba2f775a50f2da724da26e
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-math-l1-1-0.dll
Filesize21KB
MD578dfcb76dc8b42411dbc682f78f5c6eb
SHA1e50f6719fee44c70518cf8442737a688b5f45e62
SHA2568673dd898f899de831fc3052c8b8254b7b85ee7f2b9b6c422736668689c9b14f
SHA512968bb3bc952f4057f74c9c8825fcc2db34b9c56166ee39db3bab3d4ecf51fb65af250a8a65340274a1a0c0eed73b6c8962df5d2fce586c1ef4e19706edd5e6e1
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-multibyte-l1-1-0.dll
Filesize19KB
MD5a11597ab7e11d673c8f0b9082f16abb6
SHA109efc61cea01812db305cfa8b8ff95b4acad3b1d
SHA256e2c9693500cc7ce5cba81f81a68abf2ca783e187cfbaa9b52dd6c157c940a854
SHA5123fd3b0ebed8e97bf4c6dfa4ff2ce3c9b5e82905c2d8d674da64f4e3a9b0362c8b35f10895445d34b008b00c77b7d5ea079416d34b10ccce99fe6c7da6d17d72c
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-private-l1-1-0.dll
Filesize64KB
MD58f2b23d0d913fca49fb5b9a715a73519
SHA16adde370204c8fde3979f707fa6306f831dea8ec
SHA256722edc4fcf0cedc233f56227848b25318e2c211d5b3a4944fc294551f80d2652
SHA512bc8e7b572fbb9a5cc5110617b1bb525fb41f0f435dfff7a332571785d50dfd43449fbacdd3c2ffe64539a26fbd33147f1b219f167b55eb7825249eb3237188da
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-process-l1-1-0.dll
Filesize12KB
MD548e6bb6df76fc8f009b066f588b13c1f
SHA11db7352875992737effbc487252ccfa09ac3dc53
SHA256253caf243f9fd21f45c052384ed08f4c10ed0da0dc3ac55aa1c9e4249e1103d9
SHA5120c4ad3cfd90515c27efdb7e9fac2082e5a33a006f38c5be526e7a85d3046b28424c10d59ad88bda72ec07445231dffda47326de2451df65a2cddec791bf83623
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-runtime-l1-1-0.dll
Filesize15KB
MD58bd7a27e6ca969d3eb46086d411ce05d
SHA13bbf6f55853b1487debca58d7cb5c877d0abd517
SHA2568edc95578b8c9ca93a65907e428fa2b57fef8370b902912689332bc61094904c
SHA512fee8359398efe6a995a214d4e47de43aba12d33bb9cb1de18659d332d94ef83a4a77618b6caa9f455b0c6da4c10ab459209d483b9e778d9b522771ca692ca454
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-stdio-l1-1-0.dll
Filesize17KB
MD5f681a45c47ebb2c56c1465677ec33ff3
SHA106bf7798c51325cf1806e14dea56ff98b05b7846
SHA2563a03d727d291be57057587227273af410eda935438d8a0a165ec63ae772809af
SHA512eeb05f1af7e1c714c658e9aa06e8c6dbeeb5f2e8dcf3fdb7b9b408018e41402d83893472114e0cf6d3a9a3bf54ec45c4f7a4840a09570d190277aa3514681ab8
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-string-l1-1-0.dll
Filesize17KB
MD500446e48d60abf044acc72b46d5c3afb
SHA10ccc0c5034ac063e1d4af851b0de1f4ea99aff97
SHA25682d26998b4b3c26dbc1c1fff9d6106109a081205081d3c0669e59d20d918bc5a
SHA51269114f0efb3c853bffb55c15e5ad1b7919057a676056d57634a6a39916e232cde2dcdc49ea0f9751ddea6550ffa58f84b1f8918b3c9fd7e88c8b8f7eb4afeaf2
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-time-l1-1-0.dll
Filesize13KB
MD5376b4a7a02f20ed3aede05039ec3daf0
SHA1c9149b37f85cfc724bedc0ecd543d95280055de1
SHA256b0b8fc7de3641c3f23d30a4792c8584db33db6133ee29135c70bb504e80e4a2c
SHA512ff7fba7cd8c9b55c1c87104d7d9074ef0eed524b02480ecf2c80e5cd489c568e1ed63bc62699a03272cab3dcbf20e6437e1f47ce112bcb3336d27ed2790430c5
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\api-ms-win-crt-utility-l1-1-0.dll
Filesize11KB
MD56376bf5bac3f0208f0a5d11415ccd444
SHA1c3fe96e51c3f3e622dcedd2ddf8d23f9442361b8
SHA256e36763df57cd26ec2b4d52e27de51a4ca6f18caf86cbac8307bf4817705f9a0e
SHA5129614e423c850bdb584f18555825214d42106966b1ee71e75ba7407591aa5de407b43909ce972e1923df82e9a0e953597fe19646296962194ebeb1579493d91c2
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\cpuid.dll
Filesize65KB
MD566cc9189d93b34fbc90d199c9b90f9d7
SHA1bc7128ce3af3ec90b695feb63976f90e6c94010e
SHA256bcfaf8b17923b18091b47dae3db34967ff773c970cb116e00782acf5bb1b33ec
SHA51217b70865c7c17beefd77da2acbaf16f45537f6b74dd0881858444cc868eb47cb6390e48ae650de00828a392a78f1a2547d5c189e49460ba749586b6e58161b9d
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\gdiplus.dll
Filesize1.6MB
MD54d328694bb516e46d2d184950d94433f
SHA19b31771a8c201b74c846da1f1a254866dc2f912d
SHA2568199452af9e5289c126d0ff9d99f2302c52861ec49008702b7f95d64d316383c
SHA512dadf21cb702e309ba0f271e13a9c3e9d4bdb5cdd79699d331242c988c591716c265c11fb5a35a8b0d5892861d1c6d519ace228f2d4fcf0d3e604e33be4fa7cd2
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\jpegacc.dll
Filesize101KB
MD510561ddeebed28a3ad75ef436165d802
SHA18366a8f26dce385215ee73f0c6b7771d7292fc40
SHA2562aa43154f35acdcde7296daf38607a84961ddd9a4754054ea69b1d49be640d98
SHA512a90bfc2c91288592594648e39e2f4f8eebd1fdfce1c708e795582e865741b3ea065ed745cb9a33413d022925ef697ce03f576ec75b180f10c46f80e8902f4027
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\libcrypto-3.dll
Filesize2.7MB
MD56c60acb6b6d3f4532ab36188eb78f376
SHA1825900023ccd8e9293a1f3269ea82a3a20404fe6
SHA25677e9a6177a7ce319567273897f43c265fdadd8af1e8410adc686cd0079588d03
SHA512791c1446dcfd28484a68d568dc4c2fe4d6f897eab395add656a2eb0db9eefdb3949292d328351c9bfa57224f3aa9ff798fff49e270f534b5c71e3e2dfa87362a
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\libogg.dll
Filesize17KB
MD5b05f5447cd2457ede470a822c4f5bfe9
SHA156e68959d483174e841844a1d1b3f6f7fc0ebc51
SHA256b5ee1821c351a38494f69ff5408762fada4ad103b82c1ba4a87e67ddfba1d62a
SHA5123d690bfe2d380541b24e695966bd1b16afb2e1b0d77d3610f3c1d080e98ccdef17674b0f51a8f3f55515bec885fcdc7ae2e7ae6b4bcc8cf3df7301becab31953
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\libresample.dll
Filesize79KB
MD54f29a41a2cbda9f77865932b899c2121
SHA17aeecaddb0568dd526378becbf4f783192238da4
SHA2563d742f33f681c4eacc3f011170bf597e9d6ae5c41dda0070df61fcf23181f611
SHA512fc7abec42e52bc5f7775cf71b8447c2a0c586f7d4c5d84c2c9433c99552892d53f37a1c78d2b15153671f6a6a8b15c164e7793015d21fd9c112acb071a3b9428
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\libup40.dll
Filesize19KB
MD5cbdd8b7bcbb1884e1eba277d14650cb6
SHA197e4865fe51689ed14f3eb4136b01fd0cef9084d
SHA25637ea5c9c4779619e5f8e546c920bdaaf192b29e97436b82f77ed25d55be23e8c
SHA5121d1b1249a2927bcd451a27a4109dba48b4f82fc2be2f35fd36a6492fa91dea857c82e25b99fbef4f26c7d59dbc8ff4c0621eec12a5743606d993a36e0247c0f2
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\sfwfmt.dll
Filesize120KB
MD5e428cbd5a3278191ea7f9051b0f6aba0
SHA13094eb4effa9a7db956a9e192773f73260cb7149
SHA2561828696734e091fc5adb507f0aaf2731cfebb3c402faf4314fbcc07dd85eb794
SHA51246942e5345dfafb52ae328ed4e0de97345ce9b0f9fafad8c484d2495d75d6037a58e5fecbb275d9fab860dd932ac923f634c06afbd14a824eef6f969755a4624
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH Streamline Manager\tak_deco_lib.dll
Filesize115KB
MD55eb3688f8d8c721231e0a69ff9a2a94b
SHA15d045e8e6cc716d0efa13cb953a8a0a7cbf870ee
SHA256221f766bbf6705bb502a9abb1e6ad363a3a10daf084043605f069ac38e86528c
SHA51294837040f6588135a853486e022cfee3ca864607df93c32b4e5f1db30b268a24fc266c1f1e942a1f4c2b78455a490dfdbf951e25b43abb4da22470d433082d9e
-
C:\Users\Admin\AppData\Roaming\GMDH LLC\GMDH Streamline Manager 5.30.13.1\install\33119ED\GMDH-Setup.msi
Filesize1.6MB
MD570f26425d8321b9f8c7dd762d39f77bc
SHA1acc0c11ac06bb8806914330154c274b561c0abfb
SHA256ab8deac18c092699c537070756d3473ce50460d54369f8f01407962a573b2244
SHA5128133a69c504a1fb35ba6eb841f9332e3a089dbfa78c9d521c3792f8ae6ac4a7311e96316ee70909dbd99b39a8b9cebe3a9d1cd1b30cb2f891a49645174fd1cad
-
Filesize
215KB
MD5bc00325b004cf04b852429f5b9e71ce0
SHA13584b23ae9f7e82be20a223afa15d7696449a60e
SHA25623131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456
SHA512809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847
-
Filesize
215KB
MD5bc00325b004cf04b852429f5b9e71ce0
SHA13584b23ae9f7e82be20a223afa15d7696449a60e
SHA25623131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456
SHA512809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847
-
Filesize
215KB
MD5bc00325b004cf04b852429f5b9e71ce0
SHA13584b23ae9f7e82be20a223afa15d7696449a60e
SHA25623131f8af5f06ddf022cea7456430a41368f747f1eec276d93c872019b909456
SHA512809a907a5633615cb142c3c003fd0dc713137aa86b167b5b2263cfd021f15ea7cdae5fa441e861b86559626b0b78e9225b833c6a9fb23651736b076afe906847
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
550KB
MD58259dc74965f3c8e91d152862580a773
SHA1d2d029f9f9be25be3c5526c5a52449c034c673e1
SHA25684f8a39d32775639bb3f8875b8e871e0e2344f2a96c52ab6660e65d5c33fd7f9
SHA51250903688a44609700a84bfb18859b038ebb9ea69d142b1fc23d7bc639879e8be469dab23de777bba8265eb4da8ca7614747f2559034339061236ea7e2b5fd6d0
-
Filesize
630KB
MD58ecff5e8777908818edd94721ddc349d
SHA1a3ffcfcffae1b44261c1b1a64917ac898c40b9e2
SHA2561c450659c7681df9df21b20412c9647e7e8e5bf0f2945c48b1ab51f330f2516b
SHA5128418049fe52dcf6e294cf58d200b7a7d8e704ba592b3f59243c4c5a4d661c60f8db97540badd9a1718547a0047b39316ec7917c43ddcb8a71bebad49e7baaf08
-
Filesize
630KB
MD58ecff5e8777908818edd94721ddc349d
SHA1a3ffcfcffae1b44261c1b1a64917ac898c40b9e2
SHA2561c450659c7681df9df21b20412c9647e7e8e5bf0f2945c48b1ab51f330f2516b
SHA5128418049fe52dcf6e294cf58d200b7a7d8e704ba592b3f59243c4c5a4d661c60f8db97540badd9a1718547a0047b39316ec7917c43ddcb8a71bebad49e7baaf08