Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
_Getintopc.com_Proton_VPN_for_Pc_v1.16.1.7z
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
_Getintopc.com_Proton_VPN_for_Pc_v1.16.1.7z
Resource
win10v2004-20241007-en
General
-
Target
_Getintopc.com_Proton_VPN_for_Pc_v1.16.1.7z
-
Size
23.8MB
-
MD5
005baf5dc2b9b0f4ed45e0769b8a9cc0
-
SHA1
df6c6272cea7cc4d46412975257c2889360800f9
-
SHA256
1e676736ca3bc378aaad16f3dc7f12be156a8ab48a4f6e95c637b8acbe08c792
-
SHA512
725e1942a67f9ec3c3e0a260e68c4370d7df344a20ddee9379506a154ae3001e0237eab91e2a976f683ef003832c64346e05e4a2c19b6a174f035fcc78522a2d
-
SSDEEP
393216:HqJjLhzc4ooBdHqYa86kxHavVnPLzpMnCp0SwNZH6ngvmqOHNqB8MpsYO44f4dGJ:HMjLVcVaHqY16hPLzpMVSwzBvmlkB8MW
Malware Config
Signatures
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SET896F.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET896F.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\tapprotonvpn.sys DrvInst.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ProtonVPN_win_v1.16.1.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ProtonVPN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ProtonVPN.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ProtonVPN.exe -
Executes dropped EXE 24 IoCs
pid Process 3600 ProtonVPN_win_v1.16.1.exe 5028 ProtonVPN_win_v1.16.1.exe 2176 ProtonVPNTap.exe 2868 ProtonVPN_win_v1.16.1.exe 3892 tapinstall.exe 4440 tapinstall.exe 3104 tapinstall.exe 2840 MSI8AF4.tmp 2088 ProtonVPN.exe 3720 ProtonVPNService.exe 3004 ProtonVPN.UpdateService.exe 1648 ProtonVPN.exe 3716 ProtonVPN.exe 3100 built.exe 2352 ProtonVPN.exe 3632 ProtonVPN.exe 3148 built.exe 3400 ProtonVPN_win_v1.16.1.exe 1360 ProtonVPN.exe 3464 ProtonVPN.UpdateService.exe 4948 ProtonVPNService.exe 5800 ProtonVPN.exe 5928 ProtonVPN.exe 5140 built.exe -
Loads dropped DLL 64 IoCs
pid Process 3600 ProtonVPN_win_v1.16.1.exe 3600 ProtonVPN_win_v1.16.1.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 5028 ProtonVPN_win_v1.16.1.exe 3600 ProtonVPN_win_v1.16.1.exe 2176 ProtonVPNTap.exe 2176 ProtonVPNTap.exe 1224 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 4440 MsiExec.exe 2176 ProtonVPNTap.exe 4440 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 4132 MsiExec.exe 2896 MsiExec.exe 3600 ProtonVPN_win_v1.16.1.exe 4132 MsiExec.exe 4132 MsiExec.exe 4132 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 4492 rundll32.exe 4492 rundll32.exe 4492 rundll32.exe 4492 rundll32.exe 4492 rundll32.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2168 MsiExec.exe 3720 ProtonVPNService.exe 2168 MsiExec.exe 3100 built.exe 3148 built.exe 3400 ProtonVPN_win_v1.16.1.exe 3400 ProtonVPN_win_v1.16.1.exe 4408 MsiExec.exe 4408 MsiExec.exe 4408 MsiExec.exe -
Blocklisted process makes network request 10 IoCs
flow pid Process 48 1084 msiexec.exe 49 1084 msiexec.exe 50 4776 msiexec.exe 51 4776 msiexec.exe 65 4776 msiexec.exe 67 4776 msiexec.exe 51 4776 msiexec.exe 67 4776 msiexec.exe 50 4776 msiexec.exe 65 4776 msiexec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\M: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: ProtonVPNTap.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\K: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: ProtonVPNTap.exe File opened (read-only) \??\S: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\L: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\Z: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\T: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\N: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\U: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: ProtonVPNTap.exe File opened (read-only) \??\K: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\X: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\V: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\L: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: ProtonVPNTap.exe File opened (read-only) \??\W: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\T: ProtonVPNTap.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\H: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\R: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\S: ProtonVPNTap.exe File opened (read-only) \??\E: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\S: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\M: ProtonVPNTap.exe File opened (read-only) \??\V: ProtonVPNTap.exe File opened (read-only) \??\O: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\Z: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\Q: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\K: ProtonVPNTap.exe File opened (read-only) \??\O: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: ProtonVPNTap.exe File opened (read-only) \??\B: ProtonVPNTap.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\X: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\P: ProtonVPN_win_v1.16.1.exe File opened (read-only) \??\K: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 77 raw.githubusercontent.com 78 raw.githubusercontent.com 89 raw.githubusercontent.com 132 raw.githubusercontent.com 133 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 ip-api.com -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732} DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ProtonVPN.UpdateService.exe.log ProtonVPN.UpdateService.exe File opened for modification C:\Windows\SysWOW64\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87F8.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_87687f1c2d66f901\tapprotonvpn.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_87687f1c2d66f901\tapprotonvpn.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ProtonVPNService.exe.log ProtonVPNService.exe File created C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_87687f1c2d66f901\oemvista.PNF tapinstall.exe File opened for modification C:\Windows\SysWOW64\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\tapprotonvpn.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87F9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87FA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87FA.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\oemvista.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\tapprotonvpn.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\oemvista.inf_amd64_87687f1c2d66f901\oemvista.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\symbols\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wntdll.pdb MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87F8.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{3e9ead52-16e1-d04a-a291-a94f770e9732}\SET87F9.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.Resource.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Sentry.PlatformAbstractions.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\System.Collections.Immutable.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\System.Buffers.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\x86\GoSrp.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\x86\ProtonVPN.IpFilter.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\pt-BR\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\config.ovpn msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\libssl-1_1-x64.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Autofac.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ByteSize.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Sentry.Protocol.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe.config msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.TlsVerify.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\PluralNet.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x64\OemVista.inf msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\32-bit\liblzo2-2.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\libcrypto-1_1-x64.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.ErrorMessage.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\PInvoke.Windows.ShellScalingApi.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Sentry.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.ErrorMessage.exe.config msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\tapprotonvpn.Sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\nl\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\OemVista.inf msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x64\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\libpkcs11-helper-1.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\openvpn.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\GalaSoft.MvvmLight.Platform.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.NetworkFilter.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\LICENSE msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ARSoft.Tools.Net.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\de\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x64\tapprotonvpn.Sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\32-bit\libpkcs11-helper-1.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\CalcBinding.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.Core.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\x64\GoSrp.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\tapprotonvpn.cat msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\32-bit\openvpn.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Resources\64-bit\liblzo2-2.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\GalaSoft.MvvmLight.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\DeviceId.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x86\tapinstall.exe msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\OxyPlot.Wpf.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\fa\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\it\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\tapprotonvpn.sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Caliburn.Micro.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Newtonsoft.Json.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\NLog.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\OxyPlot.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.Vpn.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe.config msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Microsoft.Deployment.WindowsInstaller.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x86\OemVista.inf msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\es-ES\ProtonVPN.resources.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows7\x64\tapprotonvpn.sys msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\x86\ProtonVPN.NetworkUtil.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\COPYING.md msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPN\Polly.Contrib.WaitAndRetry.dll msiexec.exe File created C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\windows10\x86\tapprotonvpn.cat msiexec.exe -
Drops file in Windows directory 57 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8553.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8553.tmp-\TapInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI178E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6FF8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI760B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8AF4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI15F6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI723D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7E8B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7F76.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI8AD4.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7114.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI72EA.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8B05.tmp msiexec.exe File opened for modification C:\Windows\Installer\e581201.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6F68.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI74F1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DFD.tmp msiexec.exe File created C:\Windows\Installer\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI1B79.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7359.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\Installer\SourceHash{BCB82CD9-F514-4F93-A6D9-F898494DC927} msiexec.exe File opened for modification C:\Windows\Installer\MSI8AB3.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5811fc.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI1664.tmp msiexec.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSI73B7.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7706.tmp msiexec.exe File opened for modification C:\Windows\Installer\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI6FA7.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log tapinstall.exe File opened for modification C:\Windows\Installer\MSI6EF9.tmp msiexec.exe File created C:\Windows\Installer\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI1A30.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6FC7.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E} msiexec.exe File opened for modification C:\Windows\Installer\MSI8553.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI1597.tmp msiexec.exe File created C:\Windows\Installer\e581200.msi msiexec.exe File opened for modification C:\Windows\Installer\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\protonvpn.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI14CB.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7067.tmp msiexec.exe File created C:\Windows\Installer\e581203.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI184B.tmp msiexec.exe File created C:\Windows\Tasks\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}.job ProtonVPN_win_v1.16.1.exe File created C:\Windows\Installer\e5811fc.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6FD8.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DDD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8553.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\e581201.msi msiexec.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 2840 MSI8AF4.tmp -
pid Process 2428 powershell.exe 4984 powershell.exe 4604 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSI8AF4.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtonVPN_win_v1.16.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtonVPN_win_v1.16.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtonVPN_win_v1.16.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtonVPN_win_v1.16.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtonVPNTap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs tapinstall.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs tapinstall.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID tapinstall.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID tapinstall.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 tapinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags tapinstall.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 55 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28\52C64B7E DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe -
Modifies registry class 49 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\\9F3CB0E\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\ProductIcon = "C:\\Windows\\Installer\\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\\protonvpn.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\ProductName = "ProtonVPN" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\PackageCode = "84B03808A965F5E46AD3E8C7CFF9F8AF" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\ProductIcon = "C:\\Windows\\Installer\\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\\protonvpn.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\PackageName = "ProtonVPN_win_v1.16.1.msi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\DeploymentFlags = "3" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\\94DC927\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\Version = "16842752" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D98565CC8EF283B40942A0CB9D3FBCE0 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\Version = "17825793" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F7F9B32EA0AAA184E8ACAF9697B45FA0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\\94DC927\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D98565CC8EF283B40942A0CB9D3FBCE0\FD92F08164915A061A35616A2E484 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9DC28BCB415F39F46A9D8F8994D49C72 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\F7F9B32EA0AAA184E8ACAF9697B45FA0\9DC28BCB415F39F46A9D8F8994D49C72 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\PackageName = "ProtonVPNTap.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\D42101B218F21BB41956F4B9B1B10A9F msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9DC28BCB415F39F46A9D8F8994D49C72\MainFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\ProductName = "ProtonVPNTap" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\D42101B218F21BB41956F4B9B1B10A9F\D98565CC8EF283B40942A0CB9D3FBCE0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D98565CC8EF283B40942A0CB9D3FBCE0\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\\9F3CB0E\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\PackageCode = "91EAFF615C5E1B24BB3510A61899F139" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9DC28BCB415F39F46A9D8F8994D49C72\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D98565CC8EF283B40942A0CB9D3FBCE0\MainFeature msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD ProtonVPN_win_v1.16.1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPN_win_v1.16.1.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPN_win_v1.16.1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD ProtonVPNTap.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 040000000100000010000000c5dfb849ca051355ee2dba1ac33eb0280f00000001000000200000005229ba15b31b0c6f4cca89c2985177974327d1b689a3b935a0bd975532af22ab090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520033000000620000000100000020000000cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b1400000001000000140000008ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc1d000000010000001000000001728e1ecf7a9d86fb3cec8948aba953030000000100000014000000d69b561148f01c77c54578c10926df5b856976ad190000000100000010000000d0fd3c9c380d7b65e26b9a3fedd39b8f2000000001000000630300003082035f30820247a003020102020b04000000000121585308a2300d06092a864886f70d01010b0500304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e301e170d3039303331383130303030305a170d3239303331383130303030305a304c3120301e060355040b1317476c6f62616c5369676e20526f6f74204341202d20523331133011060355040a130a476c6f62616c5369676e311330110603550403130a476c6f62616c5369676e30820122300d06092a864886f70d01010105000382010f003082010a0282010100cc2576907906782216f5c083b684ca289efd057611c5ad8872fc460243c7b28a9d045f24cb2e4be1608246e152ab0c8147706cdd64d1ebf52ca30f823d0c2bae97d7b614861079bb3b1380778c08e149d26a622f1f5efa9668df892795389f06d73ec9cb26590d73deb0c8e9260e8315c6ef5b8bd20460ca49a628f6693bf6cbc82891e59d8a615737ac7414dc74e03aee722f2e9cfbd0bbbff53d00e10633e8822bae53a63a16738cdd410e203ac0b4a7a1e9b24f902e3260e957cbb904926868e538266075b29f77ff9114efae2049fcad401548d1023161195eb897efad77b7649a7abf5fc113ef9b62fb0d6ce0546916a903da6ee983937176c6698582170203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e041604148ff04b7fa82e4524ae4d50fa639a8bdee2dd1bbc300d06092a864886f70d01010b050003820101004b40dbc050aafec80ceff796544549bb96000941acb3138686280733ca6be674b9ba002daea40ad3f5f1f10f8abf73674a83c7447b78e0af6e6c6f03298e333945c38ee4b9576caafc1296ec53c62de4246cb99463fbdc536867563e83b8cf3521c3c968fecedac253aacc908ae9f05d468c95dd7a58281a2f1ddecd0037418fed446dd75328977ef367041e15d78a96b4d3de4c27a44c1b737376f41799c21f7a0ee32d08ad0a1c2cff3cab550e0f917e36ebc35749bee12e2d7c608bc3415113239dcef7326b9401a899e72c331f3a3b25d28640ce3b2c8678c9612f14baeedb556fdf84ee05094dbd28d872ced36250651eeb92978331d9b3b5ca47583f5f ProtonVPNTap.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 ProtonVPNTap.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 624 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 2168 MsiExec.exe 4776 msiexec.exe 4776 msiexec.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 2896 MsiExec.exe 4776 msiexec.exe 4776 msiexec.exe 4132 MsiExec.exe 4132 MsiExec.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4492 rundll32.exe 4492 rundll32.exe 4492 rundll32.exe 4492 rundll32.exe 4604 powershell.exe 4604 powershell.exe 4604 powershell.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3100 built.exe 3720 ProtonVPNService.exe 3720 ProtonVPNService.exe 3100 built.exe 3100 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe 3148 built.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1848 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1848 7zFM.exe Token: 35 1848 7zFM.exe Token: SeSecurityPrivilege 1848 7zFM.exe Token: SeSecurityPrivilege 4776 msiexec.exe Token: SeCreateTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeAssignPrimaryTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeLockMemoryPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeIncreaseQuotaPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeMachineAccountPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeTcbPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSecurityPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeTakeOwnershipPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeLoadDriverPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemProfilePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemtimePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeProfSingleProcessPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeIncBasePriorityPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreatePagefilePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreatePermanentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeBackupPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeRestorePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeShutdownPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeDebugPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeAuditPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemEnvironmentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeChangeNotifyPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeRemoteShutdownPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeUndockPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSyncAgentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeEnableDelegationPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeManageVolumePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeImpersonatePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreateGlobalPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreateTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeAssignPrimaryTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeLockMemoryPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeIncreaseQuotaPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeMachineAccountPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeTcbPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSecurityPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeTakeOwnershipPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeLoadDriverPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemProfilePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemtimePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeProfSingleProcessPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeIncBasePriorityPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreatePagefilePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreatePermanentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeBackupPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeRestorePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeShutdownPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeDebugPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeAuditPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSystemEnvironmentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeChangeNotifyPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeRemoteShutdownPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeUndockPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeSyncAgentPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeEnableDelegationPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeManageVolumePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeImpersonatePrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreateGlobalPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeCreateTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe Token: SeAssignPrimaryTokenPrivilege 3600 ProtonVPN_win_v1.16.1.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 1848 7zFM.exe 1848 7zFM.exe 3600 ProtonVPN_win_v1.16.1.exe 3600 ProtonVPN_win_v1.16.1.exe 3600 ProtonVPN_win_v1.16.1.exe 1084 msiexec.exe 2428 powershell.exe 1084 msiexec.exe 4604 powershell.exe 3400 ProtonVPN_win_v1.16.1.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1360 ProtonVPN.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3100 built.exe 3148 built.exe 5140 built.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2168 4776 msiexec.exe 106 PID 4776 wrote to memory of 2168 4776 msiexec.exe 106 PID 4776 wrote to memory of 2168 4776 msiexec.exe 106 PID 2168 wrote to memory of 5028 2168 MsiExec.exe 111 PID 2168 wrote to memory of 5028 2168 MsiExec.exe 111 PID 2168 wrote to memory of 5028 2168 MsiExec.exe 111 PID 3600 wrote to memory of 2176 3600 ProtonVPN_win_v1.16.1.exe 112 PID 3600 wrote to memory of 2176 3600 ProtonVPN_win_v1.16.1.exe 112 PID 3600 wrote to memory of 2176 3600 ProtonVPN_win_v1.16.1.exe 112 PID 4776 wrote to memory of 1224 4776 msiexec.exe 114 PID 4776 wrote to memory of 1224 4776 msiexec.exe 114 PID 4776 wrote to memory of 1224 4776 msiexec.exe 114 PID 2176 wrote to memory of 1084 2176 ProtonVPNTap.exe 115 PID 2176 wrote to memory of 1084 2176 ProtonVPNTap.exe 115 PID 2176 wrote to memory of 1084 2176 ProtonVPNTap.exe 115 PID 4776 wrote to memory of 4440 4776 msiexec.exe 118 PID 4776 wrote to memory of 4440 4776 msiexec.exe 118 PID 4776 wrote to memory of 4440 4776 msiexec.exe 118 PID 4440 wrote to memory of 2428 4440 MsiExec.exe 119 PID 4440 wrote to memory of 2428 4440 MsiExec.exe 119 PID 4440 wrote to memory of 2428 4440 MsiExec.exe 119 PID 3600 wrote to memory of 2868 3600 ProtonVPN_win_v1.16.1.exe 121 PID 3600 wrote to memory of 2868 3600 ProtonVPN_win_v1.16.1.exe 121 PID 3600 wrote to memory of 2868 3600 ProtonVPN_win_v1.16.1.exe 121 PID 4776 wrote to memory of 780 4776 msiexec.exe 129 PID 4776 wrote to memory of 780 4776 msiexec.exe 129 PID 4776 wrote to memory of 2896 4776 msiexec.exe 131 PID 4776 wrote to memory of 2896 4776 msiexec.exe 131 PID 4776 wrote to memory of 2896 4776 msiexec.exe 131 PID 4776 wrote to memory of 4132 4776 msiexec.exe 132 PID 4776 wrote to memory of 4132 4776 msiexec.exe 132 PID 4776 wrote to memory of 4132 4776 msiexec.exe 132 PID 4132 wrote to memory of 3024 4132 MsiExec.exe 133 PID 4132 wrote to memory of 3024 4132 MsiExec.exe 133 PID 4132 wrote to memory of 3024 4132 MsiExec.exe 133 PID 3024 wrote to memory of 3496 3024 cmd.exe 135 PID 3024 wrote to memory of 3496 3024 cmd.exe 135 PID 3024 wrote to memory of 3496 3024 cmd.exe 135 PID 4132 wrote to memory of 2644 4132 MsiExec.exe 136 PID 4132 wrote to memory of 2644 4132 MsiExec.exe 136 PID 4132 wrote to memory of 2644 4132 MsiExec.exe 136 PID 2896 wrote to memory of 4984 2896 MsiExec.exe 138 PID 2896 wrote to memory of 4984 2896 MsiExec.exe 138 PID 2896 wrote to memory of 4984 2896 MsiExec.exe 138 PID 4984 wrote to memory of 2424 4984 powershell.exe 141 PID 4984 wrote to memory of 2424 4984 powershell.exe 141 PID 4984 wrote to memory of 2424 4984 powershell.exe 141 PID 2896 wrote to memory of 4492 2896 MsiExec.exe 142 PID 2896 wrote to memory of 4492 2896 MsiExec.exe 142 PID 2896 wrote to memory of 4492 2896 MsiExec.exe 142 PID 4492 wrote to memory of 3892 4492 rundll32.exe 143 PID 4492 wrote to memory of 3892 4492 rundll32.exe 143 PID 4492 wrote to memory of 4440 4492 rundll32.exe 145 PID 4492 wrote to memory of 4440 4492 rundll32.exe 145 PID 1340 wrote to memory of 2028 1340 svchost.exe 148 PID 1340 wrote to memory of 2028 1340 svchost.exe 148 PID 1340 wrote to memory of 1596 1340 svchost.exe 150 PID 1340 wrote to memory of 1596 1340 svchost.exe 150 PID 4492 wrote to memory of 3104 4492 rundll32.exe 153 PID 4492 wrote to memory of 3104 4492 rundll32.exe 153 PID 4776 wrote to memory of 2840 4776 msiexec.exe 155 PID 4776 wrote to memory of 2840 4776 msiexec.exe 155 PID 4776 wrote to memory of 2840 4776 msiexec.exe 155 PID 2896 wrote to memory of 4604 2896 MsiExec.exe 156 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1848
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2876
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{BCB82CD9-F514-4F93-A6D9-F898494DC927}\94DC927\ProtonVPNTap.msi AI_SETUPEXEPATH="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\ProtonVPNTap.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites\" EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1736907499 "3⤵
- Blocklisted process makes network request
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:1084
-
-
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe" /i C:\Users\Admin\AppData\Local\Temp\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\9F3CB0E\ProtonVPN_win_v1.16.1.msi AI_EUIMSI=1 APPDIR="C:\Program Files (x86)\Proton Technologies\ProtonVPN" SECONDSEQUENCE="1" CLIENTPROCESSID="3600" AI_MORE_CMD_LINE=12⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\Read Me - Leggimi by JA.txt1⤵
- Opens file in notepad (likely ransom note)
PID:624
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding AC74765B5D23BF73AC5520AA1BB6365B C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe" /groupsextract:103; /out:"C:\Users\Admin\AppData\Roaming\Proton Technologies AG\ProtonVPN\prerequisites" /callbackid:21683⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 212B2D0B7A778BD4075CA4D260E7CBE2 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8BE617538FAB06ACB3ABED4E705E51412⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss1B84.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2428
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:780
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F30A08F36CF03F62B9965E23846798C02⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7F6E.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /F /TN "ProtonVPN Update" /RU INTERACTIVE /IT /RL HIGHEST /TR "'C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.UpdateService.exe' update" /SC ONEVENT /EC Application /MO "*[System[Provider[@Name='ProtonVPN'] and EventID=1]]"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2424
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\Installer\MSI8553.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240682312 214 TapInstaller!TapInstaller.CustomActions.InstallTapAdapter3⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" hwids tapprotonvpn4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3892
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" install OemVista.inf tapprotonvpn4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4440
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPNTap\installer\x64\tapinstall.exe" status tapprotonvpn4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3104
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8B0B.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4604
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EAEC9A37195E77ADF6CB113803D281A4 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{C521DEAF-BDF3-4B3F-B6A3-41036B881EFD}.bat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:3496
-
-
-
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{C521DEAF-BDF3-4B3F-B6A3-41036B881EFD}.bat"3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\Windows\Installer\MSI8AF4.tmp"C:\Windows\Installer\MSI8AF4.tmp" /EnforcedRunAsAdmin /DontWait /dir "C:\Program Files (x86)\Proton Technologies\ProtonVPN\" "C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"2⤵
- Executes dropped EXE
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B7CEA9BA77CF06EAFD6DE15355AFF236 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{930501d7-644b-b449-8b17-af8fd1ba7327}\oemvista.inf" "9" "4334ff507" "0000000000000154" "WinSta0\Default" "0000000000000138" "208" "c:\program files (x86)\proton technologies\protonvpntap\windows10\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2028
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:3beb73aff103cc24:tapprotonvpn.ndi:9.24.2.601:tapprotonvpn," "4334ff507" "0000000000000154"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:1596
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"1⤵
- Executes dropped EXE
PID:2088
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.UpdateService.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.UpdateService.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3004
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"2⤵
- Executes dropped EXE
PID:3716
-
-
C:\Users\Admin\AppData\Roaming\built.exe"C:\Users\Admin\AppData\Roaming\built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3100
-
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"2⤵
- Executes dropped EXE
PID:3632
-
-
C:\Users\Admin\AppData\Roaming\built.exe"C:\Users\Admin\AppData\Roaming\built.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3400
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://account.protonvpn.com/signup2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa4cc46f8,0x7ffaa4cc4708,0x7ffaa4cc47183⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9324870855995460953,15670017318957021696,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9324870855995460953,15670017318957021696,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:33⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9324870855995460953,15670017318957021696,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:83⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9324870855995460953,15670017318957021696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9324870855995460953,15670017318957021696,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:13⤵PID:5252
-
-
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPNService.exe"1⤵
- Executes dropped EXE
PID:4948
-
C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.UpdateService.exe"C:\Program Files (x86)\Proton Technologies\ProtonVPN\ProtonVPN.UpdateService.exe"1⤵
- Executes dropped EXE
PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5472
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\CRACK\ProtonVPN.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
PID:5800 -
C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"C:\Users\Admin\AppData\Roaming\ProtonVPN.exe"2⤵
- Executes dropped EXE
PID:5928
-
-
C:\Users\Admin\AppData\Roaming\built.exe"C:\Users\Admin\AppData\Roaming\built.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5140
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD591ad2a9b706b3e1c25f02d6024c595de
SHA11c45cfee7d41204f892783e1fac7b731621ba80d
SHA256c716fe834c90c5ad4079373b5755dcc71366bcbcb4160773b4f3d7d70037951d
SHA51209e6cfc9a768c146c695108122a85d6ba3548c6237af62e7124425b2dd2d838340a29ac547400439567d83ff2a1ec490b247c80ecca0521bd81e5a6ea00c5f3d
-
Filesize
1.7MB
MD59d19319ef8284f2ea7319c6821fe611b
SHA13aa3e5a16c325753f4d19522b14426758d32146a
SHA256abdf79448b938417193478b3a3ea5d35a81e2ce90481bb522ab7272b5be5685b
SHA512c2a0260845d308c8999dc849ec0a6f98a63337df4f3ead3d6c648365398bff678223a7d938adfaaf151126cebe1f8e206377967a7b3ba9a1f347846f0e72c94f
-
Filesize
7.2MB
MD5272c52681857d6402407fd92be3e9810
SHA1a063ce80f96b11dc19222f1bb51ef705c9e59f90
SHA256ff238a202c409b4f5351f43d98081939c4eba3c4e7ee96a5a487a19486868174
SHA5127249efc229fb17ba7ecf5095902e4a97bd6e5425fe48a88c40cd3ffbaaa08b6134cac02f4fe278cacdfb79de39e5e7ab3f20a0f6a877c10737f4366c14d465ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\769F85394FB15C375FF89A7488274D5B_DB5B37ABCE19BE2ABD143FD5ABCE10F1
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
8KB
MD5ef742b46ba1e5b67c2c1bc9c60de08a0
SHA1259f87376b46365c3488ed1d29b7856e650598a1
SHA2560f2cd52a46c8d23d17680c5cf6d088c4d9d3b9650177a6acef042447109b49a9
SHA512b053c8076d75de5e7a37fab4c33167eaec9278c37cce6ee2536f818a18ca341c90fa8ea88590a05b112b1dda2f5d81874c1a7c65e52c9c563e743f2b4834988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4
Filesize1KB
MD53b64e4e49c61e504cdfb623fc30f8251
SHA13d9cd95eee2479202cea0dfcc322c6db223d5e8e
SHA256a43e582e35048374532465134a7ad4868131dbe076fb4a41cb7b98bad3b6e596
SHA5125debd24c114baf241748e96a51a2df94b11cbbf8316d4815ea2cac2e1f7f875a509c77a105431e24e8ec58a38a7137c0a7998566a2a2f5bf1adad2576015373c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_DB5B37ABCE19BE2ABD143FD5ABCE10F1
Filesize440B
MD50925e187d4d7719446538152a836b3d7
SHA10ed8cd33f12ae2b69ae86431d2b59fde269ed7da
SHA256d52e9b96ed96455037661dec22c9f94c7c10157259351a06c57d8ab27494444f
SHA51214c1cc272e4c85e99f2935570de23044f17af4c7b9a50b3c9a88ecf047dfb618cd22a40ce0782036558717b5b277a9bfb40437ca9c734995deb2cadc2d0d5eb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_DB5B37ABCE19BE2ABD143FD5ABCE10F1
Filesize440B
MD5cd5fded2e9efacb8b15dd5c657bb79a6
SHA1f748ebf604100f160eb3b916058a47ad0e71e685
SHA25647aecf101833598ff63c4fce57c00320f0f3cc3ab29e0545b197d47ad7b385ac
SHA5123e458f833c227e333283ba8bce74f1ea3d3a5f78f37bc3bc192b4a41631910300fe0bd3dbb2b291ce76f0f65fc1b2919b585ed821c6f926badc0e5c870c69f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\769F85394FB15C375FF89A7488274D5B_DB5B37ABCE19BE2ABD143FD5ABCE10F1
Filesize440B
MD51801ee1e023f5d8af118b0166a4d573d
SHA12f471366f098d6470d0bff84f9bf081e3763eff6
SHA2567dc0a62d06e460a579a27b354523b5ebacb7b38022446ca8a52b997fb6f52d06
SHA51229008b21fc3b2ecc2ab4c4f0ca2ac4a165717786f7e0786f59f87ed2a9fe8d22ab8136106c897c700431347df58709125f828f38ae94b6fa99c9a3f0c32e6b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8E55FEB142F566DFBD0ED964FAB94545
Filesize210B
MD516e2f923e5e9537c81529813d83d82c5
SHA1c328861ffcced0556162db64c713064dbb2dd5b3
SHA256355ffc4132893ba0fe60e5991f99b78a41c9a120203898164ffedce1bf72bc01
SHA5123ffc180a6643ef823da9c374616516c7621b4744a771f82c7e409ee7ac924fa60aa27b3f86b445cec7134bdb5c72224cd9b6ed52bda55f4b2deda0513046bdb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8E55FEB142F566DFBD0ED964FAB94545
Filesize210B
MD5f2d4e88c94023f573cf57dc676936f09
SHA16a98e561cbd51ce9109d874c5d582b59a8cf9fcc
SHA25629c170b586f83fd9f4c2561fc89b4df9a0eec132cc852a3f3a9945c0514ccfb9
SHA5121bf9c50f38cc4e590633148edb9fed4795444d6fb33487bafa37bb06c40acfaaac5e46bc7500cbf86315eb6c7b05d0cd4dff69fc6999f3a53ebbe0378fb01544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8E55FEB142F566DFBD0ED964FAB94545
Filesize210B
MD57c667ccaf8f93b3e0b824548a684ea40
SHA1d479821b05bebadea8ed21e8ff0bd8f96a51cd73
SHA2566984a865db7f90dc1b2214cbaa024feca1ed8b0febfa8cad5de69d4621f06d4e
SHA512072e804779a0f2a87a6056b96d4a36d87c667787b0f0a312353ac0454cf4d96e02ad51d6907654dab86ce3c8fe5a24021cd656a0d38f184e21d1da7c8d178308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_4BB72A60CF9C652B353353202101C0E4
Filesize502B
MD5189230f7a7f6cdb8b7291724fe2e99f3
SHA1c1b11721fefc8837f0aa70319ce54f62a55c3a16
SHA25680e9ef9f46b23e554246272166e513f740afff57b660922f8cf59a2f4defffb1
SHA51288ec565117417da4676040f68cf48f0eee5e4d87817f7a38897d04e782c0444fd9e1f7b0c3d02c775d0b1fe84067aee9070e86e832316eb2b0905874596145a1
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD550a893542463cfbe54af7a00c7baadff
SHA12e1da02e08646eba1182a62b8afff6ffc07e84bf
SHA256a7e3d5f8c9214e4eda55bd0e7e1fcf169f1bd1af091a035bb89d6243356989f7
SHA51248d7480996bce7affc48c1e3ed32df2401a085c0436911accaa9778af4f7178b59658bbea7ac88abb997fac041efaad546fcebef8510a360a44b3297f09ea0a8
-
Filesize
272B
MD5c07ee34715c7cebca98e534a9dbad30f
SHA1ae8d00099c66ac3724c47796cd19414ede30400e
SHA2569430382267d6f12050060a6a0fad6905e7614efec71101c691cd976a35d9760a
SHA5128924100801d10516cfc10f8e166ef1046ee4f67d4c9c11383304613d40c7213e934e9ebdfcaad26418c5d4b8cdf3ccd81c5a66a2e7078306337ffa5f4bfea327
-
Filesize
5KB
MD5ad0523d8e130dc09581dab744894ae56
SHA1574549825d89a43affeee7dcabd3ff54edb84e88
SHA256f5b06b05e2a76b2d7c4f3c442d82cf11f4eebc8f0d457041e09b56f8cfa5263f
SHA51286cc5a10bf0c1d7463d9fff99a2d83f83763149ebd9932d37e8529a58d5809ce22937ae88d595aadec97be9c1b1b7190b8676d479ca3e78662d4d11708a0056e
-
Filesize
6KB
MD582183f821d16dc75965328e0b1aaa166
SHA11ccad502d0150a1494ebb215999aefff5bf87fb8
SHA256486a91492e3556c4aff66cfa151146638a02a847c4ce98c13ddae73b9868452c
SHA512b229936d3850f856da003feff23f49b6f337650f84044c9065c589cceaac9b76851413976dce09b24b7bf154f32d36b0bc8148f0cb7bfa45cec920e0912efa98
-
Filesize
10KB
MD5798a6c58c5a2cd8f511558c92afaff41
SHA1db7579afd18e2f77fc41efbbf9bdb265060ef272
SHA2561b17ecbb08c387a9cef832e206e7ba96b67135421aee96e9e60816827987d2f5
SHA512de3f0860ed661b0cbb958be4a79df0f8ef65258e46b3015008b1f4421b3bbefcf3ad22311bf3a3c1d9d905c2e1af396ded810d0cff91e2e79a8af9591e28a4e2
-
Filesize
46KB
MD51095460ee67711e39a4fee47ebb08d17
SHA16ab263415d1aecffe3735b876f917db68e3f5987
SHA256be947e6c334b6399d64235a38efe233cc2f156ddb20440cb7a160526a80a7081
SHA5126f145828c84bcfcd27a843b905ec33bea7073ebadce27f0c6257c89b80ffbf42c7baa96102dc8ce7f7c873b3337201408b34f549ea9717061981909466066f5c
-
Filesize
17KB
MD5fcd04290ab4ed5c5191c22211ba86772
SHA11b791c2fb2f3f3540577d2fa846ef50f585f831c
SHA256e41af6f9f52a210389e41dc93f8ef788753e70f5248c0d99bade4e5a7d2baa0b
SHA512a01664cf49809ddd8f587cb003fa3017f694feee042b5fa3b40a6c3fab27388eac7dde9dd883009dad8ef3d1b60fe8b7387f581691fde4df7c52cce58e4d8a5f
-
Filesize
24B
MD598a833e15d18697e8e56cdafb0642647
SHA1e5f94d969899646a3d4635f28a7cd9dd69705887
SHA256ff006c86b5ec033fe3cafd759bf75be00e50c375c75157e99c0c5d39c96a2a6c
SHA512c6f9a09d9707b770dbc10d47c4d9b949f4ebf5f030b5ef8c511b635c32d418ad25d72eee5d7ed02a96aeb8bf2c85491ca1aa0e4336d242793c886ed1bcdd910b
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\d0u2bt0i.newcfg
Filesize703B
MD5949d2d963a473f166403db939f5c87ec
SHA1440632633c45240f9db0f95bde78835825c52b1e
SHA256b8403989d5d0a4d99a9817023b1fa5ff70c2c9efa0a5406686deb8a3e9d36423
SHA5122c3904d39fc87a0ece5598a8d99b44f69ea4b49dc5592e6faf92b9a625c093a9533b89009a10d45f9ddd19fc6850183b906679f9581d78aecd38f0d6f4d60d9d
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\lj01wrgu.newcfg
Filesize953B
MD527a87b50903d2781760f654d429e5a34
SHA16296bfa6365e34b6e7822793594c21328f5d5670
SHA25692ef675c37c18b2635973e1282478896985c62808e3aea5bc3bdfad44ca70390
SHA5129025dde5c9db72427ddbd6f198d44a4b9c14d3f05b4636e119aaff555fe6fed097db7ba66b55b662f15d52d352ef6bd36f73dae9558327d6592679b841b8d1b5
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\ujow2wbz.newcfg
Filesize1KB
MD5c9711f8f7f918de1f9432b821e160712
SHA1c5164df18a221d505e2fee55ae4543db0a2b9839
SHA256b6bb26c9ab80ddd97dfea56f46b37fa606dea7535dc0622a85e499a9d9ef8160
SHA5126dcf0e2f1f57900ec542447fddd0a4cfa2eb66c8ed35bb698fd73dbb4a115eade2a348138b4d20366638e70c9c1df406f91ae12f656337dda9d2601082bef7da
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\user.config
Filesize1KB
MD5dd5ffaa0fe97ec865f7b6558853de05b
SHA17cc86d35c1ee6d77827eed7705643540fc31bc3f
SHA2562be0bb07bb24f9ed23274a89dd1a146c814cf05654a16d690c48cb0df4f63804
SHA51266b87922f206f86260e3c3d4be43ee5ea5479275fdc82ca9156ef46b73b4852506146d04fe2f46d591b084b28e82347179d184e09814cc842c77e566783165b3
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\user.config
Filesize574B
MD562a24619352fa13842bb89983b272f43
SHA17405b1c77f7cb77fc534479e0b59d014e6615981
SHA25675e2bcec2acace7b27e422acdc24b2f5c5d43ad4c7a39b843093aea0a146f234
SHA51238cfcac42b880a7a4a19c03fec5659bec6b8b6d9616c170b38af14d43e88ad6112624c1616290bfccc664ef29c3484c2faec42094b9ed2d6b45e6bccbf69f320
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\user.config
Filesize828B
MD52ed11f126586e2211463d6170f41d358
SHA1d135cbb7940953b57278a3e9c736fdde7907e020
SHA256887bf23a64fd59c43b0f87046e921faef9f50459a86c5a5aba547d544389be7b
SHA512849c82302658bae22272655bf0aa940951736ca8110ff524739f132deced0a97d78f43e31d7de622cdca2eb2da00213904e6bdcc45cdfcaae10ed287849c0f6e
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\user.config
Filesize829B
MD59a4aa0e1166acc27c5f4a77cd7e24c4c
SHA10600fbae334fb5ca191d698410730b860d08cefa
SHA256ebdbf44e0c7a45084b2e2f62a78cc09d6905d14b1ab99e0403c7fa43e9cc4dcf
SHA512d95172ca36fc9bc7df8ba594e01ef7d26b95d07fb916327fda4d4ca6ee7463fbc9f69f9dbb12763a8542da98c0645cc3d3102f8bb8cab6c967e425fa0dd1c0ef
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\user.config
Filesize953B
MD5da67d83a8255b1e7547c995aa29fcad8
SHA1b2c99d35df158fdb31f7219062f268e26c7bbcec
SHA256286160d59a677e1531703847bdd47d51e7a8fefc7acb61e4e86c34c54712a538
SHA5124637587b5c562f0985c061441986fe7cd9f2dfef3f266638f1b16a62212fcdf307dd604308130b5e2fed2be8ab7edaaf7b7546e6fcb3998df237e0d6b58bcc06
-
C:\Users\Admin\AppData\Local\ProtonVPN\ProtonVPN.exe_Url_5k5woeau2v3gmtlay4mjwsftlqxjnn2p\1.16.1.0\xrlxm42w.newcfg
Filesize703B
MD5505ec13ec589c4fc47a1c06bbf83b645
SHA1a8e2e8abb69831913fa33e6143d3aa8311b121f0
SHA25654f5dcedcf3cb61d27dc6375ef8ad5d56f78ab016428e6790ee7d2c51889a0e2
SHA5126a07f3e1a04ce7ca286972b7375e5e708c8c839d55bfa413851ffcfccc4692a10e032648455c558fb6a75ac487259469b7c172858117662ef0f118688b951d57
-
Filesize
3KB
MD5c6b57f973a3273cb37a77c11b1aa498f
SHA16af839d76eca45aeeafdbb47a54b73c1a960e105
SHA2564503e6a9fa0484ab39cee9bdf0aad9a9186658f5d74727e96dd33f7cfa64c8ef
SHA512e0013a2f6c749f0ecf5d9f0f165fe25269082d950dab7aa0dd49485460f4d5b40898b1cc55c76a8faa3c732e660ae71f6f1240705bf9cedc1f5817d8ed06a867
-
Filesize
26KB
MD58a372c8339a8facc35088ce99a977d96
SHA1bf83cad6c9ef75277ed308a6999a08491df106ef
SHA2566a9f617ad2117b3756188ff46ae14e43981f0672904d68b9ba0b9c5ab3525ecf
SHA512f23c3a0427b743061cfffc0310d97f7d62bf152e0acc3f13076f4c75ee653ef327ebb6a8f1b0553e7bddfe129b7261f061865b35791109a5ca08c4e00c73c1c1
-
Filesize
23KB
MD5b2412a08a716db06cc17be912c8cb3d2
SHA129d341b7094c4e44c06b0e54b2c862b3f407210c
SHA2566b22a621dcc76bbd790f63d02241ca438ed40448fb77f95f27197f82783e0b10
SHA512bc65fcb7748062eff3dd54fa8317fbbe448dba66fe0a20494285971c5705035ec2f7f6d6ce060051e8ad9df22df850a9582c4999833e6f4ce6403cdd34d79021
-
Filesize
221KB
MD54eeb82c085c0a32a5fd91e02267f9f8e
SHA13f0834ecd4d11b1bc85137a8c3a7071a1d5eaf54
SHA2566b049c3ac2371e7d03cd75bde115be79d71b20759bb3b72b26fa4c82b6beb6b8
SHA512e6a356e724727bd365cad510727add2c337c9f0516e93ae8c0bee0b19220a5bcc913a07127e065ab0077ccfd84eb59c4354429654d2cedde9f4e46c099ad8086
-
Filesize
715KB
MD5b65d2f30452c743386d1297f77253318
SHA188c875469fb0fe4dee0d37c1e688e618f3ce61a1
SHA256d4031cae12eef4e474c44bd557f8a7d098b575a71b2de5feaba7e3e07ae67634
SHA512d7a19ac3f69ff505b5fcf78e82b517a00768d0521473c6df2073ca68550cfa584e2032714a46541da714c6f523826c123af6fdfa44bb46a0f574ada99f06a299
-
Filesize
376KB
MD5c39daeba173815516c180ca4361f7895
SHA1db3ae54329834baa954569a35be5b947c86dc25e
SHA256a34bd87a23349bd52b8b0f25154235b90b698986c8849e101b7e40d11d48e4dc
SHA512e13cd98647059657355a69917898cdecdfc0b8da91036de1c030d20a4c5c1aacc06cd4d54fac65ecf1c8c44527dbba3c545f588260af1a0104b445e3f21ca929
-
Filesize
834KB
MD5b0b2090c4200fb19e335598969a40f26
SHA1e31d5533f85ef03dd8eb21723df14ff71586bb60
SHA256e16ce1f8a1b24d03353502af35fa159ab9962b4ecce8f3bb9dd4b075552505cd
SHA512177dad69d6773dab432a39a91f113949573caa3f3513e1e79361e9d74efe813746bd25a9101ec6436be7476cd77b663102d7ee138a01afbc902738e3ad75fce2
-
Filesize
525KB
MD51c62521f4ade74fe465aaf61049c3634
SHA1758bd079f98c5f1153213a4c78ee25f89eb64fa6
SHA256ae5544ebfa8d92072562dcc4f3a6b48e77ab1a1e263e8e8dabebf6a627286f9e
SHA5124b58f0216f2dcfff69f3e668d09e21c0c85a7087a01621f43a787344afcf31d05644b9374b2ee4719b2ede0019d88083104f7a8122409c1ea961a9c5016262fd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4.8MB
MD577d6c08c6448071b47f02b41fa18ed37
SHA1e7fdb62abdb6d4131c00398f92bc72a3b9b34668
SHA256047e2df9ccf0ce298508ee7f0db0abcb2ff9cff9916b6e8a1fbd806b7a9d064b
SHA512e1aeb8e8b441d755a119f45a465ca5660678f4131984322252bfb6d2cec52e7ee54d65a64b98429b23915eb5707b04b5cd62a85446c60de8842314130a926dbd
-
Filesize
4.3MB
MD56c7cdd25c2cb0073306eb22aebfc663f
SHA1a1eba8ab49272b9852fe6a543677e8af36271248
SHA25658280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705
SHA51217344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6
-
Filesize
81KB
MD5125b0f6bf378358e4f9c837ff6682d94
SHA18715beb626e0f4bd79a14819cc0f90b81a2e58ad
SHA256e99eab3c75989b519f7f828373042701329acbd8ceadf4f3ff390f346ac76193
SHA512b63bb6bfda70d42472868b5a1d3951cf9b2e00a7fadb08c1f599151a1801a19f5a75cfc3ace94c952cfd284eb261c7d6f11be0ebbcaa701b75036d3a6b442db2
-
Filesize
7KB
MD56c5ac2054ba61cadfa871b80ec1e2ced
SHA1eaed49cc3051c7a2575ee3e6cbb6f2cb26d419c6
SHA256b502facca95a22b7fe63390945c98533016df6d8b23d7652a57100f14923e3c5
SHA512a7509986397f88c284e685f0a30f516e47f25f6a86d6f9f4f2067dd512bd6f62ea1cd622e95c29db4e1484c328cc4f0f93ad531ccb6bf393652d2ee0d751901a
-
Filesize
19KB
MD51001cd07dcfd2d6338c5b3dd11806ad8
SHA15c7a7c13669ca756653b57810a370d569c008602
SHA25633d36078097c3150c56555489e8e327bc9e20fe81669d6ffd7657d0289ed0fc0
SHA512519b18ca5d8135185a4ad75958480313d02a554b42e65d7c6a20ac1a9f7b4f37012fe5f0120071fcdf15ab5eeb2bbf7271f51d06cd8f0095982a53d57d021d0d
-
Filesize
47KB
MD5e0f9b19e51377d04bfab07533f951e27
SHA184b95e0a8ab2518c433bc9d730e7bd6b3576ef5f
SHA256d763351e88eb4d6a6ab335f952f69c6bd1169eb77e10eb1200c2ab81aad6a2f5
SHA5128ca9006077f3745781f21ce0454d9a74ba151c75f019460f0f29c544ff4cfd50d6be15a8ba22506ec03dfca71332b2190f66af92afee9020bd195323a7409422
-
Filesize
2.0MB
MD5408645e7d36cc511125e636d7d488998
SHA1736296b2c95de68d33d157a03ca752709225fdf3
SHA256f29329feafe2b94490da02c7661a213bef9c213f0a8d94f884dbe9390976d0eb
SHA51200a26b56768f4338ccaba45daf0f9caa2de2bb141ab65e2dafd54cfbe0e793ca6ee1da6a0eb91697a7e5f4d4331eeacf76c81b27ba41dca737a04bb3eab37624
-
C:\Users\Admin\AppData\Local\Temp\{CC56589D-2FE8-4B38-9024-0ABCD9F3CB0E}\9F3CB0E\ProtonVPN_win_v1.16.1.msi
Filesize4.7MB
MD5cdb31c0ef845cd3c7dac1290653f58a9
SHA1d7ee71e9a595e208ef2b77a05927973bfcc2bef1
SHA256ea740f25db30a14efce0328c354e0fb9974fe219c7cee62e70d1d055389224d6
SHA51286239bd1c3bc0d20235e057d3e22cea6a1c8aaf62a1a85a02e65fe38ac9e2011093176d45bca4654af90a75de11b7cdd688541bf1d83576abc5289141afc669b
-
Filesize
182KB
MD5fc136d5c16573d1d1a64b0a62b586235
SHA18363d0d80fb25e4ace7b77efcfe119b7675913a1
SHA2565a12236a02ba2984b62d7acfe5afb048e461fc4c76989d055ffe8965f212ebbf
SHA5120ad82e28de1a65251eb536aef9739a76baaaa28a41dae78faacb82a9d1acd83d71816051dec16b7664e16a741706803d1fc0ad914bcdca4d28cb2ac2a05ff427
-
Filesize
2.9MB
MD559ec0f95e2650e18f0e95a5197477a32
SHA12bb8a34fa4636eef2c2a110aeefad7c7a31f7048
SHA25618fc77982b05768f490a64839afcb2e9fa6c34eed15656fb4d0da3e15ebe6a74
SHA512ee7c903b758bb06694394731ff94f90c878bdfd1820d195a2d953ff86bc519696f70c4c6d1f19216d2a2d097684c975c507da6adbfa4430f52305c5d815d673d
-
Filesize
7.2MB
MD5bbdfa1d6790c663a569fc5b8dfecf810
SHA12191504f2a05f6b17b9476c4c7e005f8d3618f3a
SHA25621feafefb5eff856a47945000c079d7c8954caf877b03a31b34ea9a546da3d33
SHA5129f7e16d3bb3244557f0b2c826c18dabf199a81aff7b70b3d4bd1aa9d3e7a79a4bab1cb2c0c731744fcf2e1b24c56c48d1e90b13c8cbd2f9a453d5f7e0366fdea
-
Filesize
5.6MB
MD5f6b6833f47dd76f058a9cb5faf0a55c9
SHA122211d67a67b8b1ac72bce756828ccd57bdae521
SHA256e51d78646c5096ba8dfc2252ca96b3422e6b0342b6c0c82b44933c0f7bfa8c55
SHA51233165b71b581687363b5d0d3781eb99493799ff005c4c84bf244d6e66b411fda492d09fc9d713af78c5e5306635ebb446ca03720e81b43179af495f9534e50e2
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\ProtonVPN_win_v1.16.1.exe
Filesize14.8MB
MD5155b4224a0e3ae0f91ac46728a678f97
SHA1e25bf934a99673fa769d641881e4f2b9e56e51e1
SHA256a4d2cfca3209f21e50a02387439e90cb0dd595235560867059b178eee835d9e9
SHA51223957d7fa9ddfa795e43f9381692ce00f25eefcb3fca05f226859016ae94a71f1311f67c475e54e5b04055679fce3f4f49d5bfec599af65e2c5724997c2bbff4
-
C:\Users\Admin\Desktop\_Getintopc.com_Proton_VPN_for_Pc_v1.16.1\Proton_VPN_for_Pc_v1.16.1\Read Me - Leggimi by JA.txt
Filesize3KB
MD5cfa580752978f62aa3f3742e3469c737
SHA1892f13989b86b86dc8d0650a01f28f364e560f28
SHA256819005044d8807e2cbbd65bf8191ea61e15b75cdce4566a9034b6eade1fdb93b
SHA5124e5358aa048aa4dd72a9be804b9853bac31c3e3ebe5587274bee71cb9f070bc57caf70292e7ec03d9a713a6914e8f7d184a8841a9ced41d3ac530cd3e26457e3
-
Filesize
859KB
MD5097aa2c15918e5c4efca0f31c671f940
SHA1a069443d3424a6d1341eece50aff7ff5f1cd19da
SHA25655b1fca5dac83cdf8f5deb5e20343fb673cde9259fd4584f9edb5a0503248311
SHA5120c5253ca5d923a75d6da9c05a6053df6d5b5b5ad9ff764c6b146d548fb3222a47be6c2e4ab110a0d677ee04511a660cd2443477470b8296a668c30a0acf4eb54
-
Filesize
248KB
MD5b913322c8fd2f9645a2e610d80a57b5b
SHA17f25f104e0dfc3bf72aeb4512a9650156b6505ba
SHA256a4c312a2c7f06054776a29c875cdc78a5414ce511ef6cf0c92a0f3b68a09c52b
SHA512098ef2506a5cbc67479d7f5bd0f683f753499b12069a08a76e235edc6eed59a4ab62390d7f2025bbe2df4318abeef2092bf8768532c729c75689fb13445d1695
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
15KB
MD560ce04e3f4920e22ccfbb7142ca0e18d
SHA116774da26cfda4b85b11003db2abc073371b6b05
SHA256bc392b6d6bf4dce678b3c31874fa53d53385e2113a28793296f4d2c4b2767d50
SHA51214d206dc761cc3c501778bb2ee20321a9d47e986ee564c18384e7a6745d57b9d08ba61534a81a7ac7e0f52ca98d1b88834253817ccd56ec88d04e3e92af5c9ea
-
Filesize
91KB
MD5404ff98f2d4290b45a69171193a410bf
SHA1ca42df97afec36bcf2bc7325df20b67c75e58789
SHA2564580d80a87b54f1960db3b04c01799bbd2c8e2c08b5dfbecbaf16ef42c6ef0f5
SHA512858a06f53595e4e8c5ae6b442af0df70b55d34125e54e02f3f9adc7b66b682406a34d873fbb594f05afb3ff6e2270c989e24b1503dcea851925c5bc80c3f6e9a
-
Filesize
623KB
MD59ee67795d8057badddcaf793375c7fa4
SHA1154bb854a8c37bf0ea9a7393599325b69d5b618f
SHA2563796d08b687f7431c569508ebb5e672826f9b25754341bdafd3e1d7f50c97935
SHA512fc8da7d1f16a5e583ab35494284c2aa24bff17552c1d821e5ce87974cf640105a764b0dea70fa070ca8ee09393cb789d545016317ef48968143aa5b964599195