Analysis
-
max time kernel
302s -
max time network
306s -
platform
windows10-1703_x64 -
resource
win10-20231025-en -
resource tags
arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system -
submitted
26-11-2023 22:17
Static task
static1
Behavioral task
behavioral1
Sample
02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe
Resource
win7-20231023-en
General
-
Target
02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe
-
Size
14.8MB
-
MD5
11c31a8b40db0bac16f603ca47e5b0cf
-
SHA1
f1160754ef8dea27aae887e426bd3b5c0f90722e
-
SHA256
02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0
-
SHA512
cfaf78e625d5ed6254d3fb45bd786a937eea9b95645f58bfd37904bfe4991e2599de82266583ce7b367abd20cf87b1b52166918e02264bd5bae0d337d4fa6a7a
-
SSDEEP
393216:rexbl6e6TvVmR/i+W7F/+8HVi5vcPF07zvrRl:rexZp0mRa+W7F/p1i5KF0PrR
Malware Config
Extracted
smokeloader
up3
Extracted
smokeloader
2020
http://host-file-host6.com/
http://host-host-file8.com/
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Glupteba payload 11 IoCs
resource yara_rule behavioral2/memory/3296-209-0x0000000002D30000-0x000000000361B000-memory.dmp family_glupteba behavioral2/memory/3296-210-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3296-235-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4540-341-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/488-354-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3296-453-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4540-473-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/488-476-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4540-540-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3296-563-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/488-566-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
description pid Process procid_target PID 348 created 3264 348 latestX.exe 51 PID 348 created 3264 348 latestX.exe 51 PID 348 created 3264 348 latestX.exe 51 PID 348 created 3264 348 latestX.exe 51 PID 348 created 3264 348 latestX.exe 51 PID 4420 created 3264 4420 updater.exe 51 PID 4420 created 3264 4420 updater.exe 51 PID 4420 created 3264 4420 updater.exe 51 PID 4420 created 3264 4420 updater.exe 51 PID 4420 created 3264 4420 updater.exe 51 PID 4420 created 3264 4420 updater.exe 51 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Random.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\RRePNPVOIf5J4S3T5KoTi5nD.exe = "0" RRePNPVOIf5J4S3T5KoTi5nD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Random.exe = "0" Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\YrpWQ8hS3zHC70jtCtFVHNbD.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts latestX.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Modifies Windows Firewall 1 TTPs 3 IoCs
pid Process 2496 netsh.exe 404 netsh.exe 5028 netsh.exe -
Stops running service(s) 3 TTPs
-
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sZnQBbxWnbm1TsXTKIN4wcL7.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WsslqemjK1tin63FPnNfufRV.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EecAZ6NLQmSQmVjPeQljnl4w.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fionS0u8FXIMlwc52HDfv9gX.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\n6fLrmWhRZk1LkZSPnDRabss.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xoWJrtCZGjrnIaOH09KHfNsN.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eqWyrmNbJazdkiHfhlsjbquW.bat CasPol.exe -
Executes dropped EXE 31 IoCs
pid Process 2392 InstallSetup5.exe 3920 toolspub2.exe 3296 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4544 Random.exe 4436 Broom.exe 348 latestX.exe 2256 toolspub2.exe 4440 6vO7kiaovr3bKEveLKwqVWkW.exe 3796 h29nA186woMosEfeurfG9Ftj.exe 4540 RRePNPVOIf5J4S3T5KoTi5nD.exe 488 YrpWQ8hS3zHC70jtCtFVHNbD.exe 4008 h29nA186woMosEfeurfG9Ftj.tmp 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2708 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2136 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2352 a3AqhnOM26HOLUbeJBrM7Cj8.exe 1808 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2896 YrpWQ8hS3zHC70jtCtFVHNbD.exe 4016 RRePNPVOIf5J4S3T5KoTi5nD.exe 4468 d21cbe21e38b385a41a68c5e6dd32f4c.exe 4420 updater.exe 4100 Assistant_103.0.4928.25_Setup.exe_sfx.exe 3752 assistant_installer.exe 5108 assistant_installer.exe 2304 ifsubgf 3280 csrss.exe 1300 injector.exe 368 windefender.exe 3468 windefender.exe 1636 ifsubgf 1796 f801950a962ddba14caaa44bf084b55c.exe -
Loads dropped DLL 12 IoCs
pid Process 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2708 a3AqhnOM26HOLUbeJBrM7Cj8.exe 4008 h29nA186woMosEfeurfG9Ftj.tmp 4008 h29nA186woMosEfeurfG9Ftj.tmp 4008 h29nA186woMosEfeurfG9Ftj.tmp 2136 a3AqhnOM26HOLUbeJBrM7Cj8.exe 2352 a3AqhnOM26HOLUbeJBrM7Cj8.exe 1808 a3AqhnOM26HOLUbeJBrM7Cj8.exe 3752 assistant_installer.exe 3752 assistant_installer.exe 5108 assistant_installer.exe 5108 assistant_installer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001abce-117.dat upx behavioral2/files/0x000600000001abce-133.dat upx behavioral2/files/0x000600000001abce-131.dat upx behavioral2/memory/4480-153-0x0000000000A10000-0x0000000000F38000-memory.dmp upx behavioral2/memory/2708-159-0x0000000000A10000-0x0000000000F38000-memory.dmp upx behavioral2/memory/2136-187-0x0000000000BF0000-0x0000000001118000-memory.dmp upx behavioral2/memory/2136-184-0x0000000000BF0000-0x0000000001118000-memory.dmp upx behavioral2/files/0x000600000001abce-189.dat upx behavioral2/memory/2352-195-0x0000000000A10000-0x0000000000F38000-memory.dmp upx behavioral2/files/0x000600000001abce-196.dat upx behavioral2/memory/1808-203-0x0000000000A10000-0x0000000000F38000-memory.dmp upx behavioral2/files/0x000600000001abe4-168.dat upx behavioral2/files/0x000600000001abce-163.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\d21cbe21e38b385a41a68c5e6dd32f4c.exe = "0" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\RRePNPVOIf5J4S3T5KoTi5nD.exe = "0" RRePNPVOIf5J4S3T5KoTi5nD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Random.exe = "0" Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\YrpWQ8hS3zHC70jtCtFVHNbD.exe = "0" YrpWQ8hS3zHC70jtCtFVHNbD.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" RRePNPVOIf5J4S3T5KoTi5nD.exe Set value (str) \REGISTRY\USER\S-1-5-21-2852493121-870915337-2715324265-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" YrpWQ8hS3zHC70jtCtFVHNbD.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Random.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Random.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: a3AqhnOM26HOLUbeJBrM7Cj8.exe File opened (read-only) \??\F: a3AqhnOM26HOLUbeJBrM7Cj8.exe File opened (read-only) \??\D: a3AqhnOM26HOLUbeJBrM7Cj8.exe File opened (read-only) \??\F: a3AqhnOM26HOLUbeJBrM7Cj8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache Conhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4544 set thread context of 4712 4544 Random.exe 78 PID 3920 set thread context of 2256 3920 Process not Found 80 PID 4420 set thread context of 4324 4420 updater.exe 185 PID 4420 set thread context of 3568 4420 updater.exe 186 PID 2304 set thread context of 1636 2304 ifsubgf 199 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN RRePNPVOIf5J4S3T5KoTi5nD.exe File opened (read-only) \??\VBoxMiniRdrDN YrpWQ8hS3zHC70jtCtFVHNbD.exe File opened (read-only) \??\VBoxMiniRdrDN d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\GreenTV\is-U5UVV.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files (x86)\Common Files\GreenTV\is-6AQ43.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files (x86)\Common Files\GreenTV\is-J0GL5.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files (x86)\Common Files\GreenTV\is-35QSN.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files (x86)\Common Files\GreenTV\is-G0GMR.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files\Google\Chrome\updater.exe latestX.exe File created C:\Program Files (x86)\Common Files\GreenTV\unins000.dat h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files (x86)\Common Files\GreenTV\is-L3AHT.tmp h29nA186woMosEfeurfG9Ftj.tmp File created C:\Program Files\Google\Libs\WR64.sys updater.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe d21cbe21e38b385a41a68c5e6dd32f4c.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss YrpWQ8hS3zHC70jtCtFVHNbD.exe File opened for modification C:\Windows\rss RRePNPVOIf5J4S3T5KoTi5nD.exe File created C:\Windows\rss\csrss.exe RRePNPVOIf5J4S3T5KoTi5nD.exe File created C:\Windows\rss\csrss.exe YrpWQ8hS3zHC70jtCtFVHNbD.exe File opened for modification C:\Windows\rss d21cbe21e38b385a41a68c5e6dd32f4c.exe -
Launches sc.exe 11 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1300 sc.exe 3456 sc.exe 2704 sc.exe 2372 sc.exe 4520 sc.exe 2144 sc.exe 2100 sc.exe 4500 sc.exe 4112 sc.exe 1760 sc.exe 4456 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifsubgf Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifsubgf Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI ifsubgf -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6vO7kiaovr3bKEveLKwqVWkW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6vO7kiaovr3bKEveLKwqVWkW.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2496 schtasks.exe 1744 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4600 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-571 = "China Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" RRePNPVOIf5J4S3T5KoTi5nD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" RRePNPVOIf5J4S3T5KoTi5nD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2451 = "Saint Pierre Daylight Time" d21cbe21e38b385a41a68c5e6dd32f4c.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2842 = "Saratov Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" RRePNPVOIf5J4S3T5KoTi5nD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-431 = "Iran Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-301 = "Romance Daylight Time" RRePNPVOIf5J4S3T5KoTi5nD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-621 = "Korea Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-351 = "FLE Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1802 = "Line Islands Standard Time" RRePNPVOIf5J4S3T5KoTi5nD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" YrpWQ8hS3zHC70jtCtFVHNbD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT explorer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-372 = "Jerusalem Standard Time" windefender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 a3AqhnOM26HOLUbeJBrM7Cj8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e75490f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e4190000000100000010000000ffac207997bb2cfe865570179ee037b92000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e a3AqhnOM26HOLUbeJBrM7Cj8.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e a3AqhnOM26HOLUbeJBrM7Cj8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1112 powershell.exe 2256 toolspub2.exe 2256 toolspub2.exe 1112 Process not Found 1112 Process not Found 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE 3264 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3264 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2256 toolspub2.exe 1636 ifsubgf -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4712 CasPol.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 3716 powershell.exe Token: SeIncreaseQuotaPrivilege 3716 powershell.exe Token: SeSecurityPrivilege 3716 powershell.exe Token: SeTakeOwnershipPrivilege 3716 powershell.exe Token: SeLoadDriverPrivilege 3716 powershell.exe Token: SeSystemProfilePrivilege 3716 powershell.exe Token: SeSystemtimePrivilege 3716 powershell.exe Token: SeProfSingleProcessPrivilege 3716 powershell.exe Token: SeIncBasePriorityPrivilege 3716 powershell.exe Token: SeCreatePagefilePrivilege 3716 powershell.exe Token: SeBackupPrivilege 3716 powershell.exe Token: SeRestorePrivilege 3716 powershell.exe Token: SeShutdownPrivilege 3716 powershell.exe Token: SeDebugPrivilege 3716 powershell.exe Token: SeSystemEnvironmentPrivilege 3716 powershell.exe Token: SeRemoteShutdownPrivilege 3716 powershell.exe Token: SeUndockPrivilege 3716 powershell.exe Token: SeManageVolumePrivilege 3716 powershell.exe Token: 33 3716 powershell.exe Token: 34 3716 powershell.exe Token: 35 3716 powershell.exe Token: 36 3716 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 3748 powershell.exe Token: SeDebugPrivilege 4992 powershell.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 2988 powershell.exe Token: SeShutdownPrivilege 1476 powercfg.exe Token: SeCreatePagefilePrivilege 1476 powercfg.exe Token: SeShutdownPrivilege 4520 powercfg.exe Token: SeCreatePagefilePrivilege 4520 powercfg.exe Token: SeShutdownPrivilege 4612 powercfg.exe Token: SeCreatePagefilePrivilege 4612 powercfg.exe Token: SeShutdownPrivilege 3940 powercfg.exe Token: SeCreatePagefilePrivilege 3940 powercfg.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 4540 RRePNPVOIf5J4S3T5KoTi5nD.exe Token: SeImpersonatePrivilege 4540 RRePNPVOIf5J4S3T5KoTi5nD.exe Token: SeDebugPrivilege 488 YrpWQ8hS3zHC70jtCtFVHNbD.exe Token: SeImpersonatePrivilege 488 YrpWQ8hS3zHC70jtCtFVHNbD.exe Token: SeShutdownPrivilege 3264 Explorer.EXE Token: SeCreatePagefilePrivilege 3264 Explorer.EXE Token: SeDebugPrivilege 3296 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeImpersonatePrivilege 3296 d21cbe21e38b385a41a68c5e6dd32f4c.exe Token: SeIncreaseQuotaPrivilege 2988 powershell.exe Token: SeSecurityPrivilege 2988 powershell.exe Token: SeTakeOwnershipPrivilege 2988 powershell.exe Token: SeLoadDriverPrivilege 2988 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 Broom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 2392 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 71 PID 4344 wrote to memory of 2392 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 71 PID 4344 wrote to memory of 2392 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 71 PID 4344 wrote to memory of 3920 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 72 PID 4344 wrote to memory of 3920 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 72 PID 4344 wrote to memory of 3920 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 72 PID 4344 wrote to memory of 3296 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 73 PID 4344 wrote to memory of 3296 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 73 PID 4344 wrote to memory of 3296 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 73 PID 4344 wrote to memory of 4544 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 74 PID 4344 wrote to memory of 4544 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 74 PID 4344 wrote to memory of 4544 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 74 PID 2392 wrote to memory of 4436 2392 InstallSetup5.exe 75 PID 2392 wrote to memory of 4436 2392 InstallSetup5.exe 75 PID 2392 wrote to memory of 4436 2392 InstallSetup5.exe 75 PID 4344 wrote to memory of 348 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 76 PID 4344 wrote to memory of 348 4344 02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe 76 PID 4544 wrote to memory of 1112 4544 Random.exe 77 PID 4544 wrote to memory of 1112 4544 Random.exe 77 PID 4544 wrote to memory of 1112 4544 Random.exe 77 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 4544 wrote to memory of 4712 4544 Random.exe 78 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 3920 wrote to memory of 2256 3920 Process not Found 80 PID 4712 wrote to memory of 4440 4712 CasPol.exe 82 PID 4712 wrote to memory of 4440 4712 CasPol.exe 82 PID 4712 wrote to memory of 4440 4712 CasPol.exe 82 PID 4712 wrote to memory of 3796 4712 CasPol.exe 83 PID 4712 wrote to memory of 3796 4712 CasPol.exe 83 PID 4712 wrote to memory of 3796 4712 CasPol.exe 83 PID 4712 wrote to memory of 4540 4712 CasPol.exe 81 PID 4712 wrote to memory of 4540 4712 CasPol.exe 81 PID 4712 wrote to memory of 4540 4712 CasPol.exe 81 PID 4712 wrote to memory of 488 4712 CasPol.exe 84 PID 4712 wrote to memory of 488 4712 CasPol.exe 84 PID 4712 wrote to memory of 488 4712 CasPol.exe 84 PID 3796 wrote to memory of 4008 3796 h29nA186woMosEfeurfG9Ftj.exe 86 PID 3796 wrote to memory of 4008 3796 h29nA186woMosEfeurfG9Ftj.exe 86 PID 3796 wrote to memory of 4008 3796 h29nA186woMosEfeurfG9Ftj.exe 86 PID 4712 wrote to memory of 4480 4712 CasPol.exe 85 PID 4712 wrote to memory of 4480 4712 CasPol.exe 85 PID 4712 wrote to memory of 4480 4712 CasPol.exe 85 PID 4480 wrote to memory of 2708 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 87 PID 4480 wrote to memory of 2708 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 87 PID 4480 wrote to memory of 2708 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 87 PID 4480 wrote to memory of 2136 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 88 PID 4480 wrote to memory of 2136 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 88 PID 4480 wrote to memory of 2136 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 88 PID 4480 wrote to memory of 2352 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 89 PID 4480 wrote to memory of 2352 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 89 PID 4480 wrote to memory of 2352 4480 a3AqhnOM26HOLUbeJBrM7Cj8.exe 89 PID 2352 wrote to memory of 1808 2352 a3AqhnOM26HOLUbeJBrM7Cj8.exe 90 PID 2352 wrote to memory of 1808 2352 a3AqhnOM26HOLUbeJBrM7Cj8.exe 90 PID 2352 wrote to memory of 1808 2352 a3AqhnOM26HOLUbeJBrM7Cj8.exe 90 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Random.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe"C:\Users\Admin\AppData\Local\Temp\02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Broom.exeC:\Users\Admin\AppData\Local\Temp\Broom.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4436
-
-
-
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"3⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2256
-
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3748
-
-
C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3248
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1060
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5028
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
PID:3756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Random.exe"C:\Users\Admin\AppData\Local\Temp\Random.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Random.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"4⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"6⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2972
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"7⤵PID:4112
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes8⤵
- Modifies Windows Firewall
PID:2496
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:3836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3860
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:3280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1304
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F8⤵
- Creates scheduled task(s)
- Modifies data under HKEY_USERS
PID:2496 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV19⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1816
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f8⤵PID:4952
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll8⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F8⤵
- Creates scheduled task(s)
PID:1744
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"8⤵
- Executes dropped EXE
PID:368 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵PID:3364
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)10⤵
- Launches sc.exe
PID:4456
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile8⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exeC:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe8⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "csrss" /f9⤵PID:1112
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn "ScheduledUpdate" /f9⤵PID:1320
-
-
-
-
-
-
C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe"C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe"5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe" & del "C:\ProgramData\*.dll"" & exit6⤵PID:1476
-
C:\Windows\SysWOW64\timeout.exetimeout /t 57⤵
- Delays execution with timeout.exe
PID:4600
-
-
-
-
C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe"C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp"C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp" /SL5="$5022E,2617171,76288,C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4008
-
-
-
C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"6⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1892
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"7⤵PID:4996
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes8⤵
- Modifies Windows Firewall
PID:404
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4824
-
-
-
-
C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe"C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --silent --allusers=05⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exeC:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6e4474f0,0x6e447500,0x6e44750c6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\a3AqhnOM26HOLUbeJBrM7Cj8.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --version6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136
-
-
C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe"C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4480 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231126221806" --session-guid=df08768b-df62-401f-8184-11ff20f8b010 --server-tracking-blob=YmUwYWEzMWZlMWZjNjQ2NjQwZWIyNDJhMGRkZDc5MWI1Y2Q0ZjBlY2JlODZiNzVhODcwODliMGRkYjYzODRiNTp7ImNvdW50cnkiOiJOTCIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcwMTAzNzA4MS4zMDkxIiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI4ZDliZTk2YS00ZGNmLTQ5NzktYjE5Yy01ZWE5ZDhkZGU4OTQifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=54040000000000006⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exeC:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2c4,0x2c8,0x2cc,0x294,0x2d0,0x6d5f74f0,0x6d5f7500,0x6d5f750c7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"6⤵
- Executes dropped EXE
PID:4100
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe" --version6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x248,0x24c,0x250,0x238,0x254,0x1391588,0x1391598,0x13915a47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\latestX.exe"C:\Users\Admin\AppData\Local\Temp\latestX.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in Program Files directory
PID:348
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3188
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2704
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2372
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4112
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4520
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1760
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:4304
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2988
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:1496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4584
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:4648
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2144
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2100
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4500
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1300
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:3456
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3748 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3836
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:2416
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:424
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4056
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:1192
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:896
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:4324
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Modifies data under HKEY_USERS
PID:3568
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
PID:4420
-
C:\Users\Admin\AppData\Roaming\ifsubgfC:\Users\Admin\AppData\Roaming\ifsubgf1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2304 -
C:\Users\Admin\AppData\Roaming\ifsubgfC:\Users\Admin\AppData\Roaming\ifsubgf2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:1636
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
45KB
MD50b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
Filesize
18KB
MD516e723c2c2ab1bc4a17752bf53bd0926
SHA141e2c76be50cdcd25465705ac117ba1571885499
SHA25686e573464c96c03ba2d43834b4c8f221a5e234fabe11373bf946c5ef62507fec
SHA512d49de3977c40fa19369d444a12ca385d4152b845e6ceb33b1fe851e74b244dcaab20b31c1211d52cc57ba9ddfc48166291442643f8ef07a78bcfc653e5844599
-
Filesize
18KB
MD5449266f209ce9b22193537d0595776f0
SHA16bfb370e407e5dd3bf610b6bb1500ac41aeb92ae
SHA2563d088ba546df4fb80a82b4506dcaaaa4955fbe96b217290316768260edd0aa61
SHA5126ef70dedecc09be5f6a2ad87a8a08f6755bfac2d067d00a235271d3208b173dbe76224c6831387accbe7f1a08846e87fb2098e735f8ba67cd021939302ec7e1f
-
Filesize
18KB
MD5168704212dbb5d60b17c0aea74afca7b
SHA1eb6d0d0c44577f2067e94af8bbcfef1a459cfc1d
SHA25697315b3f1a0373160a695e6efd8f92f9302d74d3b1aae919b3137e98e3f97f0f
SHA51266777eb47487f4a1ecbc20d31d227be10ae791d96430b729b76eaebeef652e757ad1ebedb67f1465871ac918b22692088e8d717f08c1dad1d4b2b27d0819f48e
-
Filesize
18KB
MD5168704212dbb5d60b17c0aea74afca7b
SHA1eb6d0d0c44577f2067e94af8bbcfef1a459cfc1d
SHA25697315b3f1a0373160a695e6efd8f92f9302d74d3b1aae919b3137e98e3f97f0f
SHA51266777eb47487f4a1ecbc20d31d227be10ae791d96430b729b76eaebeef652e757ad1ebedb67f1465871ac918b22692088e8d717f08c1dad1d4b2b27d0819f48e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\additional_file0.tmp
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize1.9MB
MD5b0f128c3579e6921cfff620179fb9864
SHA160e19c987a96182206994ffd509d2849fdb427e3
SHA2561c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee
SHA51217977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe
Filesize2.1MB
MD534afbc4605531efdbe6f6ce57f567c0a
SHA16cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b
SHA2560441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019
SHA512577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe
Filesize2.1MB
MD534afbc4605531efdbe6f6ce57f567c0a
SHA16cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b
SHA2560441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019
SHA512577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbgcore.DLL
Filesize166KB
MD55a6cd2117967ec78e7195b6ee10fc4da
SHA172d929eeb50dd58861a1d4cf13902c0b89fadc34
SHA256a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040
SHA51207aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\opera_package
Filesize103.2MB
MD5cd9f0e806df2940eb154570ca58a807c
SHA1d2bdb70ad13344f3813f467c229a50fd8e17632a
SHA25671250e7a474c08ea862cf870a07a9e98fad75acc15a2b1cf34775da27650fc51
SHA5122e132053cc6238aaa9cd05fa8520b89412d27ab85b71bcb00b8d71ed207cd34115f8bcb272b617824dc9907297d034d736042a3a55be566101d4fd3fbf80ac91
-
Filesize
5.3MB
MD500e93456aa5bcf9f60f84b0c0760a212
SHA16096890893116e75bd46fea0b8c3921ceb33f57d
SHA256ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504
SHA512abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca
-
Filesize
2.3MB
MD5cba9c1d1fcbf999d9ccb04050c5c5154
SHA1554e436c9c3f1f16c9a9b7ab74dd4cd191118481
SHA256c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842
SHA512c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b
-
Filesize
2.3MB
MD5cba9c1d1fcbf999d9ccb04050c5c5154
SHA1554e436c9c3f1f16c9a9b7ab74dd4cd191118481
SHA256c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842
SHA512c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
2.5MB
MD5af49996cdbe1e9d9ca66458a06725a94
SHA1a6bd1c6a78483ba1b7ee3cb9670568684039501d
SHA256a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73
SHA512c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b
-
Filesize
2.5MB
MD5af49996cdbe1e9d9ca66458a06725a94
SHA1a6bd1c6a78483ba1b7ee3cb9670568684039501d
SHA256a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73
SHA512c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
4.2MB
MD5949ec0b69598677e2a1413d267e96c29
SHA1bf67d63774bb568441bdd3357d9af1c8a36c8912
SHA256e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67
SHA5124e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e
-
Filesize
683KB
MD5f507ce43ea08d1721816ad4b0e090f50
SHA1e4f02bcd410bddabea4c741838d9a88386547629
SHA256d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1
SHA51237b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693
-
Filesize
683KB
MD5f507ce43ea08d1721816ad4b0e090f50
SHA1e4f02bcd410bddabea4c741838d9a88386547629
SHA256d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1
SHA51237b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
5.6MB
MD5bae29e49e8190bfbbf0d77ffab8de59d
SHA14a6352bb47c7e1666a60c76f9b17ca4707872bd9
SHA256f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87
SHA5129e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2
-
Filesize
282KB
MD58ef35a51d9b58606554128b7556ceac2
SHA17db9caaa38f1d8bbf36c200e8f721e8e2569cf30
SHA256b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e
SHA51292be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24
-
Filesize
282KB
MD58ef35a51d9b58606554128b7556ceac2
SHA17db9caaa38f1d8bbf36c200e8f721e8e2569cf30
SHA256b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e
SHA51292be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24
-
Filesize
282KB
MD58ef35a51d9b58606554128b7556ceac2
SHA17db9caaa38f1d8bbf36c200e8f721e8e2569cf30
SHA256b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e
SHA51292be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24
-
Filesize
40B
MD5d25f8480ada2fc81e48d59b71bf8e7de
SHA1a6eaac9324e9dce81256de68b8b61b5586064153
SHA256e997fd937032a0b3257b109c7bebbed108937c27acf1765eb1ee1f3ff0be02ba
SHA5128a0f2076f551a5869b5c5d4b8bd1f1947f23f33afc438d1d8ee7f808aedf85ea3179a9a47335e50bc7a73c8a55b9263adbbe988133ae590d4d35ae4b183cd7b4
-
Filesize
40B
MD5d25f8480ada2fc81e48d59b71bf8e7de
SHA1a6eaac9324e9dce81256de68b8b61b5586064153
SHA256e997fd937032a0b3257b109c7bebbed108937c27acf1765eb1ee1f3ff0be02ba
SHA5128a0f2076f551a5869b5c5d4b8bd1f1947f23f33afc438d1d8ee7f808aedf85ea3179a9a47335e50bc7a73c8a55b9263adbbe988133ae590d4d35ae4b183cd7b4
-
Filesize
282KB
MD58ef35a51d9b58606554128b7556ceac2
SHA17db9caaa38f1d8bbf36c200e8f721e8e2569cf30
SHA256b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e
SHA51292be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24
-
Filesize
290KB
MD55ef1c4d78151913e0cc7d4db32fdef12
SHA17f22e2efdfa01f627338cf3c6b670a9394de92c9
SHA256dc5f3430011d616ed9ea604d20ced24bedde9e07ed3922cafe80010100e2950a
SHA5128464d95da53d085b5d51e01c036627d4ad082b7b183531481425754a6f13ee1515cdd7e223bdf3ca78b31dcc2d49fee63105b55db5997f58c8896b46ddd7eda8
-
Filesize
290KB
MD55ef1c4d78151913e0cc7d4db32fdef12
SHA17f22e2efdfa01f627338cf3c6b670a9394de92c9
SHA256dc5f3430011d616ed9ea604d20ced24bedde9e07ed3922cafe80010100e2950a
SHA5128464d95da53d085b5d51e01c036627d4ad082b7b183531481425754a6f13ee1515cdd7e223bdf3ca78b31dcc2d49fee63105b55db5997f58c8896b46ddd7eda8
-
Filesize
212B
MD5963da09532e9758adedf9745c76ec700
SHA1bc976476358cffdbc3f22b6e491f94ccbf15308d
SHA2568720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2
SHA5122da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6
-
Filesize
4.2MB
MD5d373ff7cb6ac28b844d9c90fc8f1ab3f
SHA18bd2bd07e929d71f5c27ba7fab3777f29a4c48e3
SHA25692a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b
SHA512f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1
-
Filesize
4.2MB
MD5d373ff7cb6ac28b844d9c90fc8f1ab3f
SHA18bd2bd07e929d71f5c27ba7fab3777f29a4c48e3
SHA25692a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b
SHA512f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1
-
Filesize
4.2MB
MD5d373ff7cb6ac28b844d9c90fc8f1ab3f
SHA18bd2bd07e929d71f5c27ba7fab3777f29a4c48e3
SHA25692a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b
SHA512f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1
-
Filesize
4.2MB
MD53029e2e226e0e0310a14943d2e8f0f8a
SHA12ed83097fe1ea84d5ff91a924d6b8a7df2a111d6
SHA256c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253
SHA5126a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a
-
Filesize
4.2MB
MD53029e2e226e0e0310a14943d2e8f0f8a
SHA12ed83097fe1ea84d5ff91a924d6b8a7df2a111d6
SHA256c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253
SHA5126a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a
-
Filesize
4.2MB
MD53029e2e226e0e0310a14943d2e8f0f8a
SHA12ed83097fe1ea84d5ff91a924d6b8a7df2a111d6
SHA256c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253
SHA5126a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.8MB
MD5809c1dfaec2149a559cc83b3d8d1b74e
SHA15520ba8358fb2ad7c2629ee600733a15e02a3300
SHA256779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f
SHA51276428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e
-
Filesize
2.7MB
MD5e81ee4792eee2ea85554722b63381302
SHA143313d0be3cad4657bb0ae3d7c707974f1226a8f
SHA256f20b85b7199ae6ab6b628cdca3d2cf7ed229cef691dae18be2569a5cbb182f4f
SHA512bd0c86976ddde3c9e101e083cd9a0a326e868ad3dac133ab0d88baccb4505346b3b8da5abd98fc69cdc505a8762b3f84a8c03404d0c76a206ec2a0beff83c063
-
Filesize
2.7MB
MD5e81ee4792eee2ea85554722b63381302
SHA143313d0be3cad4657bb0ae3d7c707974f1226a8f
SHA256f20b85b7199ae6ab6b628cdca3d2cf7ed229cef691dae18be2569a5cbb182f4f
SHA512bd0c86976ddde3c9e101e083cd9a0a326e868ad3dac133ab0d88baccb4505346b3b8da5abd98fc69cdc505a8762b3f84a8c03404d0c76a206ec2a0beff83c063
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize38KB
MD5eb437e79fad240e0bd8687a2436efffa
SHA1e1bb1a1dfc2d71bed406290c45ae8f18d7bd184d
SHA2562bc5b5261e9c87e26d6d571fd6e5766f406b7db30484cfc462591693072562cf
SHA5128720d41012df133f6f93a9bab5ae4ee4023eaf81194b2de569213a1924a561c5d23816e921258101b7f70e9e61a8ad2a3959a179d4a6ef1f27a8ba1e6469b69f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD56577e96059b4b4d765b35bf8999424a1
SHA1e6524db7aa33baedaeb84a6d071aad9eac901bb7
SHA2562c750f19c51e9af2db338ddaf365ad47f16d69462df3ab3153e8844d725921e2
SHA5125d2742e479dd4b080dc9e8edeae5498232a6a8f6abcf423e8bdec04eed2330b1291b2846ce4f39c99b1c715895bdb75201aa313818230405cb9226faad2f9141
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57600dc25724649eafbdeaafb26f8f7f5
SHA19b36c29da759eb022a8d3b660d537f258a83d42c
SHA25687fac16d32435e1c7216f9bb11ec2f8fdcded8d2edc3d5671d0adf68f2be956e
SHA512e70a87d6c4668403ab6f21ca6d1e5bc6e95bdc0c1027e708c3563dbf0c456e89808acaa79610602b9661fb78d27e341b030ad5b8910cbc14a61b4963a52ab8ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD57600dc25724649eafbdeaafb26f8f7f5
SHA19b36c29da759eb022a8d3b660d537f258a83d42c
SHA25687fac16d32435e1c7216f9bb11ec2f8fdcded8d2edc3d5671d0adf68f2be956e
SHA512e70a87d6c4668403ab6f21ca6d1e5bc6e95bdc0c1027e708c3563dbf0c456e89808acaa79610602b9661fb78d27e341b030ad5b8910cbc14a61b4963a52ab8ce
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5bb25563173f06945166c997d54aee570
SHA1165110a8c3f2d2a14c0c091feb2b21117c8fa07d
SHA256e64cac055fa884210390d6965504a9e994012605c1df50707dc964f12d8af047
SHA51246d14d3a7d7d26ffbefb6b8e077ddd509a64e6ed9f55ba3d8e857716fabebf02339103888c0af92fb1ad223e583c85557812802098315500a3f8bea43a7403e1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b2e65781f8e5007a2b4f8be4c10a9753
SHA136bfa771768207e172f07b33f757394f5c1c2303
SHA25698f3cdc826bef9f49ac3bdbb5278bd29bf7dc9c8bac2afcfa92c61b78b92393f
SHA5125e9b13fd542bb62c6ce1a2213d9746c59f8170950f54fa5e61c13b87c4db207df1b95f102ac4d5ef1dab29d3095d3f3f76825ddc86213af24cac95fb6a2350bd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b2e65781f8e5007a2b4f8be4c10a9753
SHA136bfa771768207e172f07b33f757394f5c1c2303
SHA25698f3cdc826bef9f49ac3bdbb5278bd29bf7dc9c8bac2afcfa92c61b78b92393f
SHA5125e9b13fd542bb62c6ce1a2213d9746c59f8170950f54fa5e61c13b87c4db207df1b95f102ac4d5ef1dab29d3095d3f3f76825ddc86213af24cac95fb6a2350bd
-
Filesize
4.2MB
MD5d373ff7cb6ac28b844d9c90fc8f1ab3f
SHA18bd2bd07e929d71f5c27ba7fab3777f29a4c48e3
SHA25692a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b
SHA512f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbgcore.dll
Filesize166KB
MD55a6cd2117967ec78e7195b6ee10fc4da
SHA172d929eeb50dd58861a1d4cf13902c0b89fadc34
SHA256a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040
SHA51207aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbghelp.dll
Filesize1.7MB
MD5861a07bcf2a5cb0dda1aaf6dfcb57b26
SHA1a0bdbbc398583a7cfdd88624c9ac2da1764e0826
SHA2567878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc
SHA512062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
4.6MB
MD521b50971a7fddce167df551192f3f5bd
SHA183b5148b53da8965eb0292129c5f224cc6bd0261
SHA25674e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d
SHA512f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
32KB
MD5b6f11a0ab7715f570f45900a1fe84732
SHA177b1201e535445af5ea94c1b03c0a1c34d67a77b
SHA256e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67
SHA51278a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771
-
Filesize
32KB
MD5b6f11a0ab7715f570f45900a1fe84732
SHA177b1201e535445af5ea94c1b03c0a1c34d67a77b
SHA256e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67
SHA51278a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771