Analysis
-
max time kernel
299s -
max time network
290s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
18-12-2023 05:04
Static task
static1
Behavioral task
behavioral1
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win7-20231129-en
General
-
Target
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
-
Size
735KB
-
MD5
9f5cb3a9a4053a53063a9da9afbf6273
-
SHA1
b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e
-
SHA256
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1
-
SHA512
aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26
-
SSDEEP
12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA
Malware Config
Signatures
-
Glupteba payload 12 IoCs
resource yara_rule behavioral2/memory/4952-320-0x0000000002E80000-0x000000000376B000-memory.dmp family_glupteba behavioral2/memory/4952-324-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2612-332-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-527-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-637-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2612-640-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2612-644-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-935-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2612-1139-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-1142-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-1146-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/780-1711-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3844 created 2928 3844 AppLaunch.exe 50 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\ooONNWe6jrlcIAP7yeX6DnG4.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\Pn3iCES8F1vHMyJ4LSsac95X.exe = "0" Pn3iCES8F1vHMyJ4LSsac95X.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 4752 netsh.exe 4340 netsh.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lL4jqgTAiTzgkdO0WRQpjPKX.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\njgIxrw6QYqj811bxEfRo8FE.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zKgLXw7KcyiQD5HNpg8znBfV.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IbO3M5gXelxUGLv20L5naDyO.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jK9VNrqnP98Bwvr73fZhm3gm.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\neOXbRjyIuRIaBfj0gvYFtPr.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RZk9tUWqIeN1ao8oPijBXXbH.bat AddInProcess32.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Yo0FoAoPsfuB7R0Gw1JtEEcX.bat AddInProcess32.exe -
Executes dropped EXE 20 IoCs
pid Process 1424 aFCDwXGyWkLav915TOcODm7S.exe 2804 aFCDwXGyWkLav915TOcODm7S.tmp 2660 Conhost.exe 4952 csrss.exe 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 2428 cB5PL1P9sAZgyvnqJabdlfvg.exe 4008 svchost.exe 3220 cB5PL1P9sAZgyvnqJabdlfvg.exe 1524 cB5PL1P9sAZgyvnqJabdlfvg.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 2456 Assistant_103.0.4928.25_Setup.exe_sfx.exe 4200 assistant_installer.exe 1416 assistant_installer.exe 4952 csrss.exe 1968 injector.exe 2160 windefender.exe 2560 windefender.exe -
Loads dropped DLL 16 IoCs
pid Process 2804 aFCDwXGyWkLav915TOcODm7S.tmp 2804 aFCDwXGyWkLav915TOcODm7S.tmp 2804 aFCDwXGyWkLav915TOcODm7S.tmp 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 2428 cB5PL1P9sAZgyvnqJabdlfvg.exe 4008 svchost.exe 3220 cB5PL1P9sAZgyvnqJabdlfvg.exe 1524 cB5PL1P9sAZgyvnqJabdlfvg.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 2544 Process not Found 4200 assistant_installer.exe 4200 assistant_installer.exe 1416 assistant_installer.exe 1416 assistant_installer.exe 1128 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe -
resource yara_rule behavioral2/memory/2428-342-0x0000000000040000-0x0000000000568000-memory.dmp upx behavioral2/files/0x000600000001ac6c-347.dat upx behavioral2/files/0x000600000001ac7b-351.dat upx behavioral2/files/0x000600000001ac6c-362.dat upx behavioral2/memory/1524-380-0x0000000000040000-0x0000000000568000-memory.dmp upx behavioral2/files/0x000600000001ac6c-372.dat upx behavioral2/memory/3220-368-0x0000000000040000-0x0000000000568000-memory.dmp upx behavioral2/memory/4008-358-0x0000000000940000-0x0000000000E68000-memory.dmp upx behavioral2/memory/1756-338-0x0000000000040000-0x0000000000568000-memory.dmp upx behavioral2/files/0x000600000001ac6c-335.dat upx behavioral2/files/0x000600000001ac6c-331.dat upx behavioral2/files/0x000600000001ac6c-322.dat upx behavioral2/files/0x000c000000019f21-2244.dat upx behavioral2/files/0x000c000000019f21-2242.dat upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\ooONNWe6jrlcIAP7yeX6DnG4.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\Pn3iCES8F1vHMyJ4LSsac95X.exe = "0" Pn3iCES8F1vHMyJ4LSsac95X.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" ooONNWe6jrlcIAP7yeX6DnG4.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" Pn3iCES8F1vHMyJ4LSsac95X.exe Set value (str) \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: cB5PL1P9sAZgyvnqJabdlfvg.exe File opened (read-only) \??\D: cB5PL1P9sAZgyvnqJabdlfvg.exe File opened (read-only) \??\F: cB5PL1P9sAZgyvnqJabdlfvg.exe File opened (read-only) \??\D: cB5PL1P9sAZgyvnqJabdlfvg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 11 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache Conhost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive schtasks.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log Conhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2808 set thread context of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2660 set thread context of 3844 2660 Conhost.exe 107 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN Pn3iCES8F1vHMyJ4LSsac95X.exe File opened (read-only) \??\VBoxMiniRdrDN ooONNWe6jrlcIAP7yeX6DnG4.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\ClocX\Presets\romanold\romanoldmin.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BigBen.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Omega.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Hungarian.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Srpski.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Thai.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BlueAppleClock.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Neon.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-09KUI.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\ClocX.exe kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\MilkClock.bmp kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\klokjehour.hpng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Deutsch.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Indonesian.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\alarme.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\bahnhofsuhr.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Octopye2.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-FPJ54.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-RGEGM.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Presets\Comdex - Omega1.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Naranja.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\White_Apple_Clock.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\cowboy2.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-LTCPJ.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Lang\Italiano.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Slovak.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\GroenneKugler.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\iToolsClock.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\roman2\roman2minute.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-M96JL.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Lang\Arabic.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Bahnhofsuhr.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BlackAppleClock.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\DarkCrystalBall.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\360\360Safe\deepscan\speedmem2.hg kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Traditional_Chinese.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BlueBallStd.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Casio.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\GroenneKugler.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Kirchenuhr.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Danish.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Nederlands.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BlackAppleClock.bmp kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\JaguarClock.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\MClkhrHand.hpng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\earth2.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-6JRQ2.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-C4MJ8.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-00DB3.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\stuff\is-EPK3Q.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Presets\apple.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\iToolsClock2.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-C4DE7.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-TLULO.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Lang\Russian.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BaiWeather.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\MPhoneSTD\unins000.dat aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\MPhoneSTD\bin\x86\is-6DNMR.tmp aFCDwXGyWkLav915TOcODm7S.tmp File created C:\Program Files (x86)\ClocX\Presets\WidestoneStudios.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\roman2\roman2hour.png kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Lang\Polish.lng kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\BlueBallRoman.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\Uhr.ini kvZwrLd1jSuivEhTuKYLYPsM.exe File created C:\Program Files (x86)\ClocX\Presets\UniversalAccessClock.bmp kvZwrLd1jSuivEhTuKYLYPsM.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\servicing\Editions\Search.dll kvZwrLd1jSuivEhTuKYLYPsM.exe File opened for modification C:\Windows\rss ooONNWe6jrlcIAP7yeX6DnG4.exe File created C:\Windows\rss\csrss.exe ooONNWe6jrlcIAP7yeX6DnG4.exe File opened for modification C:\Windows\rss Pn3iCES8F1vHMyJ4LSsac95X.exe File created C:\Windows\rss\csrss.exe Pn3iCES8F1vHMyJ4LSsac95X.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4828 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4636 3844 WerFault.exe 107 192 3844 WerFault.exe 107 -
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x000600000001ac90-661.dat nsis_installer_1 behavioral2/files/0x000600000001ac90-661.dat nsis_installer_2 behavioral2/files/0x000600000001ac90-667.dat nsis_installer_1 behavioral2/files/0x000600000001ac90-667.dat nsis_installer_2 behavioral2/files/0x000600000001ad85-1496.dat nsis_installer_1 behavioral2/files/0x000600000001ad85-1496.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 932 schtasks.exe 1116 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2631 = "Norfolk Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1971 = "Belarus Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-452 = "Caucasus Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1661 = "Bahia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-501 = "Nepal Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1501 = "Turkey Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-192 = "Mountain Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-385 = "Namibia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-381 = "South Africa Daylight Time" ooONNWe6jrlcIAP7yeX6DnG4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" windefender.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950} kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx\ = "{2EE37996-B00D-BD4C-7594-D295464D2950}" kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950} kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950} kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\ShellEx\{e357fccd-a995-4576-b01f-234630154e96} kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\CopyHookHandlers\FileSystemEx kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950} kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ = "C:\\Windows\\servicing\\Editions\\Search.dll" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32\ThreadingModel = "Apartment" kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{1FE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\USER\S-1-5-21-167039816-2868247564-2551780377-1000_Classes\CLSID\{2EE37996-B00D-BD4C-7594-D295464D2950} kvZwrLd1jSuivEhTuKYLYPsM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1AE37996-B00D-BD4C-7594-D295464D2950}\InProcServer32 kvZwrLd1jSuivEhTuKYLYPsM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\{e357fccd-a995-4576-b01f-234630154e96}\ = "{1AE37996-B00D-BD4C-7594-D295464D2950}" kvZwrLd1jSuivEhTuKYLYPsM.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 cB5PL1P9sAZgyvnqJabdlfvg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 cB5PL1P9sAZgyvnqJabdlfvg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e19962000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e cB5PL1P9sAZgyvnqJabdlfvg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 190000000100000010000000ffac207997bb2cfe865570179ee037b90f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e404000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e cB5PL1P9sAZgyvnqJabdlfvg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 cB5PL1P9sAZgyvnqJabdlfvg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 3032 powershell.exe 3032 powershell.exe 3032 powershell.exe 3232 powershell.exe 3232 powershell.exe 3232 powershell.exe 3568 powershell.exe 3568 powershell.exe 3568 powershell.exe 3232 powershell.exe 3568 powershell.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 1888 kvZwrLd1jSuivEhTuKYLYPsM.exe 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 4952 csrss.exe 4952 csrss.exe 2880 Conhost.exe 2880 Conhost.exe 2880 Conhost.exe 828 powershell.exe 828 powershell.exe 2880 Conhost.exe 828 powershell.exe 828 powershell.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 1672 powershell.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 3844 AppLaunch.exe 3844 AppLaunch.exe 1808 Conhost.exe 1808 Conhost.exe 1808 Conhost.exe 1808 Conhost.exe 932 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Token: SeDebugPrivilege 3704 AddInProcess32.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 3232 powershell.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeDebugPrivilege 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe Token: SeImpersonatePrivilege 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe Token: SeDebugPrivilege 4952 csrss.exe Token: SeImpersonatePrivilege 4952 csrss.exe Token: SeDebugPrivilege 2880 Conhost.exe Token: SeDebugPrivilege 828 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 932 schtasks.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 236 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeDebugPrivilege 4408 powershell.exe Token: SeDebugPrivilege 3888 powershell.exe Token: SeSystemEnvironmentPrivilege 4952 csrss.exe Token: SeSecurityPrivilege 4828 sc.exe Token: SeSecurityPrivilege 4828 sc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 aFCDwXGyWkLav915TOcODm7S.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3032 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 21 PID 2808 wrote to memory of 3032 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 21 PID 2808 wrote to memory of 3032 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 21 PID 2808 wrote to memory of 4156 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 20 PID 2808 wrote to memory of 4156 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 20 PID 2808 wrote to memory of 4156 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 20 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 2808 wrote to memory of 3704 2808 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 19 PID 3704 wrote to memory of 1424 3704 AddInProcess32.exe 30 PID 3704 wrote to memory of 1424 3704 AddInProcess32.exe 30 PID 3704 wrote to memory of 1424 3704 AddInProcess32.exe 30 PID 1424 wrote to memory of 2804 1424 aFCDwXGyWkLav915TOcODm7S.exe 32 PID 1424 wrote to memory of 2804 1424 aFCDwXGyWkLav915TOcODm7S.exe 32 PID 1424 wrote to memory of 2804 1424 aFCDwXGyWkLav915TOcODm7S.exe 32 PID 3704 wrote to memory of 2660 3704 AddInProcess32.exe 110 PID 3704 wrote to memory of 2660 3704 AddInProcess32.exe 110 PID 3704 wrote to memory of 2660 3704 AddInProcess32.exe 110 PID 3704 wrote to memory of 4952 3704 AddInProcess32.exe 123 PID 3704 wrote to memory of 4952 3704 AddInProcess32.exe 123 PID 3704 wrote to memory of 4952 3704 AddInProcess32.exe 123 PID 3704 wrote to memory of 2612 3704 AddInProcess32.exe 35 PID 3704 wrote to memory of 2612 3704 AddInProcess32.exe 35 PID 3704 wrote to memory of 2612 3704 AddInProcess32.exe 35 PID 3704 wrote to memory of 1756 3704 AddInProcess32.exe 44 PID 3704 wrote to memory of 1756 3704 AddInProcess32.exe 44 PID 3704 wrote to memory of 1756 3704 AddInProcess32.exe 44 PID 1756 wrote to memory of 2428 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 45 PID 1756 wrote to memory of 2428 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 45 PID 1756 wrote to memory of 2428 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 45 PID 1756 wrote to memory of 4008 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 94 PID 1756 wrote to memory of 4008 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 94 PID 1756 wrote to memory of 4008 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 94 PID 1756 wrote to memory of 3220 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 47 PID 1756 wrote to memory of 3220 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 47 PID 1756 wrote to memory of 3220 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 47 PID 3220 wrote to memory of 1524 3220 cB5PL1P9sAZgyvnqJabdlfvg.exe 46 PID 3220 wrote to memory of 1524 3220 cB5PL1P9sAZgyvnqJabdlfvg.exe 46 PID 3220 wrote to memory of 1524 3220 cB5PL1P9sAZgyvnqJabdlfvg.exe 46 PID 2612 wrote to memory of 3232 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 78 PID 2612 wrote to memory of 3232 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 78 PID 2612 wrote to memory of 3232 2612 ooONNWe6jrlcIAP7yeX6DnG4.exe 78 PID 4952 wrote to memory of 3568 4952 csrss.exe 77 PID 4952 wrote to memory of 3568 4952 csrss.exe 77 PID 4952 wrote to memory of 3568 4952 csrss.exe 77 PID 3704 wrote to memory of 1888 3704 AddInProcess32.exe 92 PID 3704 wrote to memory of 1888 3704 AddInProcess32.exe 92 PID 3704 wrote to memory of 1888 3704 AddInProcess32.exe 92 PID 3532 wrote to memory of 2880 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 127 PID 3532 wrote to memory of 2880 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 127 PID 3532 wrote to memory of 2880 3532 ooONNWe6jrlcIAP7yeX6DnG4.exe 127 PID 780 wrote to memory of 828 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 101 PID 780 wrote to memory of 828 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 101 PID 780 wrote to memory of 828 780 Pn3iCES8F1vHMyJ4LSsac95X.exe 101 PID 1756 wrote to memory of 2456 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 102 PID 1756 wrote to memory of 2456 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 102 PID 1756 wrote to memory of 2456 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 102 PID 1756 wrote to memory of 4200 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 103 PID 1756 wrote to memory of 4200 1756 cB5PL1P9sAZgyvnqJabdlfvg.exe 103 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe"C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp"C:\Users\Admin\AppData\Local\Temp\is-EPINS.tmp\aFCDwXGyWkLav915TOcODm7S.tmp" /SL5="$10005A,6584009,54272,C:\Users\Admin\Pictures\aFCDwXGyWkLav915TOcODm7S.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:2804
-
-
-
C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe"C:\Users\Admin\Pictures\YkW27vsecDcyiXOWxGA4Vrb1.exe"3⤵PID:2660
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 5165⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 5325⤵
- Program crash
PID:192
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:1672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2660
-
-
-
-
C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"3⤵PID:4952
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"C:\Users\Admin\Pictures\Pn3iCES8F1vHMyJ4LSsac95X.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3824
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4752
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:236
-
-
-
-
C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"C:\Users\Admin\Pictures\ooONNWe6jrlcIAP7yeX6DnG4.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2880
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4380
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4340
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:932
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:3332
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Drops file in System32 directory
- Creates scheduled task(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:1968
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1116
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2160
-
-
-
-
-
C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe"C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exeC:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2bc,0x2c0,0x2c4,0x298,0x2c8,0x6e317518,0x6e317528,0x6e3175344⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428
-
-
C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe"C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1756 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231218050505" --session-guid=0e1cf6ce-1680-452b-98d6-a59dce814e00 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=58040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cB5PL1P9sAZgyvnqJabdlfvg.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\cB5PL1P9sAZgyvnqJabdlfvg.exe" --version4⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x248,0x24c,0x250,0x11c,0x258,0x501588,0x501598,0x5015a45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1416
-
-
-
-
C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe"C:\Users\Admin\Pictures\kvZwrLd1jSuivEhTuKYLYPsM.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵PID:4156
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exeC:\Users\Admin\Pictures\cB5PL1P9sAZgyvnqJabdlfvg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2b4,0x2b8,0x2c8,0x290,0x2cc,0x6d637518,0x6d637528,0x6d6375341⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524
-
c:\windows\system32\sihost.exesihost.exe1⤵PID:2928
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:1808
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2560
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD526ed02c53c9aea71002b6370e79606ed
SHA1f20f691e855c32d94558fc03faef677dbbd1417e
SHA2564daa1ba1df72179a094f039835c3d0c9b246bf70807dfb3c0ba514e6da2795a7
SHA512b25d761d9e18fb973dfa9e608e2d44ab5046c3e978a7540ea673575a2d7db90906db8c2c5f93dcbdc5a38b02eca48e1f33d9a2ef48003dbbf4619d6f11e24bbe
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
19KB
MD5d17d743f063477dbce463168a596154f
SHA1470a2a556d3b90f1d54e4f81c588893b3d6df614
SHA256eea580bb6dcd90fd8afaeaf9f726dc29221d38b3f8186171704769ce4329fa8a
SHA5126bc0f03fa59c57db77f9c99c1c5501476f802a1ab4056cc9d0348c7cfb725ec9dff4ad29900412f2e77ca1e727741c19bed4f32ad9d9d8ab86436b7c22a34942
-
Filesize
10KB
MD5bd84419891bd8bb6cf4223a142819429
SHA1eebcbde45d2f1aa0db104deeac7d9e23ade7e0f4
SHA256ffb2618d57436d2d4b1fae98a52df59575014e52cf55b8de6853f948634e1731
SHA512207fe89d00f40c424881e109606810f07bae35674349a68bc420b3cf424661f815b8b0844f48ce0cbf27385801f071c6cbe98a2f6de1efd63fd506f2b5a50da5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\additional_file0.tmp
Filesize63KB
MD5d76e7d42b4e144a791142a13a2aa6265
SHA17f26cf7acff0fe688fd291eec3d8c6f742d41293
SHA256426e3a53165b37104ee8a4aac86d6909e079b68322967d275553800252f2a52b
SHA5122c93ab20d16f6b1d20b0f2712f7b1f57518f995ac57e2c9c7e38dca09f1b8ad01a441e0ec35214b27092a7b3fa4c1ab31c6959cf8d6cfeca2d980469f228f9c0
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize42KB
MD515dc8b8d2e03222ee0425ad3472bbb58
SHA1d98050b1ece9912797eb893a060ce616d6b2e0eb
SHA25659be298d19c05ddb3a9020555ea67360e1c6b92397c965eb01b11ee9ec3212c8
SHA51232e8c121f43a863f8929b7e1ddcdb98b3f6d756c56b0c674747c9944984a2a6e2dd8e0ebe46a914c6ad3d82db86e7f3ff7a786848d8ba0ca3716475af67ff24b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
Filesize68KB
MD572feaec13ff24263517588860dfb48d9
SHA11a6ddfc6f40b4216aaa56b470c6b42306c24535c
SHA256cf2a8e9a27e663156366083f6b53b644b24a8c547f7b3ae6643beb45e6f55f57
SHA512100636d581aa606597e28c5fe71a8647b62914ad01408be9ac4f0e7c1941b01fa0bf54a9f47eecc91daed14ddf3adad03575ae696eb05098d01c39f762ee9fb1
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe
Filesize94KB
MD5162cba9910401be300632c7494e2d022
SHA1c71bfbe3da6a188806c1b955fea8e70ade74ada0
SHA256b027416d74fb1f07859ee1dad55cf9e3004e09525e94ce25ad5dbbd494d8e98d
SHA51215a0ae3ba8712471fd320e74c071118337bdbeb081bdf7d56b26dec2a5751a3ba4a907ee711ec16f434041c0ce1e1ae22c666d25f9374c0a12bcd4414e8d2645
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\assistant_installer.exe
Filesize20KB
MD51ebee8fe81de15e50ecf8f845e5a6fe0
SHA14b530145a1fc66740b9e8949ce1e5559258caacf
SHA25674f86230266a9cd0df2fae49591c66c33479453ad0eda9a023530bcb533830c0
SHA51249aaf3279ff9a3bc5e79cd356c8b85fa19595b9fd6c3722ada8170e371461b26479e61a6371ec455c4a0a781b90f90ad0569ac408e24fda616840427808b067f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.DLL
Filesize130KB
MD5eab95512328d7880651ce6602ddfe474
SHA1083e1ea8a362c35ddcf16017dea33e6248b2358a
SHA2569cfeeb7bc8b401c8ed7329f7f131d29269c7dd6507d30a0621ec1ba66e855256
SHA51298eec95d20e478b2a7fc196cc66c0c35db910c29ecf287a5806d6e2d9f8537f08a1d70d7135dd2bb58467e681b7edf13999f527677276dd05f6d2bc85aa5ac02
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll
Filesize68KB
MD5358b924bd93f2503f718a6c781f767b9
SHA1adb3c7c007e3632914caae9a30d951180d6b7b7b
SHA256f91b4d2d8b0510cbb926b8d589e55478669a5e3c2b5881aa2ece8693f3daec9b
SHA5129a7c42f5f121e00cb404c66aa80b10286ae2fa6853b567c330fe64450a36aa6b8efc535c5e17e5115de8529c90e88c9a68d79e0f6a41e130d00450e6f7fb0e7b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\opera_package
Filesize103KB
MD5f9dcd3966165b871e3aeb7d8f7c148fa
SHA17611c26c7b29733f91c756eb49dcf45d9d1ce7f5
SHA256a6185972857cee7f850b97877bf7ab78f49a75c4b123b4d9c509b3c636c7a8be
SHA5121fdaf81a85ca14d80b5372226903b5566140cca13e657c07c9f7b32f0fac4abb3fa3852f8adb3c6e938b501c6ef39c830488e6b98e7495f8d8248c64424b79b5
-
Filesize
71KB
MD527d611a750255c3841199aeaca9adfc5
SHA1b464ed63dc2eddba46d3933e3222cd4988fff86a
SHA256be2a0f7d8991abf9c948b9f89610cdd72f2363a43f9785c3df80fe4033ea540c
SHA512fd2fc04f9a3e287d74e973970f845face2b8c60fb54b677a79edfb1e676f91dcd87dd380e1ad24118c262143e45fe8726d2a1341a8b9fa7c85a545f58cba19d6
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1KB
MD5354e9fef8093169ab558b3f20c4bf81a
SHA1b2293505f7519daa90aecd20a1e3b236f74be983
SHA256ef8aab456cd4812c46735b308aa6e30d679289b8f2859c0afd0e9118c180f7a5
SHA5129c26b8026958b65233a568675bd0eb4ca589289200fd198eb15f574bf69273212eff684011bfb048a3af659fdf7395871e1b6666e36e83b471f67335d5ba5b27
-
Filesize
22KB
MD5a98985a020141162b4459fbbc72aedf2
SHA1842406cbcc2a39c0786c83e851af955447c46a4b
SHA256bba612af01e22477267509ecaedef1779dac3b9a6a8c3a10d39f47525de694ad
SHA512a28b18151f26e7348319de0fa5233cd244b3c7c9a0edb11a8f72c1ce0393547c1579afeecd3a897d15f357689143fa2c42afc1e38f6de6a270a9a22ab91148fb
-
Filesize
36KB
MD5698f31949199e67070505364e2359dae
SHA1c090670972072ae39dbaf21fed19fd4bd008b734
SHA25691049e640dfb16a9f39ea812eb1207ce62e7aebee7f56aebe97703a4fabe2003
SHA5126f1aa5d763d37526d6af27eb282d54c9dbe6805a8e06f418913aabb1879ea36132d07871463f622739ff028dd33a82997b9707b532f4036c8b610a48438a0ac5
-
Filesize
40KB
MD55b659242190d7b6caf7b9230c29a37ee
SHA15bf08969f0c46a857464ad14a4a63a0e9b1ea327
SHA25610296efb4ae07f041aa01a78f30d9e71ef7a1270cf378fb099ce2c33d7c1170a
SHA5123920ff8ba52c16be431f52269fcc396456535d3f7a3db8734e41585aead0a6be48e3920123c07e59c7e089aa671974e3224abd8a4e3616736bc361a1cc1cd969
-
Filesize
9KB
MD50387d5ab46a51e2369a26c7d9f0672ad
SHA193d79add8006e868deee7bf5cd9be62f6c005e80
SHA256cc128601b6502106ea8c7d1c4fcdbc6f0564ee32a8b02171fd28eedd4f9ffe01
SHA512523ec62545257162824844fe49d9a76130b6342ecbb4d3d606119a105b4c80c0a1821631f1e97607aedf8f85357f99db153d0918e3448c4edd31aec89a23c0af
-
Filesize
5KB
MD582e5c5073b162327842755e3baae2a98
SHA139eaaee6e9563c5b396184ac70657e440fc5a681
SHA25611e008afb9be25b25c376ecf3a6369465de230c758802813a219cf7bb51f5994
SHA51293584b918a0470a9197afbb7cbadfe39f3a8e1e25ce875511f621026c6e13e32f26dff90db492175a9dbf640b77f18d931e450d29fb961a19232148c2288bed5
-
Filesize
40B
MD576bdb2a85fb457e433acd8a0e575e548
SHA1b0743514f737036a160d9c82a8a021006766e9be
SHA2563bd9e40a72f27ed7f674416d1af3ad84e2f5d25eca91cb40d96bed4fa1d125de
SHA512ba455829f6f9b6fbee6a9d586d828ae6601dfed23254b331d4c93fc306678fd4b803eb3ed253b647ad957c658373f7fb37b2b15d5fb7a7e77d818102ac218622
-
Filesize
212B
MD5963da09532e9758adedf9745c76ec700
SHA1bc976476358cffdbc3f22b6e491f94ccbf15308d
SHA2568720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2
SHA5122da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6
-
Filesize
2KB
MD5eb5b893e8b04ac6458a46a29539233c3
SHA1d784663fd2653872b68cf5d7adf56eae3be64178
SHA256a15ce6a390079dc8881b736ba6e6f767fee44db2711781cbacf00342e7cc5076
SHA5126c29d72bf38f37c824b842f72f78898037a2b881645c9cb6a9d29289c7dbbdb41f3588f5d432083bb1d1e16b3cdc316a671d296de33c8fcb121a7f5e9d3d06e6
-
Filesize
32KB
MD57456888caadf8577180bd11deee1d8f5
SHA14e697fe472667e7c4a000d9189cd5dcaa9d660ad
SHA25614cfe90d9ad8cebbaa7d6e9678545ebfa1ebc127285af640bd8ece36be8886c7
SHA512a5fb48fe7b82b18fcecb266fb319e9726841241b18dfde65c9c613be93dd61d42d04a578a1b003158486cde7b4cbc271b111fc636eddfa272e54864707936813
-
Filesize
118KB
MD5ec03f87d49dcc25276d2e537dffe05c6
SHA1ca111b861680a198ae443cda9b52f45c2c7d67ac
SHA2563177bbe48d0e31bde70ed0e4fb1ad41bff12246a0c1dcffdfd47d9deed317c98
SHA512b0e48f825c27ea81aa17fe887f584570a3c84adc7b8824ce6366525074ab162056734c2059b2103db24a3b28c2cb39b255da3e6df1ccdfee431cf4703be483a5
-
Filesize
4KB
MD58c263240d9878741cf947c973cdbeeb7
SHA14c6c48fab4a685676bb06a3e0dd2d435f50ba0b2
SHA256f0ba5b219657ada6efd45bc6aeae51ff85f0c18d1179e3910bbc55a31f2ac576
SHA512c1b257de9ab2cdab63ab993e37fe5b6a2be8e4488864a7a7e0b002517bf1e96351a2b62033d30afd3b9ab69fb28354295ab9ebf281cd0eee72099a098648d395
-
Filesize
1KB
MD54ada9939c5bf68652dd8757436da27ec
SHA19b19b5ef422dc09ba035c995d39872b25e419795
SHA256346e3179c241aa5a09aa57bef4fffe72fbad29eb2be6cde4da142c9c7c0031f5
SHA512b8bfbf0a0e9b8421d6050b896484912506f38953ece6632b1b9bfee27b303c8c2f762472bc7a79501932683811424625ad8ffc6f4ec415093f031d71d6964ffb
-
Filesize
88KB
MD5e176fbe8ac3cc5e515a26fa68ac8c904
SHA1bcd5d145cb3b8baa3fe382537c025e5b09d248f4
SHA256533f806f1920f24571d004ed15e75cc5e9978726905dd7b065ff81e0cbb1f8bc
SHA512cb3668451f9c4f1791baddc47d28880158c661221318f5f076d5188b67ef95cba3d23b7ddc7be59704d64f67b0f7034fb8b99830b3494e0bb6048254cca9f2ca
-
Filesize
128KB
MD5026b42a06109f0676e45fd60a07e3f1a
SHA1fab912bc43d42f289779936604b66b63ebc30bbc
SHA25693c1e2bcf7904a41bb0f20dc63163b4deac9f3c498c94a71f154eb2c69e213ce
SHA512f33a0194bc70fed17a5e78285882a87cb84384c72f45d8983fd91d45b9cbf7af34dc901cc87a3d10c0fc540e9d76f0fc57f6d6b6f06221ba566581d4bcb588bb
-
Filesize
86KB
MD5682cc4c4815ac81ae8eee246de073ef1
SHA127529c0e690ffd1142385cdcb6fdc4cb9a0dd293
SHA256cdb680cd4cffd5e265941deacf0fd273498b37209a1c976bc917b7fabdbca51e
SHA512b532619bc5db3ef7cdea87482809335e07366ddc99aee0381cdf8d26446f4cec398642c419116b27d788105e30c850b1520ed25e50a05d973e6caa191f702243
-
Filesize
75KB
MD5e05cd3a0351b2f79102830d21e109b9c
SHA152c1237ad193f8d2305cfdf95572d5840d173028
SHA256ddc45de59f2b9317e28af74006852975e1a6852e8148c7e2b87d2e6a2b3a7ced
SHA512e97bccffd4cc161dce9fd0cf777c27aca6eb5d8775fa04c548ed53b2a70c133e41716161624160f3218b67529e4dc027769c6184a4a1b50ed7f7f5f79b25f9dc
-
Filesize
79KB
MD5a4089c106a0c6f206c48a663f085d015
SHA13954b310768a74275e9ca684420b34acf1e082d4
SHA256ff4c33c19ac2f0b05a464657d764429a8c7fa9442ef7d8c08b89cee9f6465760
SHA51226c8e86f26737edc423f5d52fd93da554ebe5b9e42d13ce9dff07709d60ba4a18647ee507fb2fc251f13f72c048c3952ed64123fb3597ea9dd0de479399f4f3e
-
Filesize
15KB
MD50cb768f4b3f99f08505c9d8e3a3b04fa
SHA13a51c29a40ca5a0705b8e6a51b626cb63961f327
SHA2562fd813723f85944894bd163de40d56ea0334a9bdf4d069da61edeabc49a90165
SHA51221f60e48cd5277fc537dd6469ef4400da130925f6462867630ba645318b5eb0179e5fca953c2097905f2c846203bc022fb84941b34308b8f8b294b8e777805cb
-
Filesize
33KB
MD562bbf051fccbc2001ab38a9157396919
SHA10f828b06fa183fd38fe7c98d59323559b36f035e
SHA25696f3dd004a6c7ab5232134a6bb269acb6d32c4d595fe162365fef4576cd09961
SHA51232732e5e3fac8ecb0d516611431794d260eda882ff4f4115eea5ff379b253064f99b5123982ec3f961b06544d8132d1e9358b5902328412cc9c40fe4c0c45c7d
-
Filesize
9KB
MD52ff997d6d7e56916663379be945e365e
SHA1e58574db81186b15a6137519dc9ab7b813aee673
SHA25699672268c663c23ca8ffa8ad3c262ed9dd7fad08ae0526a28f36b66964347157
SHA5124d1c7a7eca551c58d5d2f7dcb75e8c2fa682f2096576a4b38d247ffc78332f073af3e2368c1c3dc0576b43e1a5275d8896296b0dd47cc833b2706be5a2f04b71
-
Filesize
36KB
MD5d2426b842d5602386781ced94ab2428d
SHA14ca20abc69bd138699aa7b53c3372e69439c70a1
SHA25601640fa29141decd5e7421e80b6a6ecb5203d04c95c0198cc38b6a8a5554fe1f
SHA512cbf2176e2c98dfd4979bb7507201c572b53b4ba6cd34eb5d1dca5c8b89be3d178afaf55087c1b4dd6cfaee6e1dad56a474b42301a6bfddde795a750a9ed5bb1d
-
Filesize
45KB
MD54494754a12c6a69bd3dab48b99d3085f
SHA1584dff9e108502cd5d3c481cda225faa44656b67
SHA256ae5053c37688057ded0486f2cab3a14f7b1371b77a511d39d2b392f01c3d6a53
SHA5125405142c876ee10e67522161b4aed323461e777487e1421b4393f7c412b4a92a1dd4a169057c51e1d9781fcbf711cf4c1eff36598621d32fde252a347b1fdf78
-
Filesize
40KB
MD55b2b88ec881597a1dfe7235f3cd2f899
SHA18043bb2f2eaf1a72f2947271bd03e39c4e491a2c
SHA256aafbea6b4da2a25932596e89e14d9c5d362786cc6da5431e906f53c3106045a8
SHA512a583f910b0320f1eed5dbeadfed36713e7216c99eda356cd0d5e986e982e36bf0f7898c286044213c041e45e3b5db306a2256c46c250282fb139c6030d77fdd8
-
Filesize
10KB
MD5e2e38574c5c722313f7d004ea28b1554
SHA1edebceae304bd50e933a01c8cc37a4de742fbfbb
SHA2564bba41597c25b628713ecf0a477249bf950e349905f9408799c929776356b40a
SHA5123b3041670d4189877a933cb5d660f6fc6b1f6fe9e6b722c960bc8eb649a143cb2c18fb8d5d1799a15fd88cb0c0cfa2c10e3ea69aea591c9b347aa34b065045b9
-
Filesize
78KB
MD5e4d6a521aa87939b5588db31633cb8b6
SHA180920f7691f357b73c519003a5aa9ba0dfe5fa3d
SHA25681a88b54a8b1b8a5567a5af10e8530373427c1d0a6c67fe52a2daf2601bf3947
SHA512f08209f21dae2da948f1e41392df621b40f4c569d2fc044dcebda5446f86545826e7fb9739d67a381f0fd82d65b8a071fc1ed14ca8355fc9aa4fb363ec10dd6b
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize10KB
MD516e9c5a1befec67dbae2f2c053fed9bb
SHA19e4022c5de43784a9a50072f16565ba0d879b270
SHA256a446c48ea8add40ad311f8cc603354cb09201197f0299539a3b15b89ce1c8054
SHA5122879db070748cf18ce70fdf931bdb7eb4267815c2a7b1d9067bdf16d1b2602c5a4e18974be0295f583c8a494bcf1e560fdc00daa3869c10829b2690909290bf4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
Filesize22KB
MD5cae7ebc76dc7a0bed65793e5e290b2ad
SHA1964ae079611b62e55a9569fe434fe311f8df90e3
SHA256167e6f4d331af6d88a2200720788464ca0f002cf4b0488311dd85ead5bef6cfb
SHA512b1ab87f64d53994ba54d1ef5d78af0ea92bc787a69ac3d08ee3a1841b187486f67851c1520ea8149883ffb358ef54451a411e93b70c6c235e0c4199f7f4b003b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5fd2c250fe9c3c097194732557d19b425
SHA1a640ea0802ea6126cca40e2a18769910d83b420b
SHA256d78aa4f9fe5b1f2a4933783cab8fe071b590546421a490034506a3ebfc99013f
SHA5120d03d75503ab93eedc2f2f92b0a47b0f3fe8643a0cb5890b558267951254b8536cc6a14e9b1508ce30d8ae705e20f327295f30a33dac1288e4d6b264e72b801a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD5cbbcfe696480c6eeb091e48bef543a9e
SHA13d23caeae74c35211e5db7874909437d5c6c50ff
SHA25626ea3e1417638a165a57c8b683adf620adc3c2ae91b89d5d72f9c9bf046c6e65
SHA5123464989f79c4985432e5d1db68dff1dca1caddb463d58aaafc66eb27ca0f9fddab0385f1cb4916d6f5f9ead84d05ac4d01c09d0195fe52dccabbdcd8b3cf97e1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD5471ab937d60755210c181f880ee5f452
SHA18254c064fcd1f28f907acfd0c319367f548cfc0b
SHA2564bf5c299e00b281b49d6b31483475d831a22570c3ed27f6b3f07a3865f226583
SHA512b5d1cc31cc37f515715dadf0d283b20694f93569e628a96d881b3e260ff03ad8d39491deca12bfb61a4b7a0da43fded7741e9c61fc88253221d5490ba31012fd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD5c6c6248eb9b27e1d2640b01a9a07bca2
SHA1f6ff719faef5150a4bf0900ceadfee3a609fdb13
SHA25600f8def90260fff7fe597551d0c90ec1ffddc2548508719e90ad460cae82e464
SHA51226559c9584e5a1e3eb716408e3eb5a32d3cdb51757c21c454c49a1100a171581c5754fff2fc42700741e4700f93410c5657f1d371936882df4ed812cdefd1150
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize17KB
MD514a6805f4c052f918e00afd47081f43c
SHA1c1893957bd18da1fd72a8954fdb72fc45928c0c6
SHA25683ab8c697e307f7847ffc9ee43ece46ae94c5d3d51872309097016535ee7dc75
SHA5128efe19df6b88de18e8da355051e442535aac17eddaf1031d7d3c283e4dadec30cd26611b23634f8b715329a06431c5ac0070b4015f8dcfd89b17b964768319b5
-
Filesize
32KB
MD544d20872b7222de507aac19b5f707966
SHA1462ae517ff36179c3ecfb2066c01da93b01bd094
SHA256cf9320c55339712cab2d57df4a0489780f221774f46ecc594b9841ccf91f6e44
SHA5126a0aef039ce8663611d7484340019917cb7761b7b627b6179f53416f7602a1641c750a5f794e484df3982f169d85cb62fef8841b422cb210c55ca0c1c61d6219
-
Filesize
135KB
MD5fd2273871bf04deaba0df9cd197eb4d8
SHA1dc111c92a34f24cd6e5e048487720280eeb9f6c0
SHA25605fb58ea4db28ec042ebf824de9e7c24391fe61d628cd97ffa8096e20d5fa0c0
SHA512de8e99d93982a1c56826205a0232f902ffd8a8ef639734f7162d4d6d2c5362abb802b1696bff7aedb0d84852adc508c85be229175f930d57800c2542a7a8fec4
-
Filesize
107KB
MD5c2dfad2ee5e991ff9eaf2f8262b8a47b
SHA12b281e95927c7fb1c266cbf9e7ca1b00799bf8e5
SHA256d8958dfa6b4e2900b35e618732f3a4d4ee2e6bfdc0a3b78a9f64b009a45ca9df
SHA51285affcf0599b7961792e56dced497b5992695f0f3972529625de21d53506be545d843c10fe79340d81e3c5873ab463c6dfeee57d17b33cfabf71fd0fb91724e1
-
Filesize
47KB
MD515afd1135cfda4d9d098df270bf6e6bd
SHA1521b18e8ca9620053eb8988d9d12c2f3a77ad8d7
SHA25652fbe2f7da8c24aaf1833e5d9eca2f86eed0c50c2ab53b372a5bb646d57964f2
SHA5120fbb03f20eadc54430c96162c668d37deba563074170cb6011394bc3ccc787be00957775001cb738761dbad7ddf92dd597357de02bd24a810740a95c87fd2d9a
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.dll
Filesize53KB
MD531b9b20cbc7091d1a39c64606f9686ae
SHA1ed890d770c2bf5fe9952573722921ce863a2c68f
SHA256fc9e068dd96f0fd15e5dab5456377f8e20fcee81547b3488db20be9cbc45fc78
SHA512a7f391cb827462b28a746d09dcd2c2ee42048aa2f3b4b5045f9d6a20251c82ebefeafb3fe9bc2096d99c5f0a1cbba0c56bbd48f5d0b2536d9af679a1058e25be
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbgcore.dll
Filesize30KB
MD5d21f371a3a141731f1f16fac91a82976
SHA1e391950b7eb71ac7ebdb16c8d11ac84f90478a6a
SHA2560bd0fda4b73f5cb203f5e187986fbf3cbaca1e74798ff47144100a21942eb180
SHA51296b0852e1835cbf25a02b706e85440903850ba107964932fcadb83f2d6b70e3a547a38c8f6986e3546402dcf68d7ba20cf2bdbc7c74b2b888d88a32c4fb78f6b
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll
Filesize96KB
MD556467cfc56842d380ae0d52766a70dd2
SHA12cfad8f05cd2c98ab3de4e3cfee47663818675ea
SHA256469d18116ed932b3cb490ea46da537294c6ddc1f1a1db167b437980969445e71
SHA512292c5cf1313f5e29306aa85793c9c9dcc9bdc75e29ccc33d1bb2ed2fa8ca30725bc009f7cfdbd606cf90e61ae4d9409800584f3aa0199f4f6544704f9272e72a
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312180505051\assistant\dbghelp.dll
Filesize18KB
MD5847feae4bcf7ea65e8d67e96cc670373
SHA161aeee2f99a9aa944062282c0f3d752f4774a7ad
SHA25625e197415afacead8ebd979653ca0c83615cc3dabce1035b5b74d7886e745d47
SHA51253306d2f556d60eed4f3a5acde3aa8a631e08059e8c4ed524bea4a51f91fdabd84ea23bc446394bf5f250cbaf9d8f03cfeb1227a084273f8811aa01c94db9c91
-
Filesize
1KB
MD564577d7db77c77574d7ab48f2020aaf2
SHA1cbaac8f01b59547839fce86485005ea91d66b5ce
SHA2564056c047d9513a8e6a6f49fc29fb5ba6d5b6fd9cb4916a5e60dadda149389f99
SHA51234ae3f5ca6508ec7c1514d653b69a6ab2f8823e4ba55513fa9d1316927dce21c1aa46b80ce0957339790bcbea8dfd421c82b2629c2b0e04eb93b0a1e2cd9789e
-
Filesize
30KB
MD5f01b8be7831f6030b6b585e49c7bc756
SHA1e55573b76486f2d01cf97d7e945969d82edccb22
SHA256862937ad11c8fbc8628416011ae286076aa8391c392a5e5679e8b4dbb9d98423
SHA512b7e4b34d45646aea0af2fa33f9d13f4675ba2760aecf4226706ab737262aa6975c1fb2232e394fca4465ed32e8321b603a7efbd286f583459c67a23896c38294
-
Filesize
5KB
MD53a45cb58af06ff132af5b283cae424eb
SHA1ad1f9b36906580e981c29e70aacd23501398854f
SHA256ea68279a95c0782c76086e2ecd8bb4292cfb88871e870aef0ab179fb7e371820
SHA512e995635edb72c2af3f4330e5cd5df0f3a7c61b97384e07702f89e47d461e2834f7ea8de862db5e97a23ac2a676fab2065a98adf51694ffb31ea2bd58990bd447
-
Filesize
5KB
MD577615f16f5562e77d40552fec7277276
SHA1f4df8f3cc012472d01ba27b6a9ffcce081160438
SHA256b8a0fd4f5f41be324a489cae27a30561e289963f41beb3570c44840934614ecd
SHA512b88590a4d4cc5bfc29a8751f234e14688410c2e1068246915f7065900a8c8fa2562c1dd26e0b08692c30fe8265a76c62003a74aa51104a4720d839dbf79f3104
-
Filesize
9KB
MD589a4c76fb9fa0f97671c366fb5269daa
SHA1736d2d9556260d850cf580e64e97a25d55045270
SHA256a09e3281f2b5a4c4efa8edb882cb7ca09b65331a0e349090b1a0b5dd1ddd405c
SHA512421d1aed4e6177331f6ec38576ccceba4e42fb6c5d8c81f64d25c4ada3c42068a4182104ce860899600bc5e5bd9fc09ddd5ca27887debc6141a66447f0c9c9fa
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
9KB
MD51ddbc6baac40556369c4c4cb373eb3f3
SHA1d7c367f836b1a1e323d919596fc5d784cddd6ca5
SHA256458b400841337771467cd851a8a46a4f591d556fc57a1b1d478dadefd189f63e
SHA5124d55602d9fc710b07de7bbd434e1c3f90a31e559bdf8e6acc8340e19ef017a0e50c0a0da7ae4fb393706c0d2c5af5c0e08ff14cbb07102966aaf9b9c79be7824
-
Filesize
2KB
MD555efa9da431995ed878f93de61e85c3e
SHA13719593a3a1ae83709219c6d9c3826cee193b218
SHA256719ff931d9aa6f529dadaf3a64b0d94fbd8f77985d795536f6b324560d3d9282
SHA51287d617e03de796d7b2d0d8e04a74560b75cb5c59e8a20273869508a4f843c58ddfcdee3456931bbf3241e841598a809e7d14ebba376f79084a424357ff7df513
-
Filesize
33KB
MD55c9f09c08ff03fff01447d3ced4fe8a1
SHA10e1848cf116da406456631ec679c25b940851292
SHA25689ec12969e35fa1f8cb6cc6c4187a4a187aacabbb89123cdfad014b9eaa65b39
SHA512e13ac3cabe7fceba3e2ada47dad4cfb35b204f3f881dddb4059189c6a14522a57ec03420ceba0e7cd649a15e41d7405e4cbec5c4de5e9d6bab72b3f694e3bdf9
-
Filesize
70KB
MD55ca52289751749ddd364f972a09fa7d5
SHA101cf6e21e740e2b73d2f574c57ed6cf478883673
SHA256ca0a25f5fdc51ae77e37d57fe7d998a3ba37e6a647ebe0b872a0aed4dc05a801
SHA5120c928a0c4816805d07c8f644c1a5fbf5158961af91b25e333353941ba6efe655f94459a4d0b19d99fd4c598b7caecac74157e923e83d6d1dadefb1783ed47245
-
Filesize
11KB
MD50294f6dec077d029a5f3b74fb95ffc02
SHA12c336a94a95e6582d39f029e0bdc6b79f44448f2
SHA256f231be9616d80e303339cad54c1fc6a36c09f4d09b33a9cc60535f141691b048
SHA512df49439c21a1f2f6de1960d7494833816cbc65e335351487aa740b2064a95633d8234b7682522f956a94c44198a287c29aa2f0da39a3ed9c08acf44de4c110a2
-
Filesize
103KB
MD579f9bc3ada269ed2028754242544b161
SHA1c266df8993f73a3c17f0fa33d2b918640e7640a4
SHA2568cd67e34da6ece40b63864e3e8eb821e7f4459853bc3e0601da5436764a348ce
SHA5120f86a7ef6f49b47ddb160a6c635f7cb1cc2fe7c068bd2d7fe0155bdd4814a3c52528447166edeb7bae60224aee2519eb9ca6854bd8edb1745b4d3861ef9cbb2f