Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-02-2024 03:41
Static task
static1
Behavioral task
behavioral1
Sample
57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe
Resource
win7-20231215-en
General
-
Target
57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe
-
Size
177KB
-
MD5
05e32cf85ff2c9c7bc92d6b751c02b1b
-
SHA1
95e91a3893640d9f9dd80cf5f0f820de54fccd2a
-
SHA256
57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d
-
SHA512
fc81e09eedb9ca907ab54cebe0f3f54cebc86f36fe036dcf0a97c131ccc5ae67832dbe902ae470b23c0dad62708555f5a4c2b4a9a71592ba5d42ee868322ed67
-
SSDEEP
3072:7gMyg1MbPUWdfkUXjqYffa6R2sChyJz2OgpnGaxNTgiqOweoUEMF98sDMOSx:sgw8WdxTqcfaO2sbJbgvxNTg0weJ/W
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe = "0" 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\WGsPNpWdqW1szkjZYrMv8SmT.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\sjUStLBAW9tuwZz4DHnIakPz.exe = "0" sjUStLBAW9tuwZz4DHnIakPz.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 42 1044 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4064 netsh.exe 1112 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Control Panel\International\Geo\Nation VkIxkha.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bavd1y1qMZ464kNeEE1zkg5O.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cSIhGkcesbLtkMXXV2ntpQAF.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dtphn2oHUeMc4Gi11hdtkRn3.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8EU3F25DeYms6aTzBGnCYCO9.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aZKQAcLny5zmh5jciBPLWI8L.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\G3B4ZoUssDqHQwMdraVz8gV4.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iiKDzXVJxruWXYDVCvh9Jkuh.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AWOIHZJnLlNBzwvxSQFA7K3w.bat CasPol.exe -
Executes dropped EXE 25 IoCs
pid Process 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 3704 yhnOhDEwcb7FgbqN1ICvxKsr.exe 4732 powershell.exe 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 4312 mlb64NOLl5sxzm5WJbtT033Y.exe 928 WerFault.exe 1628 tImM3RKeKAVFGT2xp5q8ikU4.exe 4224 mlb64NOLl5sxzm5WJbtT033Y.exe 4168 mlb64NOLl5sxzm5WJbtT033Y.exe 3448 GPFWnDdUKgO3n4uKvBdUXcDe.exe 1176 Install.exe 3556 ftG7PNU93GqMIG0XdTYqud4b.exe 3892 Install.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 4348 csrss.exe 2608 Assistant_106.0.4998.16_Setup.exe_sfx.exe 3568 assistant_installer.exe 2956 assistant_installer.exe 3756 injector.exe 2148 windefender.exe 4728 windefender.exe 4956 Process not Found 2960 VkIxkha.exe -
Loads dropped DLL 10 IoCs
pid Process 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 4312 mlb64NOLl5sxzm5WJbtT033Y.exe 928 WerFault.exe 4224 mlb64NOLl5sxzm5WJbtT033Y.exe 4168 mlb64NOLl5sxzm5WJbtT033Y.exe 3568 assistant_installer.exe 3568 assistant_installer.exe 2956 assistant_installer.exe 2956 assistant_installer.exe 1044 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001abc8-347.dat upx behavioral2/memory/928-353-0x00000000001A0000-0x0000000000688000-memory.dmp upx behavioral2/files/0x000700000001abb8-364.dat upx behavioral2/files/0x000700000001abb8-370.dat upx behavioral2/memory/4224-371-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/memory/4168-380-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/memory/928-348-0x00000000001A0000-0x0000000000688000-memory.dmp upx behavioral2/files/0x000700000001abb8-342.dat upx behavioral2/memory/4312-333-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/files/0x000700000001abb8-330.dat upx behavioral2/files/0x000700000001abb8-329.dat upx behavioral2/memory/2296-326-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/files/0x000700000001abb8-324.dat upx behavioral2/memory/2296-908-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/memory/4312-911-0x0000000000AC0000-0x0000000000FA8000-memory.dmp upx behavioral2/files/0x000700000001abe7-3389.dat upx behavioral2/memory/2148-3390-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x000700000001abe7-3387.dat upx behavioral2/files/0x000700000001abe7-3386.dat upx behavioral2/memory/4728-3398-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/4728-3410-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe = "0" 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\WGsPNpWdqW1szkjZYrMv8SmT.exe = "0" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\sjUStLBAW9tuwZz4DHnIakPz.exe = "0" sjUStLBAW9tuwZz4DHnIakPz.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" WGsPNpWdqW1szkjZYrMv8SmT.exe Set value (str) \REGISTRY\USER\S-1-5-21-1775739321-368907234-981748298-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" sjUStLBAW9tuwZz4DHnIakPz.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe -
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json VkIxkha.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json VkIxkha.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini VkIxkha.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: mlb64NOLl5sxzm5WJbtT033Y.exe File opened (read-only) \??\F: mlb64NOLl5sxzm5WJbtT033Y.exe File opened (read-only) \??\D: mlb64NOLl5sxzm5WJbtT033Y.exe File opened (read-only) \??\F: mlb64NOLl5sxzm5WJbtT033Y.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 4 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive windefender.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive cmd.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VkIxkha.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft VkIxkha.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol Process not Found File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Process not Found File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 VkIxkha.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA VkIxkha.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4500 set thread context of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN sjUStLBAW9tuwZz4DHnIakPz.exe File opened (read-only) \??\VBoxMiniRdrDN WGsPNpWdqW1szkjZYrMv8SmT.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi VkIxkha.exe File created C:\Program Files (x86)\KCGdmeQdU\lrpKCnc.xml VkIxkha.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\SpazMOf.xml VkIxkha.exe File created C:\Program Files (x86)\FohpjzYDshfCC\sIdMhGv.dll VkIxkha.exe File created C:\Program Files (x86)\hgFvgKbJayUn\CShyUEm.dll VkIxkha.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\dfsvFPLajtOZL.dll VkIxkha.exe File created C:\Program Files (x86)\KCGdmeQdU\fvPatZ.dll VkIxkha.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VkIxkha.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\WDETUbJ.xml VkIxkha.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi VkIxkha.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak VkIxkha.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja VkIxkha.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\AkRTsbK.dll VkIxkha.exe File created C:\Program Files (x86)\FohpjzYDshfCC\nuiraGZ.xml VkIxkha.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\unins000.dat powershell.exe File opened for modification C:\Windows\unins000.dat powershell.exe File created C:\Windows\Tasks\YsLxjqvMZrWymyIEG.job schtasks.exe File created C:\Windows\rss\csrss.exe WGsPNpWdqW1szkjZYrMv8SmT.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\is-FCQ68.tmp powershell.exe File created C:\Windows\Tasks\bwKBwqZYjkqxftWshF.job schtasks.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\EtrQGzrpWMpnyWxNE.job schtasks.exe File opened for modification C:\Windows\rss WGsPNpWdqW1szkjZYrMv8SmT.exe File opened for modification C:\Windows\rss sjUStLBAW9tuwZz4DHnIakPz.exe File created C:\Windows\rss\csrss.exe sjUStLBAW9tuwZz4DHnIakPz.exe File created C:\Windows\Tasks\SMPpzaSdDqsJvHF.job schtasks.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4316 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4440 3052 WerFault.exe 39 3516 3052 WerFault.exe 39 4584 3052 WerFault.exe 39 3940 3052 WerFault.exe 39 4424 3052 WerFault.exe 39 5072 3052 WerFault.exe 39 1628 3052 WerFault.exe 39 3408 3052 WerFault.exe 39 3744 3832 WerFault.exe 48 3176 3832 WerFault.exe 48 2024 3832 WerFault.exe 48 4860 3052 WerFault.exe 39 4896 3052 WerFault.exe 39 1036 3832 WerFault.exe 48 1984 3832 WerFault.exe 48 3008 3052 WerFault.exe 39 352 3832 WerFault.exe 48 3380 3832 WerFault.exe 48 600 3052 WerFault.exe 39 2608 3832 WerFault.exe 48 2300 3832 WerFault.exe 48 2824 3052 WerFault.exe 39 2284 3832 WerFault.exe 48 1304 3052 WerFault.exe 39 2388 3832 WerFault.exe 48 412 3052 WerFault.exe 39 5116 3052 WerFault.exe 39 3624 3832 WerFault.exe 48 4852 3052 WerFault.exe 39 4520 3832 WerFault.exe 48 1560 3832 WerFault.exe 48 4632 3832 WerFault.exe 48 2064 3052 WerFault.exe 39 2648 3052 WerFault.exe 39 4636 3432 WerFault.exe 4236 3432 WerFault.exe 5044 3432 WerFault.exe 2828 3432 WerFault.exe 4444 3432 WerFault.exe 4916 2260 WerFault.exe 158 4212 2260 WerFault.exe 158 3848 2260 WerFault.exe 158 1120 2260 WerFault.exe 158 5044 2260 WerFault.exe 158 696 2260 WerFault.exe 158 2148 2260 WerFault.exe 158 4600 2260 WerFault.exe 158 2492 2260 WerFault.exe 158 2960 3432 WerFault.exe 316 3432 WerFault.exe 2836 3432 WerFault.exe 2624 3432 WerFault.exe 4636 4348 WerFault.exe 196 3568 4348 WerFault.exe 196 2212 4348 WerFault.exe 196 928 4348 WerFault.exe 196 3004 4348 WerFault.exe 196 3748 4348 WerFault.exe 196 4152 4348 WerFault.exe 196 1960 3432 WerFault.exe 177 932 4348 WerFault.exe 196 4520 3432 WerFault.exe 177 2832 4348 WerFault.exe 196 4308 4348 WerFault.exe 196 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1504 schtasks.exe 3404 schtasks.exe 512 schtasks.exe 1436 schtasks.exe 2624 schtasks.exe 4212 schtasks.exe 3404 schtasks.exe 2172 schtasks.exe 4600 schtasks.exe 4504 schtasks.exe 4212 schtasks.exe 4444 schtasks.exe 4652 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-932 = "Coordinated Universal Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-302 = "Romance Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2161 = "Altai Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-362 = "GTB Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1911 = "Russia TZ 10 Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-592 = "Malay Peninsula Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-272 = "Greenwich Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-191 = "Mountain Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-42 = "E. South America Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-981 = "Kamchatka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-382 = "South Africa Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA cmd.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1872 = "Russia TZ 7 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" sjUStLBAW9tuwZz4DHnIakPz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1802 = "Line Islands Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-892 = "Morocco Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 mlb64NOLl5sxzm5WJbtT033Y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 mlb64NOLl5sxzm5WJbtT033Y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 mlb64NOLl5sxzm5WJbtT033Y.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2840 powershell.exe 2840 powershell.exe 2840 powershell.exe 5052 reg.exe 4184 Conhost.exe 4184 Conhost.exe 5052 reg.exe 5052 reg.exe 4184 Conhost.exe 4184 Conhost.exe 5052 reg.exe 1880 powershell.EXE 1880 powershell.EXE 1880 powershell.EXE 1880 powershell.EXE 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 2648 Conhost.exe 2648 Conhost.exe 2648 Conhost.exe 2648 Conhost.exe 2304 powershell.exe 2304 powershell.exe 2304 powershell.exe 2304 powershell.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 3432 sjUStLBAW9tuwZz4DHnIakPz.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 2260 WGsPNpWdqW1szkjZYrMv8SmT.exe 3848 powershell.exe 3848 powershell.exe 3848 powershell.exe 3848 powershell.exe 4728 windefender.exe 4728 windefender.exe 4728 windefender.exe 4728 windefender.exe 808 powershell.exe 808 powershell.exe 808 powershell.exe 808 powershell.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 4732 powershell.exe 4948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4456 CasPol.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 5052 reg.exe Token: SeDebugPrivilege 4184 Conhost.exe Token: SeDebugPrivilege 1880 powershell.EXE Token: SeDebugPrivilege 3052 sjUStLBAW9tuwZz4DHnIakPz.exe Token: SeImpersonatePrivilege 3052 sjUStLBAW9tuwZz4DHnIakPz.exe Token: SeDebugPrivilege 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe Token: SeImpersonatePrivilege 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe Token: SeDebugPrivilege 2648 Conhost.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeDebugPrivilege 3848 powershell.exe Token: SeDebugPrivilege 4728 windefender.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 1984 cmd.exe Token: SeDebugPrivilege 592 powershell.exe Token: SeSystemEnvironmentPrivilege 4348 csrss.exe Token: SeSecurityPrivilege 4316 reg.exe Token: SeSecurityPrivilege 4316 reg.exe Token: SeDebugPrivilege 4584 Conhost.exe Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 2388 reg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4732 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 2840 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 18 PID 4500 wrote to memory of 2840 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 18 PID 4500 wrote to memory of 2840 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 18 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4500 wrote to memory of 4456 4500 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe 16 PID 4456 wrote to memory of 3052 4456 CasPol.exe 39 PID 4456 wrote to memory of 3052 4456 CasPol.exe 39 PID 4456 wrote to memory of 3052 4456 CasPol.exe 39 PID 4456 wrote to memory of 3832 4456 CasPol.exe 48 PID 4456 wrote to memory of 3832 4456 CasPol.exe 48 PID 4456 wrote to memory of 3832 4456 CasPol.exe 48 PID 4456 wrote to memory of 3704 4456 CasPol.exe 97 PID 4456 wrote to memory of 3704 4456 CasPol.exe 97 PID 4456 wrote to memory of 3704 4456 CasPol.exe 97 PID 3704 wrote to memory of 4732 3704 yhnOhDEwcb7FgbqN1ICvxKsr.exe 195 PID 3704 wrote to memory of 4732 3704 yhnOhDEwcb7FgbqN1ICvxKsr.exe 195 PID 3704 wrote to memory of 4732 3704 yhnOhDEwcb7FgbqN1ICvxKsr.exe 195 PID 4456 wrote to memory of 2296 4456 CasPol.exe 78 PID 4456 wrote to memory of 2296 4456 CasPol.exe 78 PID 4456 wrote to memory of 2296 4456 CasPol.exe 78 PID 3052 wrote to memory of 5052 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 282 PID 3052 wrote to memory of 5052 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 282 PID 3052 wrote to memory of 5052 3052 sjUStLBAW9tuwZz4DHnIakPz.exe 282 PID 2296 wrote to memory of 4312 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 68 PID 2296 wrote to memory of 4312 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 68 PID 2296 wrote to memory of 4312 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 68 PID 3832 wrote to memory of 4184 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 189 PID 3832 wrote to memory of 4184 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 189 PID 3832 wrote to memory of 4184 3832 WGsPNpWdqW1szkjZYrMv8SmT.exe 189 PID 2296 wrote to memory of 928 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 349 PID 2296 wrote to memory of 928 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 349 PID 2296 wrote to memory of 928 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 349 PID 4456 wrote to memory of 1628 4456 CasPol.exe 72 PID 4456 wrote to memory of 1628 4456 CasPol.exe 72 PID 2296 wrote to memory of 4224 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 70 PID 2296 wrote to memory of 4224 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 70 PID 2296 wrote to memory of 4224 2296 mlb64NOLl5sxzm5WJbtT033Y.exe 70 PID 4224 wrote to memory of 4168 4224 mlb64NOLl5sxzm5WJbtT033Y.exe 71 PID 4224 wrote to memory of 4168 4224 mlb64NOLl5sxzm5WJbtT033Y.exe 71 PID 4224 wrote to memory of 4168 4224 mlb64NOLl5sxzm5WJbtT033Y.exe 71 PID 4456 wrote to memory of 3448 4456 CasPol.exe 77 PID 4456 wrote to memory of 3448 4456 CasPol.exe 77 PID 4456 wrote to memory of 3448 4456 CasPol.exe 77 PID 3448 wrote to memory of 1176 3448 GPFWnDdUKgO3n4uKvBdUXcDe.exe 85 PID 3448 wrote to memory of 1176 3448 GPFWnDdUKgO3n4uKvBdUXcDe.exe 85 PID 3448 wrote to memory of 1176 3448 GPFWnDdUKgO3n4uKvBdUXcDe.exe 85 PID 4456 wrote to memory of 3556 4456 CasPol.exe 86 PID 4456 wrote to memory of 3556 4456 CasPol.exe 86 PID 4456 wrote to memory of 3556 4456 CasPol.exe 86 PID 1176 wrote to memory of 3892 1176 Install.exe 88 PID 1176 wrote to memory of 3892 1176 Install.exe 88 PID 1176 wrote to memory of 3892 1176 Install.exe 88 PID 3892 wrote to memory of 2904 3892 Install.exe 91 PID 3892 wrote to memory of 2904 3892 Install.exe 91 PID 3892 wrote to memory of 2904 3892 Install.exe 91 PID 3892 wrote to memory of 316 3892 Install.exe 203 PID 3892 wrote to memory of 316 3892 Install.exe 203 PID 3892 wrote to memory of 316 3892 Install.exe 203 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe"C:\Users\Admin\AppData\Local\Temp\57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\Pictures\sjUStLBAW9tuwZz4DHnIakPz.exe"C:\Users\Admin\Pictures\sjUStLBAW9tuwZz4DHnIakPz.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3924⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 3964⤵
- Program crash
PID:3516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 4084⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 5884⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 6204⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7004⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 8124⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7844⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7964⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 8364⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 8484⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 6044⤵
- Program crash
PID:600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 8364⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7844⤵
- Program crash
PID:1304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7124⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 5724⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7484⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7124⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 6644⤵
- Program crash
PID:2648
-
-
C:\Users\Admin\Pictures\sjUStLBAW9tuwZz4DHnIakPz.exe"C:\Users\Admin\Pictures\sjUStLBAW9tuwZz4DHnIakPz.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3432 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4728
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 5125⤵
- Program crash
PID:1960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 7885⤵
- Program crash
PID:4520
-
-
-
-
C:\Users\Admin\Pictures\WGsPNpWdqW1szkjZYrMv8SmT.exe"C:\Users\Admin\Pictures\WGsPNpWdqW1szkjZYrMv8SmT.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 3684⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 4044⤵
- Program crash
PID:3176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 5884⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 6964⤵
- Program crash
PID:1036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 7324⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 5684⤵
- Program crash
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 6244⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 8044⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 7964⤵
- Program crash
PID:2300
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 7004⤵
- Program crash
PID:2284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 5964⤵
- Program crash
PID:2388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 7804⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 6364⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 6604⤵
- Program crash
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 3884⤵
- Program crash
PID:4632
-
-
C:\Users\Admin\Pictures\WGsPNpWdqW1szkjZYrMv8SmT.exe"C:\Users\Admin\Pictures\WGsPNpWdqW1szkjZYrMv8SmT.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 3565⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 3725⤵
- Program crash
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 5885⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 6485⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 6805⤵
- Program crash
PID:5044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 5605⤵
- Program crash
PID:696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 6685⤵
- Program crash
PID:2148 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)6⤵PID:3216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 7645⤵
- Program crash
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 3365⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:808
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 3966⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 4046⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 7566⤵
- Program crash
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 8006⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6606⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 7126⤵
- Program crash
PID:3748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6686⤵
- Program crash
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 6566⤵
- Program crash
PID:932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 3886⤵
- Program crash
PID:2832
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 5886⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1984
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:647⤵PID:4576
-
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2240
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 8566⤵PID:4128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 8726⤵PID:3208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9046⤵PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9646⤵PID:1504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:3756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9726⤵PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 9326⤵PID:4236
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4504
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 10366⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 11126⤵PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 11406⤵PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 12166⤵PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 11806⤵PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 10846⤵PID:2964
-
-
-
-
-
C:\Users\Admin\Pictures\tImM3RKeKAVFGT2xp5q8ikU4.exe"C:\Users\Admin\Pictures\tImM3RKeKAVFGT2xp5q8ikU4.exe"3⤵
- Executes dropped EXE
PID:1628
-
-
C:\Users\Admin\Pictures\GPFWnDdUKgO3n4uKvBdUXcDe.exe"C:\Users\Admin\Pictures\GPFWnDdUKgO3n4uKvBdUXcDe.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\7zS8368.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\7zS8722.tmp\Install.exe.\Install.exe /mGaXdidI "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:2144
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:5108
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:1124
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:316
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:4872
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:3380
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:4728
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gJlUDuteF" /SC once /ST 00:48:13 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:2624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gJlUDuteF"6⤵PID:4424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4872
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gJlUDuteF"6⤵PID:4916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwKBwqZYjkqxftWshF" /SC once /ST 03:44:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\ONCbteG.exe\" cj /kAsite_idzXl 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:4212
-
-
-
-
-
C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe"C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0xa72614,0xa72620,0xa7262c5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956
-
-
-
-
C:\Users\Admin\Pictures\ftG7PNU93GqMIG0XdTYqud4b.exe"C:\Users\Admin\Pictures\ftG7PNU93GqMIG0XdTYqud4b.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==3⤵
- Executes dropped EXE
PID:3556
-
-
C:\Users\Admin\Pictures\yhnOhDEwcb7FgbqN1ICvxKsr.exe"C:\Users\Admin\Pictures\yhnOhDEwcb7FgbqN1ICvxKsr.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\57ed1aa9bb3827fb3ce2ced5cf5e45b442388031c52db6d0b602497641eab20d.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\is-2F4PP.tmp\yhnOhDEwcb7FgbqN1ICvxKsr.tmp"C:\Users\Admin\AppData\Local\Temp\is-2F4PP.tmp\yhnOhDEwcb7FgbqN1ICvxKsr.tmp" /SL5="$C0152,831488,831488,C:\Users\Admin\Pictures\yhnOhDEwcb7FgbqN1ICvxKsr.exe" /VERYSILENT1⤵PID:4732
-
C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exeC:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6f739558,0x6f739564,0x6f7395701⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4312
-
C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe"C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2296 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240204034224" --session-guid=7cce2a32-0256-49f9-ac8d-59589a295419 --server-tracking-blob=Y2RhMjE5ZDVhZDA5MjY4ZTdkYzAzMDhmZWYxN2QxMTQ2N2QxZTExMDljNzUxMzMxMzNkNDc3OTYxZTExN2Y0Mzp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcwNzAxODE0MC45NzkxIiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiIwYmExNmIxZC1kZmM5LTRhZDEtODlhNi00ZTNjMmQ1NDE3MWMifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=B0040000000000001⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exeC:\Users\Admin\Pictures\mlb64NOLl5sxzm5WJbtT033Y.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2c0,0x2c4,0x2c8,0x290,0x2cc,0x6e4c9558,0x6e4c9564,0x6e4c95702⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\mlb64NOLl5sxzm5WJbtT033Y.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\mlb64NOLl5sxzm5WJbtT033Y.exe" --version1⤵PID:928
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:1116
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1988
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5112
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 2281⤵
- Program crash
PID:4636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 5881⤵
- Program crash
PID:4236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 6801⤵
- Program crash
PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 6441⤵
- Program crash
PID:2828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 7761⤵
- Program crash
PID:4444
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile1⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 7561⤵
- Program crash
PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 6321⤵
- Program crash
PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 3761⤵
- Program crash
PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3432 -s 3601⤵
- Program crash
PID:2624
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:4064
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:1112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4916
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)1⤵
- Launches sc.exe
PID:4316
-
C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\ONCbteG.exeC:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\ONCbteG.exe cj /kAsite_idzXl 385118 /S1⤵PID:4956
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:4584
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:1544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:3208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:4036
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:4148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4080
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\WMHlLqqk\yHwbNSt.dll",#1 /Lcsite_idnqK 3851184⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
PID:1044 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EtrQGzrpWMpnyWxNE"5⤵PID:4308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV16⤵PID:5108
-
-
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:5008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:5012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:68
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4424
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:3536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:4588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:1836
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:323⤵PID:1116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:643⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:323⤵PID:4676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:643⤵PID:4620
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:323⤵PID:1968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:643⤵PID:68
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:323⤵PID:4932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:643⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:323⤵PID:4340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:643⤵PID:5004
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:643⤵PID:1464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:323⤵PID:4152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:643⤵PID:368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:323⤵PID:2852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:643⤵PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:323⤵PID:3784
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "goyEURBMd"2⤵PID:4656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "goyEURBMd" /SC once /ST 02:52:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YsLxjqvMZrWymyIEG"2⤵PID:5008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YsLxjqvMZrWymyIEG" /SC once /ST 02:49:20 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\VkIxkha.exe\" s7 /yUsite_idEUI 385118 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:3404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "goyEURBMd"2⤵PID:664
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:321⤵PID:2172
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:321⤵PID:684
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:2388
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:824
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:4488
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3216
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2232
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:884
-
C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\VkIxkha.exeC:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\VkIxkha.exe s7 /yUsite_idEUI 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4724
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KCGdmeQdU\fvPatZ.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SMPpzaSdDqsJvHF" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bwKBwqZYjkqxftWshF"2⤵PID:2084
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SMPpzaSdDqsJvHF"2⤵PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1544
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KVEvoYrDZKLqM2" /F /xml "C:\ProgramData\uqeRQcQeSVSWnHVB\vpwVAJY.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "znrIDUvoucqewg" /F /xml "C:\Program Files (x86)\IoHaAJhEDYhU2\WDETUbJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:512
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RHUfDusjVndeEILcZ2" /F /xml "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\SpazMOf.xml" /RU "SYSTEM"2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3404
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SMPpzaSdDqsJvHF"2⤵PID:368
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BxzpJXegsLHBOSWsuyU2" /F /xml "C:\Program Files (x86)\FohpjzYDshfCC\nuiraGZ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2172
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "SMPpzaSdDqsJvHF2" /F /xml "C:\Program Files (x86)\KCGdmeQdU\lrpKCnc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EtrQGzrpWMpnyWxNE"2⤵PID:804
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EtrQGzrpWMpnyWxNE" /SC once /ST 01:23:14 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\RZfGRCgJsrDIEOco\WMHlLqqk\yHwbNSt.dll\",#1 /Lcsite_idnqK 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4652
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YsLxjqvMZrWymyIEG"2⤵PID:3940
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:3184
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:321⤵PID:4088
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4644
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\WMHlLqqk\yHwbNSt.dll",#1 /Lcsite_idnqK 3851181⤵PID:4080
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:321⤵PID:2024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5e547a31e8839f8e54587c99e97c4c33c
SHA19bfbf630c9398eedbfa40cba01f122a1ed675e02
SHA256f8bdf7f6ffa4e58856a4f840ffdd5b33bdd8f574c662054c11270e273d4cd475
SHA512241ac524cff7ffece28a50eb5fe7d9866591c15ed1d10b108baa016a6abc9c191500d78b12ddb9a2e41babae17fb3a945c146b09bc1e420074495c42d294263f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5f32260503a0d5ccca2e558cb462dcc52
SHA1ebf989673e2c371bb6885937caff191154073f43
SHA2563348480cf1eeae3d346a5ce118ed0ee877cd9f820e9de9ba5ce4827306db8f14
SHA512f9de50dd58e125a38ad9b1f84adcbf969792455ce30098835d120af0ddab7ff0cac24a9fba8f028975a79e004224b1d91558012904b46e96e403891dbc6a737d
-
Filesize
36KB
MD5a073da515841186e51ba0eef1b42e9e9
SHA1e83f4149618ad8c5be8605dffb73d7096849e930
SHA2563eebe505e757b2f18b7c46c026ee85711fcf70012dc489d409c13582f8dde363
SHA512d3a6583f58b88ec9ab37afd337db032f6f36204ebaa53a808b4e23425cd361bb74cf709d85ee9a3da60ad2ae5c3d4d03707a86e396b93cc792379ff3b9b60214
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
19KB
MD55e4070f01a6b16dd69169033fd298720
SHA1583c95d9cad54617125af4b729e9213169c1772d
SHA2562a0895738ef9e0759f41c5f7e06a6190a07c5a7f00ab44224106cfe87550cdbf
SHA5121d9ff7f234618ca5fcbf9b7373d2b279253bc806880bb4e7a84e3acbd1cf2ae81397499879c60f1eaa2673ef90ec5299acb65e61691d896cf8f2d1168d149d67
-
Filesize
18KB
MD5dbfb7ab0514b3309a9647dec446f9802
SHA158a33df8e98bbd611cd88206b2363ec9f04bc893
SHA256df32a1c549f93f9cf4ad8a77c33d7ff2c0fc37f58364f88365163dff801c854a
SHA512c23d32c8a1e2837a418ad9bf4e6239cf711e6234f98f4a32f96bd0b4b48eef9397f47fa4905e1b9daff698564b50f1b5ec35c6297d1f14190590b7552ad24ad2
-
Filesize
119KB
MD517ac9d681996d836936a963f20a8298f
SHA1ebe2c88488b6940efd5a250c4c3b0b4764f0d471
SHA256f5ba7758b4ccdb88f03d08b9853e9db56c9169b461099d381f844976f4c2375f
SHA5123110f6fe782033001cbec6e835422fccf5b092e7c35f38c68dc556d3e0029f322e94f5f6309375557eb59dbb2686a7adbf0fa40e87822c167d0370f0c90e682f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\additional_file0.tmp
Filesize47KB
MD5515db84af8eace805caad5cfceb483a0
SHA14d93796f7fee2ff47e959a153f5d6cd5f2b6cc5d
SHA2560c78af5525f3110fbdf2e281e0e8e3278b717902d62fdac083b05b7b053f1f75
SHA5120879f68339b32d88ed7817e72fd9df17b289e6dc1f4997bf92b9fbaa1ef39368236ce5583f7f40c3c8a06914539cd1f0564c27dcb6976665f43fdbd2bdc170de
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize71KB
MD5142b88219a59347c77548871da514af7
SHA123a2c08afed6f4b5240b0933234543dc8ef33c3a
SHA256178caf31a64cff8b47575c680750c815b32b43765c9080c98090d1fde27ee974
SHA5122a341d21b212bc14c5fee1cae5a320c5bff499673dfd2c0d95e0483d78ec38e3e0326ad13b9ddf040be208a1f42a091b543629b3561a252fafff2f6bd2e3b195
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize82KB
MD5e043eb09db24cf0a472ede3b24eb1b08
SHA1bcc19dcb53a860285f5bd3799baab908596bdf3c
SHA256dbc185910ffc95b26632693573fc0d654481572cd6e60dbf2a4795ef04b6b8cf
SHA5125c5026604e8cc2295f1b0ab23bd59a8e79177e14c03630652a01d515f60c6fc6e9404117530392c176af39348cf72d99697dea0a5042aa2123274467ec0ba6e8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe
Filesize15KB
MD5c40a4ea966280100e0a13cdfb8bb6b87
SHA19e6003cef697db160edc28466f420b60b76ef50d
SHA256e938ded8d4b5a1fba935afbdf1c6f6fa74594909181ff1bb7aab8984708c1580
SHA51225dee0ba23f3ed4cc02b55bf1b100f836a477a2f19a0d4a2d7a17a1d247c2ac72904d0cd0a978a2f9bccdee8f34f017813e979e1a3cc87e2286ee4fc85430536
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\assistant_installer.exe
Filesize126KB
MD546f153f6e68d313ecbf057738932af71
SHA1a6a9beabaccebd61f7106730626da42aac5a5e5e
SHA256b8b6663f69d421f73d88cc04847731967bdc768c311fa55fa8e6f6869ce68f2b
SHA5125ac9b10ea532fc22e43d2edd659bfa2bf0920ce000aa871bfc731ccf6a8b7aa77cb135896940c2d36dba39329156a8631898b396d02af4954a57fec25e798727
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbgcore.DLL
Filesize35KB
MD51df79897da2134a6185f9d194add99ef
SHA1eef0232f91d79200b4a794c1bb9183fad69dbe90
SHA2569900c2c2057fde16ec6cff5f7a36411734d295a0a4c06153ed8981dcb7b42159
SHA5129e0cf22e4b68434a60cbd2919bc99525b23b6da9e95b09d7ed75c024d29a76b13640ef73a1ff7da8dbda1aa9680c31e843144fa29c7ad4e5401ad0f0fb4ce65d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbghelp.dll
Filesize31KB
MD535ffa9120b9ad5f3ac88167e78a9f7d9
SHA18e4c75ed9667311f8d026554c42e360fc6a6a6c2
SHA256929074a47dc0323b03336bbb24ce26bde8cbbc01fad4a9a81688bb67429cddba
SHA5127b02cf4a95d0905cfc76dfd741362e5e88bfc87a148a577b487b1278471911b21e4e7ac7d1c1fce63083fa7ad4cd8c2ed99bb17f48e60049986bab579b114781
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\opera_package
Filesize21KB
MD5174c28476ad177452f7e8ece80bb7539
SHA154842cae4b2912c5a5e769310c28be5c5f506a3d
SHA2569f4c0a83f1be431f1f952dcfcf4c5af42f7febce7f9fde7acc543ac827030433
SHA512aa5c3e84fdd99f343792a90ab2e4bb703320e778cf2c60c8432bbc46e378b428a09f7100618cb5e4f7bb173099142042d66625c2454b69d7ae41a4bc594db3f7
-
Filesize
38KB
MD5c3b6e44e6cf7fcdd96c58b8250470b3a
SHA1772a024fad0c3d6955e5b03231a8936dcc044552
SHA256b4b4386638b849c170d2ba735621b1e442c59d38a90363a195cb4e8e4a447d52
SHA512592ed8a35433a0840f50dc1a1a8b9bd6165635bce5e00fa2f8491074dd65678625eec2026499806dcfadada6207d580acdeb27ca5a576be67198c43d48c5d53c
-
Filesize
61KB
MD5172a68f993e4e44cb5396017e0791755
SHA1897dc4aa2b3d4b0d50a1a8306ca4b5a28d103883
SHA2563cb36e8a29c9a23e4d92ebd6bf6cb9957f03149f7468987f532ba364c7f41d56
SHA5127dcc77b25838729f1a0bd111166ca7e7bc643999e48ce757cbf7210d7efd26c78b05c27f0c6f7c940912cbbb418b37718d39d894430987da219874cb5e5657df
-
Filesize
63KB
MD51e01d74c50a3867ca0d67cadcfd61f4a
SHA11346609c26426ce07fdc5e339bbff94c80472953
SHA25687d72676f85592612440a5a69a06e5137e47ced3db8defa319040f666e983888
SHA512cec9d9fab097fec0aa618c5b542b3ce27a95ecd31b7fdf43c41dc15bdc564cca11b3bb50667357c9346f4d67aeee19580fb2f7ed2b0f2740dd6daa0c61cbbfc6
-
Filesize
1KB
MD5dc92cb31228d9e9c38672a3d0daa4595
SHA1269f4c68152d90d9b97d5500fcf6edff785f12de
SHA2563b7576b5b4246a390e19e20b0a654be13c853f7bdf8257f5dd175d6be3aeee13
SHA5123568e181f68398c8a8a262deae51ca9e92a9a75ace50c0c45396ffb707c2c2af807765120534bb997a5a1ab276ac8848ae9ce45b470aab4c333bbf0e3131553e
-
Filesize
84KB
MD525171d113d821580a154b4ef011e59c9
SHA11c18224aeafac28a9ad1ed90e2dc8800de833aff
SHA256582a94673a486d4debcea3ec3927f9876a2868889bc93a580dd9bacd5d59022d
SHA5123efb7f53e01f085e05193fea2d6a5ba8bbbb30a75765c89dce00421f8cc0abe997e883a0e658f41006d979e6a9d5d98aa7ec2b12e8a79660007a4136a1063851
-
Filesize
48KB
MD5efd9f8f7487714d754e4db34f3638aee
SHA1ad19391fcee5bec1baf4255dad25c56d47f3f946
SHA2564b1076cd9902945a08186af176ef1758192dadba10e315ea921944a13990a182
SHA512ea27b5106945123c8ffbf78fb67ce2657a743291121857332dcfb8ea44b2231cb3e25d65a6d16a67d936945de167a9a839ffb6a7d77256a8b4ee6d39a233faf0
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
18KB
MD59583735ba76afb53935b53f2e178bc13
SHA1ddad65e45da8957fec4a26f0049a5e43da6de871
SHA2565962bb217e74aa530980ffd47c8d0eede8c51da1d1b49b4bbca5f82eedbc27d8
SHA512626e392c0ee2d15b0ba25f0dcdfe356e0217dc0f0bf2d783a9ae69daca67710f239249942d368ff2ef111c715cc1e0c9f3fa85c069c6ce2076e5bad53031011b
-
Filesize
8KB
MD575faeb3ac3eac7aad5c41c000a2b9991
SHA198d413c676bbb9c135504ce0c0a9aef555214443
SHA25666c8469755ff56d4be5a8c9570591d78fb12dcff2c056a2ed9d83b64f0529e2a
SHA51221cbdab46004da1a0126185e8be64091856130767456f683f71998925232057ed098898f72db261a6be5007525f28d8ac1864c35f38a1087fc3167852573f276
-
Filesize
285KB
MD517f261c480c76e716b3f142b19442332
SHA128fbdde250e721808d11860b37d8cdf86c4141f5
SHA2560629bcf140d61967b2deb8e341bab6aac7e9fbdf3ea03251c7379a42e3a2fc00
SHA51295bcb503f47fe339ebbcc048a2c5150e414d9f42dd0de5ab64765ecc5e6c193c24c9503cd0baf4a18360af7b09c5affa3b4be6382e90179856bb13644eef4850
-
Filesize
39KB
MD5803dd8cb4ba9d31fade65534055d1e5e
SHA1b577634f74b468b4e9b51d24cf6e41c8e3e0d609
SHA256fb3e164b619d2367c8101b2b18fb5686575246684ea0cf90115f602e7c7013f0
SHA512bae5bd173e141393bdc1da7c08707b8eaeff2de56b4e14629d488476c12221c2f3ecc4f13cc829079b282fcaf8967beadbb9a020997faaf119d208dda50b7bd4
-
Filesize
36KB
MD578d63437c140b6a37458795128ceba20
SHA1b87ee83c941e307f1385849bdb8eb706934dd377
SHA2567a3d326e1e8aa227bbbea3db4c40f445a321fc58f52763e0c346a132c24c2d4e
SHA5127aff4c5a153901bb77d235bc2176775df5c33aaa40d75b0ca517a8fab3a5e01a290805c2222d529f4749960fea283280aba0af14308cb6758d60024ddd550a50
-
Filesize
5KB
MD566694bcb9f76576371b98d87e9277064
SHA13af2d97520d0de5fc6763869a73661c770ced9f0
SHA2564ebd3a610089c3bc78019525b591508c0750fbb583558af4951e8c96957c59d8
SHA512904818a79213a89f3e5b858b5490df5cffbcd8283d409131beaef4e8f6fd8bcd3c75749749ebc5bb306af79933deca461ccac6d74ca2c60febc0aaa40cb22f8a
-
Filesize
40B
MD51150e175399125627fa37c5aa9659495
SHA131bbd53118def6e2a75f933c5298bcfacb074e2b
SHA256b5b4c785912c494b4bc5f5e572d160bd1449cae2d0513dfa9f97421439a90c72
SHA512cbd196a13134329a41ca4ad9b1c3682a12d0cb774d31a7e006ddb0d49b9646f20e0894d0561c31631c5faac057fbd5b95337e799063b005c01d0d9743e8134cb
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
11KB
MD500aff9ecd438ce05d1822d5352e77a2b
SHA12a6d53281ca9861c77952a47ecff27c77cdde92a
SHA25656090ae2dffba59a1d5542aef7a136d7cac8689094885e84345a438c9e24c20a
SHA512e37300927679164a4e3e54e094eda173b07e449fc044e1ad8d0127b0f8d1451627ea5ab1bd22417b49c64f18e46577b5de27bf17bdb2e65cf02cb802413bbc89
-
Filesize
98KB
MD574c18ba291e6b86b05cb1638859eb716
SHA1c49e0a109b638a5d5edbb89f731990b11770cd3c
SHA25646e3f6d66a265aae1940054a86e353d1635c74c56102712d27a039b5d3690aaa
SHA5127deda038df772bf6e3fb83baee9f2e1ee60e61dc0e6ba84455efc1e927524abb825c52de4393c3c628dd326e3a488b4440121c4562ef7fa973274d5a2063fe39
-
Filesize
239KB
MD52a44af1a6d3031ddcf9137eb53c62aa4
SHA122d2c7c09602588d9f999a373c038b348e720c24
SHA256cebd85482abd1af62a65d200113ddf9098e15c93791eb91b131646cbd108b458
SHA512f6da74bc40c1b6ab3eb218bf52f4d864ca9a8d709c636c055ca8f28c30f6858912efdb6136e5926cebe6c6976d0231824d8a403f39b97570cd5e952b9b7e06b4
-
Filesize
323KB
MD50b2f1c262d596862ed70591773cd811a
SHA127a0594738ab2d363c01f32d200ed39b9a082036
SHA2564f7eb7761c8bd4bb0a612c89df0b2ac1c17b4a84d5aad1eb067249e5ec9bbba4
SHA512b2f18f25d2c835c2444de7a3e00fb4b90d4b73e2ba10964cc799e5208f520cdbf50afdec56e2a3c2829f84156a72c37309934104324d5fd85ecf9277f186c73a
-
Filesize
6KB
MD57691319ed9c148ddd6de8b9d6b3c04fc
SHA17c8ea6022132c1e60d8945ca4f4edb8a5c6e8cf1
SHA2566f04a909ae07ba0bb212de47013576f5b6ce93b509cdcd0ac05751f30f661724
SHA5120870a24ed288ead6ce7d01a5770551dfc51c0be374c9d9d0d3df2e2dd16010baab473b433c016fae6a1f73d5cd1cdb1b7fa287b975c351c657a521c60620747f
-
Filesize
38KB
MD533a9a23938983f29f00651d2a2b74343
SHA1d46f262c56060a9be14c071d11dff2738afdd7b9
SHA256a9379462d3dcaefac874d32d59554ef9983c0e1bb51673ee4b2e1409730e75e8
SHA512627c38bd70fc1cbe94128513242491a8da94d1a07f785dead1071eb5bd1f851aa54208bf58ac8509425cb0b625ba486d100c03357a6be03b4079cfbd519c88c5
-
Filesize
48KB
MD501ad5115dabc7b0d4279e1071597f8df
SHA1f1eb98ac132399c5c2b7c5da0ca2125ccac708fc
SHA2566643589206b24f0114c212bc0a3acec60ea16662fc453304948b7afee05fa5c0
SHA51216f5c0abb07ea770497e59f00749ec4dd54190af31e96aed6af339ceafbd2372b0d2a6bae66505af0d478195da67298ed5870226a7dfcdfa2aa73d29e1f840be
-
Filesize
92KB
MD51f3a88f82ab150f3636b8a7fa07e215e
SHA1e615c2aecbbd3e2c311d9c236f0614cfcb8b8c00
SHA256c2483d9de6fa0d6fccc17d94640a4fd88479b5b9a2e8055455950951d62c7a27
SHA512e175bd64c8f01e67e881eb9475f43c127a077e9c3a6ca9c44c1549506c9b88e25aedced599b0cb593fefeb1d04e4d2ba013bab039a183a074da18d3e88fc840a
-
Filesize
96KB
MD5fdde241c9869b8c3544e45eede32cac2
SHA1155a0cb568a477f8a96113e3100cb66d7f326dad
SHA2566a57fd524febc580cc9d36a569430b7bf66eee30a7c2182d7ce26ae2641d4504
SHA5125fc762adbcd206886d5ad6c18c7b7ce404a4cb7fc24652baef5a67c858db0d29b3b64fb88f3e6b6cbcf878cefc6e5272f935429b83bcbf3aba2964bc5b7ff6e9
-
Filesize
33KB
MD57aac502146c25a4a256dc430b3cc0c42
SHA1343bb131ed6460b60232e126c6c180c23231d349
SHA256dd2142cd15eabb9234ff919f8f15d2f5229371777e0f5d0e56f562ea98ea4832
SHA512092294c946bbbe34cfba1eff0416971086733754e8f8999c58e326274cdac2480dd8e4d0f9e754e7ea71e861738ecd611ff667b0c3e2bc294119f06dbc292b9f
-
Filesize
51KB
MD550762a65ad5b970358b917196e90d88a
SHA1029bf12c7be4d56313ed28883327871fa3fe9f68
SHA2562a684cf539f5715124c6f18a50cad904b50e783739bbe89f9b7b14077dd470ea
SHA512a86763439d81f0bb2e1fe18f3050b4b9048878da9ae3c61b6cd6a681302823077d7b46ec910d5788e4dd5dd2716b1d6703c9a2408f249506aa6331d2a572f6f1
-
Filesize
31KB
MD592d40ed2ec29681f66b87471eaebecf4
SHA11e01f37b095bb3691eea898b9ce6eef06bb8894b
SHA25609243a323a4553befcf16e99b007b529d539ef51d6eb185a7a87dd26b5381e83
SHA512872eedd23324cf48293e4a707578c56d227298bc67d126d31ba7b36e94c4e150d633f7dc176c4c74e77b1cc35407f98ce49aa8d0ac4fda2ecac0a1b0bb9a78ae
-
Filesize
5KB
MD518b476e2126b9e468c8999dfa7cab430
SHA147ed8f34f4d59822c558d5abb164da87662ff0cc
SHA256f2d81c484ed907dbc2cbb929472bc4cecd4b18e9d27f6d469453e977284ead47
SHA51201c9b668b6e3c78f72149dcadc67b62993865493a72dfc8fccf9817060b925a8967cd1c96a359bebc699d469a783e30ff960336c8fc853c1c076c0e03d28e429
-
Filesize
104KB
MD54b0b3aa9771939874eeaed47f3e5f294
SHA1f72a1e5a5b6445927a8de80467054657979c89dd
SHA256d3fa64a2a2753c9620f1005fe84834ec9db9ed5727003598d429f1f49339c97f
SHA5128242f8421f4c9d0423526811a1c5a8be11eb8a0bfc9f1c92d1572f0f3c2d490bf29f37e94b3b7342e21def7a1c1485c770da1fed13e9b16f86d4a4987cb9e7a5
-
Filesize
60KB
MD5169421cd949435ff4d4137f7033975ef
SHA14511ca266becb2b0deb30b69ffddf734b9a97e9c
SHA256fcf86541e1309dc3b7c68cffab014fab541b3cdfae6aafe1381cdd4fde94aaf8
SHA5128251bfe266d852b6875416cb9a5b681292febe68e9a89027f3e544b9e740be3912db154b399c54db97540221ae0f22d51041fadd788816d7b77951d1b7bdfb29
-
Filesize
44KB
MD5f1866821d7fbe4be126f1dbc8bf14bf7
SHA12d3be56d64d2d60f8becbe7603412df3ca9c18e9
SHA2563954b5c032d353771e89e46702d2ce18325726a83f3ef43858fa549eeffba97f
SHA51239eb0b9a5b4dc02d014284a9621ab284062a0ff7b8629e0ad2069eb5ae757d4d6b9ba0aa7f17e9d9f67804eb9d198b95ecbb013ac9f34f594cc500352a7d21a1
-
Filesize
96KB
MD55747b2f458d11a72ba0e91238186aa85
SHA1112ff5bc9112f2ab45796b8e564344100b05f235
SHA256b55391dcfba5f6555e68803f403f6885a5423e2adf0cc6569b191790fd3a1fca
SHA51269f34e290cc71dee3cdbcacf3267b98c381b3058f1935fce55094c231bb705ca7020f7bc4ecdb6aa3fca6172b34ba145179bb8205c4332ad5a9c14a7b43b6234
-
Filesize
104KB
MD514317071644f87ed3cb08130df18d4ee
SHA1ae6e3fccec627ba2cb167f0c319e8a26af82a9ab
SHA256926825e60ee3ddc4f4ed808a19a64a6066b453e08fcdfd657251ec36d7e7cb5b
SHA5128aeaf9d560de28841c06fb4d8051a2c5fa92d3454c3f68afdd304264206602099af58a5c445b7c1a35b362b7b3d66a11a4de9cc4538e0797f3c0b096cb723179
-
Filesize
37KB
MD5b6945bf407a0f1edde81eaed993bda77
SHA11e3a03bb5933aae94eca541117a43a32dabd362f
SHA2561738e66fb66e5c6440d0d13d226c984446917de6f52be53c4daf407cd8cf82a6
SHA512dc78d4e09bd9d7bcbfd3528bc50afdebf3f7617b4c39259dcecd13fd3de3e80f3f1a215873e3b5f1401a8ac3db90a21372d43f50d45d5e02b528bae945b177ee
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5d3ca393d14a81bd251df41230d02834c
SHA1d52138863456ae96593f637a0e6994140752cc14
SHA256d80461f2f55d94d33fe5d4193cffabc2e190ef80da4ebdeda13d77c51de6c38a
SHA512523ce95ba9d50bba5914b6500c08dc76796334abfe835670cbf663cbf69ce1d00de6fc25ab2255694c3ad74724c544fff1e39b4207d90a6f42b7cdc4de737156
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5e0d77f6b6a197927e72f1fd8cd8b9b57
SHA1d27f0cb2222cc68c740435027f44ed42b5633efa
SHA256537961382b2d7fe7ca470e69f2ef7bb4632ea045aa402b5a1883a6ee034d8647
SHA5128ebab01793d7f5e6bee002c8dced013d1beead9612dd20203e2eaae0d699488348a7acacd381dbd305e1ac07931b6153dfde70527ac36e56000b5561f024d86f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize1KB
MD5681c4448ca95cf7162dbdc5f99659460
SHA1e13b23c75e257a40b2d7d931a867f7d68d28e66d
SHA2563fe009ad45a2503fe1a65939b9aa0608cedf0c6d1a3cc448d90395a24dc96b08
SHA512dd3f164571ee11081fd1e58a2fde66755d886ddf33125b95660ecafd241af87fee4284e1237ec6f35e71faaccf1b39c39f7f554483fe2bb567a201b8bb963d4f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD539f5da2a0b1b5096f56ab40404da202f
SHA1a0ba062cb19fe1baebe22ab32861f6a54ef95676
SHA256f605ae8d4581f9add7ac9461c1b9b512b0ab2162212b00376b96aadc95d69c73
SHA512b0e14d409eb481578d789f9b45934f4273cd96ae3a5c54b788512704a670238fe428f815addc194725bd403eb6982c268057128927a008aa03d666f70cef01c6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5494cdec6020a6d76302fa027b31a0be8
SHA182d5f69e6e52391f0b114956d66849ac7cf1ff01
SHA2564f30684ef71bcb87699cf18d072a2b35918d980819f52c8b2b16aaab78286eb7
SHA512183ed20a54827bcebe5b376a28e09c6090712c9f04eb6bdda9eb6aeb46bc4c9bedfed92d9168f30daabc88f220b4386e6da34d6873180374e9933d6d3071a452
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD52cc54a5e6a988614d2c095c7066c6fa5
SHA1a9162240f8d8468db364942102f8b7f1f6f25a38
SHA256bbfed64f69969cad3f5164eaef8f7185f6edceeb15d421ba67a872da23d85070
SHA5122d537c71421b25ddb8cec15d66c3f4ff8d3d736b16edc086984fdac436a1ccf5514840251453ad95f29b18165823032182f788c2feeab9d58eb14fcb87840d8c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize12KB
MD5f8feecae5f2329098383441cd6c9bd78
SHA1d656827b4add12d7dc684ee1871210c3f2c8b82c
SHA256ac0dbb66466a4bea04c2d2e9f531ac827a28061e514eb8d5b9251167c90bbb36
SHA5123faee6e07f71eee91f4b4ab7c5bc5f8b01bb0903628f96928129737c4f903ab81be6483413110def7f46a817f9dc4013eb2b908f2fd16a09511a34e7ca584438
-
Filesize
143KB
MD52315dcecbd28c39d9f046196aca33b58
SHA1615e769fb781ff4d4c619d02347d30247f6eccf9
SHA2564e1b8d37ad00773ff9dd8fd8f7f70c3ab11c60dcd212dd78d067188aff86180e
SHA512e41f98f585760c4d69748a811628420370db66b59d292114d2ebddff2e4689d84948ae4a81e98d0a22a2f16ec58313023973c0adb81d13bfed77fa38651eb7f8
-
Filesize
108KB
MD5b862f8a5a37d20551f2d557aefe99df1
SHA18e5a1e4cdf430e67502ca5a45cda23bb9a0502c1
SHA256f29db2facdcca767cc058482d59d2df403b5b7726cf63223f4eb8e99e7e4166d
SHA5123039ec2b172f954a2b50653d651cd0d4c81c382494f470d189ed990914ed2fa3a74a0d9e18d6eb465246ca99cd1072985fef4a0e8734ed75ceccae7bbf821437
-
Filesize
92KB
MD5441723678f43bf65c88b44de553af1e1
SHA15eae11167578684bb08544d82e9074a23ddf1eb2
SHA256f71ecf979859e2d3119ce139e25fe8f349c46bdf882c8cfbee8db820a9511f75
SHA512eae124ce8f98a6880a4e7055785319c9d97db8927b1b4ff7f3634ccff35d8328ab7243eb0d75b6f17ab27e19c8aa19f3df81779957c1814e4224b2e1b2d5d4b2
-
Filesize
120KB
MD53ae1ec8f0cce79689baffe7a01b45477
SHA1d9b0761de57fae56107cfe5383da022dc0724f4c
SHA2568a636b0e93b23762b72e3342a470283fc7d2982b0edddfda983ccefc03de2755
SHA512bc0f7193c1a21f0c50719f4ef560730a30242f99456cd0f13e1e1d8c4199408b66b06f209c72e156c590662b203b22094d624a898ee4c07ca1f4794f3392f5b1
-
Filesize
49KB
MD53b79d15cdc483a669c46aca9a45dec78
SHA10f88b4aacf65c887a8c3356111bc3e40247a8165
SHA256d9dee87ecb8d6f4b6395a7686db4a55ece0eb14fc2b5c42162552b2b19d79d91
SHA5121b5138a25d9c8ed1107acb0c469020a1b1426b27a794f603ec395764d7414659c59255d14aa5899b568e974d396e04ee23065f2c8585161d43d85216bdbf3c1d
-
Filesize
40KB
MD59e852bac37aedc27e20e9da50c9654f6
SHA1e687b1f52a75e1486da15c08ccf12bc787370f47
SHA256f33f43878837d02e1928d7b2c44bbc103abe855eaafe1de7c4ab213f8494435a
SHA512154c270bc515bd0f29bc8be4c54feeaefca04f8b772fe9ecc493c2b186395410de2868221987d2ac6ef84fc6f9eceef507015524a9daa1899619e5ada4bc5af9
-
Filesize
92KB
MD5df987deace3fc06e593e47b66a1b6518
SHA1ee77ea765923b91a8a2434b76b1a631c8a64951c
SHA2566635cb4db4db69fa34811d05891414991737fa439e9f92d16ff7a75a12558b23
SHA512a99a63bf35cbcd0ca947ea223282ca4fcfb295b4a2e6b7f3a8afef4b32b196a5b593dd8073443307215bad0934075d3afff8d3496da12b63b4ee8afdfe44dda9
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbgcore.dll
Filesize59KB
MD5288aadd320abcf7d3a2defae77b0bc0a
SHA185b8131f336a224ef412fe4ab74fee7d11fed274
SHA256b41b33a8d63ce43649e60467d7ebcfb141bd89488aaad8d0dd6a292258f35573
SHA51273153225d55562163a3b71a5c93de62c45a6bac1e39558cdc5bb6ea7337c3578f8bd9bbbc197ed439c46bf4a47b02399f9d70d1bfd09ee755310015fccd42f48
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbgcore.dll
Filesize74KB
MD52ee54d424ee91dd7f5b23d18eed82c0a
SHA1f7f13a5469f15b73159474b8cb634ef5f61d31d9
SHA25601bcdb14a9064866879627bd4fe1e5350839f67796a1ed3a1f6d433d62dedb42
SHA51210347ee5a6c840efbb81a9fd3923b288101704400d76eacc90e1efad0fde3436997428d23348c13194ccdb580e824458c4150e19079d62395696be5da2bce8a2
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbghelp.dll
Filesize32KB
MD5ac9f6ff7ae1c32e2b0bbf51f27775a79
SHA14750a62924e836bf9442e43917f27103d2ec1417
SHA25675469707d83292fab145a46e1d46f01c76fc2100bb24ee3cf337aa4e8fe6841c
SHA5121b6b98e69641c8e5c5d2d8deb55d45393a69939800155ffa8f2e8adae5f3cb91a37601463b0a6313fe8089d0910d02b95877f1d146c1d23111b9b92ac8c2c3fa
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040342241\assistant\dbghelp.dll
Filesize30KB
MD526e116f3f859d798765d4de007787066
SHA1bb75a25dc22f36e0998c46c695f8fc2a7777e1c0
SHA25614023ba5da05950bfdb58ca11cdfb0d10bb866b7016449fde16d15fbb592482d
SHA5121886d6c8e774fb948187abe22ddc9da91bb0a55576abc4d425b81f704d6987e50bdd33b9b202027bad9d321eb75c1125dac5cae1bb37b2e61c73416d75712978
-
Filesize
93KB
MD5f3eb1597ee532cacf024f091f9033ef8
SHA10648cd2e6a3039bfb4f776f28ea8e5bbe2fdc0f7
SHA256e37b3fc3f0becc32c1d5b3f7b765e5c703165c606c86e50550e65f848ae8710f
SHA51288524b35e5c68e6edb3332af9d1c6d795ed1cf93b5f0ff1867cffcced52577900ec18eece6b2ff31583ff34b765b7c40548b53074dc0b2e79333de1990d96c65
-
Filesize
88KB
MD5216af1535d6651145052052b49d35708
SHA1d21a3cde90aa0dd9eb3d2c550fd60ae4f1eed252
SHA25693d79f46a285683e9f121800cb133f3991ac2d4ee219b9015ae0d83ec3a0b910
SHA5123a8839bbb66029a7453e6ea9bbdaa21fa5b812e55652e4711b9a873cbbf3c4d4ecb5cabdd58ebcc03b53472209502f9d52ac835f264bd2cc40ec36c0ca5bb0ea
-
Filesize
9KB
MD50a72d8c449694344807158850c4d89d0
SHA114d5c39e8698212a013ce2d051ceecf046a1d8d9
SHA256ceb67e54ccf0be9e24c2838564a3930fb6dd07dd8ed65586c69ac2393451d4e4
SHA5122943094453510f5ebf6f5291fee14a9223e95c76b77ddd60763b7af67970fae284d826b16c0b2623f54d3d0ee12ef7a57dc761cfb8678afa8195deecdc0042c6
-
Filesize
49KB
MD5359e74c630673b8d71f1bd0ba5422a91
SHA1d16bbf5b44cc04a1fc6f0432ea4209804e03c891
SHA25604ab3395c84c1789dea9704762a503cbc4d547e8d7bbf90cb495f534bf0d69ef
SHA51263e12c2bf63b03f2e1bc6e37f9b72fb5270254f3c8611d50985f8721f92c65b1d5c37ad5de0d3cb8fa7d5516e5268915d05a97cdd2e72fa40cb6b53e9c48f459
-
Filesize
8KB
MD52e4f322cded0ced86362d3be3977110e
SHA166c48a2ca667ad87bf491f1657c8434dd268e534
SHA2564b2b451c186ab7751febd62fca0c85d27c5c09b7d40efe8f612662ae1132c657
SHA512c2fe56c95cdb7d5671cefdc2e3c986de2ea6ebd6cdfedf6cf7b00c9ddf6323daa3ab55498f17ede7fd41f036e7b06d9414a09feae6b91dac54156c9f5409a535