Resubmissions
09-04-2024 12:07
240409-paay5see45 909-04-2024 12:06
240409-n9qcfaee34 909-04-2024 12:06
240409-n9pqxahg7z 909-04-2024 12:05
240409-n9n5daee33 914-03-2024 04:54
240314-fjy8nadc63 10Analysis
-
max time kernel
300s -
max time network
308s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
14-03-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe
Resource
win7-20240221-en
General
-
Target
3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe
-
Size
45KB
-
MD5
e533f92146fcacb8caca823882b8d304
-
SHA1
fcb2b79d08e2fb7a58142faf7db2a36f142b309d
-
SHA256
3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe
-
SHA512
334b90d543b5835f88d3891c03fe78ac91c2569e47bfb11fbae58b9544fa569f411e4a2d8b57049a97f79afd51312eed57dd95c74b680331882ca77a46888c69
-
SSDEEP
768:ygDUz4vSd32TINlRjiniKEc3dJ3Bwj+3p5SNUMNTEFiRQ:zUz4Kd320N+nir2FMN9NeiS
Malware Config
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
socks5systemz
http://ejkhuuw.ua/search/?q=67e28dd8680cfb2d4008ab1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4fe8889b5e4fa9281ae978fe71ea771795af8e05c644db22f31df92d8838ed12a666d307eca743ec4c2b07b52966923a678df613c1e697
Signatures
-
Glupteba payload 9 IoCs
resource yara_rule behavioral2/memory/12300-99-0x0000000002D60000-0x000000000364B000-memory.dmp family_glupteba behavioral2/memory/12300-110-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/12300-187-0x0000000002D60000-0x000000000364B000-memory.dmp family_glupteba behavioral2/memory/12300-205-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/12300-217-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/12300-361-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/12300-484-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/12300-653-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/9472-944-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\LpRhF8jaeig6QHkQ4x7HDip6.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe -
Contacts a large (4085) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 13628 netsh.exe -
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\C2qxs2cNsaeMtBF0dPslvf47.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WVdofj2ihUbUf2GySOlbg9zk.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IcEPwP8Fogjg2W7ZzqWc0eet.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GFiDhXpm9UZ4fbhd0275DcSc.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vWQmToaqHpT81LEzGXAWX0Z4.bat CasPol.exe -
Executes dropped EXE 22 IoCs
pid Process 12300 LpRhF8jaeig6QHkQ4x7HDip6.exe 12608 wRK4gVHGCuBxboGlpbInBGJe.exe 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 16328 textultraedit.exe 15808 syncUpd.exe 872 textultraedit.exe 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 8936 IZ58qMA0IlA28BMF2DHwMPAj.exe 17136 BroomSetup.exe 17552 IZ58qMA0IlA28BMF2DHwMPAj.exe 18588 IZ58qMA0IlA28BMF2DHwMPAj.exe 20444 IZ58qMA0IlA28BMF2DHwMPAj.exe 16332 HIIIIEGHDG.exe 9472 LpRhF8jaeig6QHkQ4x7HDip6.exe 15020 csrss.exe 20164 injector.exe 20292 windefender.exe 13932 windefender.exe 20452 Assistant_108.0.5067.20_Setup.exe_sfx.exe 10040 assistant_installer.exe 15692 assistant_installer.exe -
Loads dropped DLL 15 IoCs
pid Process 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 8936 IZ58qMA0IlA28BMF2DHwMPAj.exe 17552 IZ58qMA0IlA28BMF2DHwMPAj.exe 18588 IZ58qMA0IlA28BMF2DHwMPAj.exe 20444 IZ58qMA0IlA28BMF2DHwMPAj.exe 15808 syncUpd.exe 15808 syncUpd.exe 10040 assistant_installer.exe 10040 assistant_installer.exe 15692 assistant_installer.exe 15692 assistant_installer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000600000001abf9-172.dat upx behavioral2/memory/6052-175-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/files/0x000600000001abf9-183.dat upx behavioral2/files/0x000600000001abf9-184.dat upx behavioral2/memory/8936-189-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/memory/17136-203-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/files/0x000600000001ac01-198.dat upx behavioral2/files/0x000600000001ac09-206.dat upx behavioral2/memory/17552-214-0x0000000000DA0000-0x00000000012D8000-memory.dmp upx behavioral2/memory/17552-215-0x0000000000DA0000-0x00000000012D8000-memory.dmp upx behavioral2/memory/18588-245-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/files/0x000600000001abf9-246.dat upx behavioral2/memory/20444-252-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/memory/6052-273-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/memory/17136-295-0x0000000000400000-0x0000000000930000-memory.dmp upx behavioral2/memory/20444-371-0x0000000001150000-0x0000000001688000-memory.dmp upx behavioral2/files/0x000700000001ac3b-2209.dat upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 152.89.198.214 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\csrss.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\windefender.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Processes\LpRhF8jaeig6QHkQ4x7HDip6.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" LpRhF8jaeig6QHkQ4x7HDip6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-313240725-3527728709-4038673254-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ledger-Live Updater = "C:\\Users\\Admin\\AppData\\Local\\Temp\\HIIIIEGHDG.exe" HIIIIEGHDG.exe Set value (str) \REGISTRY\USER\S-1-5-21-313240725-3527728709-4038673254-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\S-1-5-21-313240725-3527728709-4038673254-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: IZ58qMA0IlA28BMF2DHwMPAj.exe File opened (read-only) \??\F: IZ58qMA0IlA28BMF2DHwMPAj.exe File opened (read-only) \??\D: IZ58qMA0IlA28BMF2DHwMPAj.exe File opened (read-only) \??\F: IZ58qMA0IlA28BMF2DHwMPAj.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7405 pastebin.com 7407 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7482 api.ipify.org -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
description ioc Process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4672 set thread context of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN LpRhF8jaeig6QHkQ4x7HDip6.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rss\csrss.exe LpRhF8jaeig6QHkQ4x7HDip6.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss LpRhF8jaeig6QHkQ4x7HDip6.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 10740 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000600000001abe0-98.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 syncUpd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString syncUpd.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 20424 schtasks.exe 7780 schtasks.exe 12732 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-231 = "Hawaiian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-392 = "Arab Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-632 = "Tokyo Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-751 = "Tonga Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-222 = "Alaskan Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-832 = "SA Eastern Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-911 = "Mauritius Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2511 = "Lord Howe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-402 = "Arabic Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-91 = "Pacific SA Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2611 = "Bougainville Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2611 = "Bougainville Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2371 = "Easter Island Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2321 = "Sakhalin Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-622 = "Korea Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-402 = "Arabic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-832 = "SA Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2001 = "Cabo Verde Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-132 = "US Eastern Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1472 = "Magadan Standard Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2142 = "Transbaikal Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-511 = "Central Asia Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-332 = "E. Europe Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1842 = "Russia TZ 4 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-731 = "Fiji Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-215 = "Pacific Standard Time (Mexico)" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-1862 = "Russia TZ 6 Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2342 = "Haiti Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-104 = "Central Brazilian Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" LpRhF8jaeig6QHkQ4x7HDip6.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-651 = "AUS Central Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-682 = "E. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-2791 = "Novosibirsk Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\@tzres.dll,-502 = "Nepal Standard Time" windefender.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 IZ58qMA0IlA28BMF2DHwMPAj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 IZ58qMA0IlA28BMF2DHwMPAj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 IZ58qMA0IlA28BMF2DHwMPAj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 IZ58qMA0IlA28BMF2DHwMPAj.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 IZ58qMA0IlA28BMF2DHwMPAj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 9524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 9196 powershell.exe 9196 powershell.exe 9196 powershell.exe 9196 powershell.exe 15808 syncUpd.exe 15808 syncUpd.exe 20332 powershell.exe 20332 powershell.exe 20332 powershell.exe 20332 powershell.exe 15808 syncUpd.exe 15808 syncUpd.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 12300 LpRhF8jaeig6QHkQ4x7HDip6.exe 12300 LpRhF8jaeig6QHkQ4x7HDip6.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 20156 powershell.exe 20156 powershell.exe 16332 HIIIIEGHDG.exe 16332 HIIIIEGHDG.exe 20156 powershell.exe 16332 HIIIIEGHDG.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe Token: SeDebugPrivilege 9196 powershell.exe Token: SeDebugPrivilege 16828 CasPol.exe Token: SeIncreaseQuotaPrivilege 9196 powershell.exe Token: SeSecurityPrivilege 9196 powershell.exe Token: SeTakeOwnershipPrivilege 9196 powershell.exe Token: SeLoadDriverPrivilege 9196 powershell.exe Token: SeSystemProfilePrivilege 9196 powershell.exe Token: SeSystemtimePrivilege 9196 powershell.exe Token: SeProfSingleProcessPrivilege 9196 powershell.exe Token: SeIncBasePriorityPrivilege 9196 powershell.exe Token: SeCreatePagefilePrivilege 9196 powershell.exe Token: SeBackupPrivilege 9196 powershell.exe Token: SeRestorePrivilege 9196 powershell.exe Token: SeShutdownPrivilege 9196 powershell.exe Token: SeDebugPrivilege 9196 powershell.exe Token: SeSystemEnvironmentPrivilege 9196 powershell.exe Token: SeRemoteShutdownPrivilege 9196 powershell.exe Token: SeUndockPrivilege 9196 powershell.exe Token: SeManageVolumePrivilege 9196 powershell.exe Token: 33 9196 powershell.exe Token: 34 9196 powershell.exe Token: 35 9196 powershell.exe Token: 36 9196 powershell.exe Token: SeDebugPrivilege 20332 powershell.exe Token: SeDebugPrivilege 16332 HIIIIEGHDG.exe Token: SeDebugPrivilege 12300 LpRhF8jaeig6QHkQ4x7HDip6.exe Token: SeImpersonatePrivilege 12300 LpRhF8jaeig6QHkQ4x7HDip6.exe Token: SeDebugPrivilege 20156 powershell.exe Token: SeDebugPrivilege 14256 powershell.exe Token: SeDebugPrivilege 20276 powershell.exe Token: SeDebugPrivilege 16064 powershell.exe Token: SeDebugPrivilege 8808 powershell.exe Token: SeDebugPrivilege 15796 powershell.exe Token: SeSystemEnvironmentPrivilege 15020 csrss.exe Token: SeSecurityPrivilege 10740 sc.exe Token: SeSecurityPrivilege 10740 sc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 17136 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4672 wrote to memory of 9196 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 74 PID 4672 wrote to memory of 9196 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 74 PID 4672 wrote to memory of 20144 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 76 PID 4672 wrote to memory of 20144 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 76 PID 4672 wrote to memory of 20144 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 76 PID 4672 wrote to memory of 18064 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 77 PID 4672 wrote to memory of 18064 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 77 PID 4672 wrote to memory of 18064 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 77 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 4672 wrote to memory of 16828 4672 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe 78 PID 16828 wrote to memory of 12300 16828 CasPol.exe 82 PID 16828 wrote to memory of 12300 16828 CasPol.exe 82 PID 16828 wrote to memory of 12300 16828 CasPol.exe 82 PID 16828 wrote to memory of 12608 16828 CasPol.exe 83 PID 16828 wrote to memory of 12608 16828 CasPol.exe 83 PID 16828 wrote to memory of 12608 16828 CasPol.exe 83 PID 12608 wrote to memory of 9596 12608 wRK4gVHGCuBxboGlpbInBGJe.exe 84 PID 12608 wrote to memory of 9596 12608 wRK4gVHGCuBxboGlpbInBGJe.exe 84 PID 12608 wrote to memory of 9596 12608 wRK4gVHGCuBxboGlpbInBGJe.exe 84 PID 16828 wrote to memory of 13952 16828 CasPol.exe 85 PID 16828 wrote to memory of 13952 16828 CasPol.exe 85 PID 16828 wrote to memory of 13952 16828 CasPol.exe 85 PID 9596 wrote to memory of 16328 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 87 PID 9596 wrote to memory of 16328 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 87 PID 9596 wrote to memory of 16328 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 87 PID 13952 wrote to memory of 15808 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 88 PID 13952 wrote to memory of 15808 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 88 PID 13952 wrote to memory of 15808 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 88 PID 9596 wrote to memory of 872 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 89 PID 9596 wrote to memory of 872 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 89 PID 9596 wrote to memory of 872 9596 wRK4gVHGCuBxboGlpbInBGJe.tmp 89 PID 16828 wrote to memory of 6052 16828 CasPol.exe 90 PID 16828 wrote to memory of 6052 16828 CasPol.exe 90 PID 16828 wrote to memory of 6052 16828 CasPol.exe 90 PID 6052 wrote to memory of 8936 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 91 PID 6052 wrote to memory of 8936 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 91 PID 6052 wrote to memory of 8936 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 91 PID 13952 wrote to memory of 17136 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 92 PID 13952 wrote to memory of 17136 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 92 PID 13952 wrote to memory of 17136 13952 VebtOYE0gRKq6CUIpkIgbHwB.exe 92 PID 6052 wrote to memory of 17552 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 93 PID 6052 wrote to memory of 17552 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 93 PID 6052 wrote to memory of 17552 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 93 PID 6052 wrote to memory of 18588 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 94 PID 6052 wrote to memory of 18588 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 94 PID 6052 wrote to memory of 18588 6052 IZ58qMA0IlA28BMF2DHwMPAj.exe 94 PID 17136 wrote to memory of 20364 17136 BroomSetup.exe 95 PID 17136 wrote to memory of 20364 17136 BroomSetup.exe 95 PID 17136 wrote to memory of 20364 17136 BroomSetup.exe 95 PID 18588 wrote to memory of 20444 18588 IZ58qMA0IlA28BMF2DHwMPAj.exe 97 PID 18588 wrote to memory of 20444 18588 IZ58qMA0IlA28BMF2DHwMPAj.exe 97 PID 18588 wrote to memory of 20444 18588 IZ58qMA0IlA28BMF2DHwMPAj.exe 97 PID 20364 wrote to memory of 20360 20364 cmd.exe 98 PID 20364 wrote to memory of 20360 20364 cmd.exe 98 PID 20364 wrote to memory of 20360 20364 cmd.exe 98 PID 20364 wrote to memory of 20424 20364 cmd.exe 99 PID 20364 wrote to memory of 20424 20364 cmd.exe 99 PID 20364 wrote to memory of 20424 20364 cmd.exe 99 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe"C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe"1⤵
- UAC bypass
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3cf0b82b4b91ac001ede7dfe7736f42e2a5e1bd9cc6da34393ec9e18ec81a9fe.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:9196
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:20144
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵PID:18064
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:16828 -
C:\Users\Admin\Pictures\LpRhF8jaeig6QHkQ4x7HDip6.exe"C:\Users\Admin\Pictures\LpRhF8jaeig6QHkQ4x7HDip6.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:12300 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:20332
-
-
C:\Users\Admin\Pictures\LpRhF8jaeig6QHkQ4x7HDip6.exe"C:\Users\Admin\Pictures\LpRhF8jaeig6QHkQ4x7HDip6.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:9472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:20156
-
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:13528
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
PID:13628
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:14256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:20276
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:15020 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:16064
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:7780
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:6852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:8808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:15796
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:20164
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:12732
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:20292 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:13612
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:10740
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\wRK4gVHGCuBxboGlpbInBGJe.exe"C:\Users\Admin\Pictures\wRK4gVHGCuBxboGlpbInBGJe.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:12608 -
C:\Users\Admin\AppData\Local\Temp\is-145J9.tmp\wRK4gVHGCuBxboGlpbInBGJe.tmp"C:\Users\Admin\AppData\Local\Temp\is-145J9.tmp\wRK4gVHGCuBxboGlpbInBGJe.tmp" /SL5="$302BC,1499526,54272,C:\Users\Admin\Pictures\wRK4gVHGCuBxboGlpbInBGJe.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:9596 -
C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe"C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -i5⤵
- Executes dropped EXE
PID:16328
-
-
C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe"C:\Users\Admin\AppData\Local\Text Ultra Edit\textultraedit.exe" -s5⤵
- Executes dropped EXE
PID:872
-
-
-
-
C:\Users\Admin\Pictures\VebtOYE0gRKq6CUIpkIgbHwB.exe"C:\Users\Admin\Pictures\VebtOYE0gRKq6CUIpkIgbHwB.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:13952 -
C:\Users\Admin\AppData\Local\Temp\syncUpd.exeC:\Users\Admin\AppData\Local\Temp\syncUpd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:15808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HIIIIEGHDG.exe"5⤵PID:13576
-
C:\Users\Admin\AppData\Local\Temp\HIIIIEGHDG.exe"C:\Users\Admin\AppData\Local\Temp\HIIIIEGHDG.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:16332 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\HIIIIEGHDG.exe7⤵PID:15292
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30008⤵
- Runs ping.exe
PID:9524
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:17136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:20364 -
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:20360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:20424
-
-
-
-
-
C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe"C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exeC:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.24 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6df021c8,0x6df021d4,0x6df021e04⤵
- Executes dropped EXE
- Loads dropped DLL
PID:8936
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\IZ58qMA0IlA28BMF2DHwMPAj.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\IZ58qMA0IlA28BMF2DHwMPAj.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:17552
-
-
C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe"C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=6052 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240314045531" --session-guid=22554952-7a6c-471a-87df-1010cc47ebd4 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A4040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:18588 -
C:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exeC:\Users\Admin\Pictures\IZ58qMA0IlA28BMF2DHwMPAj.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.24 --initial-client-data=0x2c0,0x2c4,0x2c8,0x290,0x2cc,0x6d1f21c8,0x6d1f21d4,0x6d1f21e05⤵
- Executes dropped EXE
- Loads dropped DLL
PID:20444
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:20452
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:10040 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x4f0040,0x4f004c,0x4f00585⤵
- Executes dropped EXE
- Loads dropped DLL
PID:15692
-
-
-
-
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:13932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
640KB
MD58868af676a4e9f4921e04e75d11515af
SHA1372b8e31cdd31dfa121880f35dfd85c9c039c52d
SHA25658ba04f01b2a53723e279783ee406133bdda68eafd10e611c6542dda5ef1eea3
SHA512225d474b6c624cad4ee641f8c5620edea11ef3f44016d88d339fd44be188b27dcea75505d943566297080894ba041482599c006331e54a803d1ca757468bbc1d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\additional_file0.tmp
Filesize448KB
MD554ffc65075d71d6b58e7acff0233991f
SHA1dc6aa42f02c3c25335b7f9880eac98ad1a87624c
SHA256507b0c6540fdf00a3083b4584c8c8f75592c9c58c4053930503a269414f3fffb
SHA5121a94464736ae740bf8d568642798d1c577e6404e9b24ea567dfcb6bef99a8c9073833af0c8b33f7e6cbdc39dbc255cfd8b02f782910449e3e081aab9239c444b
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
Filesize2.2MB
MD5832e9bccc982913a449d10efce383d63
SHA1bdbea24b47c6d274655c5ce5fa183e9a399a6d9a
SHA25608e3bc50d776d96033d5fd8cbb7d42fabb8aeaf30c2046258369c80007ff6234
SHA5122e4e4744b336ed928b272f2a16752c0c046c850a66c71a7e6ecac17590039ccc5db85b2476aa5bcc2adcf9f35856894a2bbf0aa37a178e3eeb9dd68ca801d5a1
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
Filesize1.8MB
MD512af6aa802303d11cb333038e253de9b
SHA1bf5b85518fef17dc2211fdc284a8cbc4bbaa233a
SHA25678d19b4878e757e39a3026664b97635495fb4f244132fca420c7bcb9f20b7162
SHA512d48d0facea693b3764b986a12e5d1d292272f9d8831669645328f78fc69331dfcadd8a69345943faa093ecf6a11eef3db94ee33df84168199af26c6abfcfc655
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\assistant_installer.exe
Filesize1.9MB
MD5b3f05009b53af6435e86cfd939717e82
SHA1770877e7c5f03e8d684984fe430bdfcc2cf41b26
SHA2563ea8d40fcede1fc03e5603246d75d13e8d44d7229d4c390c39a55534053027f7
SHA512d2dee80aaa79b19f1eb1db85079a05f621780e06bfea9e838b62d757ba29399f9090ec7c6ff553377c9b712f3ba8dd812cdff39f3e28829928e86746a8ac6b27
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\dbgcore.DLL
Filesize166KB
MD58b6f64e5d3a608b434079e50a1277913
SHA103f431fabf1c99a48b449099455c1575893d9f32
SHA256926d444ffca166e006920412677c4ed2ef159cf0efc0578cb45b824f428f5eb2
SHA512c9aeac62ece564ac64a894300fb9d41d13f22951ead73421854c23c506760d984dff0af92bef2d80f3a66e782f0075832e9c24a50ae6110d27a25c14e065b41c
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\opera_package
Filesize10.1MB
MD559b258d4f936d5131e27e69ee606e772
SHA16ad61b9b0cbca3dcfcec7f70d6bb45401b094421
SHA256c487ada0e9d0a37cdd2cb34061a89f39ac4e9d9289a5d92164a2212ddb0e161f
SHA512fcec25605c6d3d839ffd2c04ce6a88eff5213a1ed53209c3ed38e1d676551261bd209179438ffa9b6c6b429a86e2a3d54461623b1aa1923e4e65559095a8e6de
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
101KB
MD542b838cf8bdf67400525e128d917f6e0
SHA1a578f6faec738912dba8c41e7abe1502c46d0cae
SHA2560e4ffba62ce9a464aa1b7ff9f1e55ace8f51ff1e15102d856f801a81f8b4607d
SHA512f64b39d885375251ab7db72c57dc5b5095f0c6412169f1035d1f6a25b8415a2a01004d06bfa0267cf683ef7dea7a9f969ad43fde5a4376f1fcb65a57403433c0
-
Filesize
640KB
MD5b1becd25a34dd27c5e70b9af9a256a58
SHA174789a552d4a278f65af389de6e9f68ab68aa54d
SHA2565c0d03167fc27f9561cb491bfbac707bd2e1b08bc308395843c6a36a3f06fa05
SHA5129fbe8151aa43fb9caff885680dc16e8c5642a6f91785b7cead658affd64aa033244ea4abf54baa32502197f17ff9c951c0b266564037e1eadf04156a4b955056
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
Filesize
677KB
MD533da9dc521f467c0405d3ef5377ce04b
SHA15249d7ce5dfabe5ee6d2fc7d3f3eba1e866b7d1f
SHA256dbab8a7b2b45fc7001d5e34d3d45ccbe93a7591f12910281acf2c32f8c4e631c
SHA512a3093637e1d731eab58080e10706db1afbf6e79fbac6593733b61033f97875ecbe230311e9741d349625ec3a66a6435318846d35290db8cd00af76d692699a55
-
Filesize
279KB
MD57216e65c0d8a0caa4fbbbe527310a02b
SHA10d8e464d91d6b7408e0249d8abf555e6a7f7df87
SHA25696223286733a4e9fb3bccd32154d64448aeacdee58147455601f9826ce749f75
SHA512fb99567d73a53b21cfb1d4000dd70e729765c9de557eb1fdc74c44628c084ddaacf59eac4428aedde0400ddeb1b1d2950d4c83a282ecfeed475af89046aad54f
-
Filesize
1.4MB
MD538d0a0e28eeeeaafb1028718df3e86e4
SHA1dbb358ab4dcdad30c6b630d5ae86356612c8398f
SHA256a12100ce66060498ca33a2a67854b1efa7d51ecc6f6126cd712350d7fe60d185
SHA51276fde4900a7540c73518536ac6442c6583a12efcd7d0a706baa495249c633b51e59b1063722e597d9956e6deecfe635d4d6091580584daf96c87ddecd32edc70
-
Filesize
1.7MB
MD5bfad48ff26556700235d2be3046b40fb
SHA1b252b3711653cdd91b3b1e120639ac068ce0d1c3
SHA2561656175f9120eeb82f62b08cddbf703c70f474967c5b452848d95634efb041b3
SHA512d17bc42060109815d8161bdd6fb18ce5e5c7e5c7353329f9e67205e25c3a1d8d6af532bbc060d4cd69d98ebb3f9635558c9b7e3b586b52640c873b4238e34603
-
Filesize
40B
MD56c40a4928e9aa1e3d8435f3f13035f74
SHA1f9d2ad8d25fc2b40884240375fea18dd567ee419
SHA256daa95557ada677f8de80cd60028603b486a661faa786e04476a34e2406724f9f
SHA5120eacf926ca68c415df980e6ec0d538b38d461dac367878ed654f1301f2be697b28b075d878c78b874e67b5a0127cbe9e9370265f3d8fc614c77d077880ace91c
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
2.2MB
MD53b3014f215e0f14f259145641489fb3a
SHA185ad34eb79a7370fafea28d241ce1bedbe5076fe
SHA25663aa743abf6a2312bf3f7c966587933cba6f547d54e79e245bac262b137d3b69
SHA51257174bb68286d00fa761b6015effa4fa1429be76af5f9d2e037db506217027a8b9c5e3c1f366701bc15ab597ab4f807c5c19e8490443357baa5db0158fa3039a
-
Filesize
1.5MB
MD577939436ed260ef5c1d37bb230830bfc
SHA168227c5ae3772c3489f5762cdc6b71e7e0a0a85d
SHA25628ccbcdb612a0217ce8ba440074d06b1de7efcf9e8c64b11a66fd4336b8f20e8
SHA5126da5d9a947e446d5b453a91aff029c64d8af06afd9f3615fcf8cdfcd7e1e824daf20f0b5c46dea3fb02a5cd63594907630e6e40357c4a1a17349d59e4c793412
-
Filesize
1.8MB
MD5aa9b9dff93149fd5be61553980565107
SHA1db4ab8991a833927b7a6b426a8f7c0266c2caf75
SHA25644ee86f2af3b9d03b2f55384405ccda09018a3c9a121ce5cb6fd2affb1f1a589
SHA51269f2a5d6105c7a12676310fd236597945daeedf803efab426281d6244775fd819f3c5994b5c5be71c5fc61c5d11565558d5bc576c8c71579a32c9833ff60a293
-
Filesize
2.8MB
MD5e739fe9a83a8983e98bcdf5fd687ce6e
SHA11c2467659e34a38e3fb24bc2ba1af461bd230c74
SHA2567c5bcdb9ebd284559a2d9b4923ef526402b6fc5bfc1ce2677729dfab0e333820
SHA51225684d54a6c7d334ab0981c1a0522bce8f045c4fea2e09b5a63fdffd554bf2c71ea14686c235e15287b191b14865147500bf6ed678079d858ee593302f97d23b
-
Filesize
4.2MB
MD55a0739008071b694a7cf8cf96335de16
SHA1e8b3fbde04993c12226ce67df3d0574ebdfef28a
SHA25603b7793894b39f93b75ced9f0dc7ec9ba79ebdd1a6df5b725121acbfca1b2e14
SHA512cd0d681d3702389b1f8db13a7274b0316e44fc5e9fd3a437742b3533c58fe1d7153f3e5b4287a00eb9beb009e563cabd44877dd03727c4274155b113e6dd7b48
-
Filesize
297KB
MD549e0eb9e44d205f349724698e2b2442e
SHA144a3cd5acd0bc5d31c669bcf3f787d511ccfceb2
SHA256afeb2402b214aec0c81548844f93859f70d977edf343641efbb0f6df793f8722
SHA51206dd6c2bfec0fac9d33bda3d7551e4c62ad22bde71875215fb50ed59204b7653e47724bec187c8a63887f044c841e050729b94a9c7be0a1db1a3fdd1af1a43f0
-
Filesize
320KB
MD5bc65685c16a2cba7cd03aafa8726fa8d
SHA11775d8c21e4e973c4423eb130f4f442bffb5b6c4
SHA2563b5bc4de2de4b403c3ad73c66a81275001e3599656e3a44f3813f287009fb82d
SHA5124c159407b8a716a706c6e46b290909e46f584084f3d17cc827b52302b17bb29c993e9b774c35d02b8edb5de437843f3deae4acfda2dd9fa425c02cdde09ff3c3
-
Filesize
2.1MB
MD5d83fb2086d717f34e470f98e8334a9d4
SHA138bff127679ad65073e02a3d5d4a0c826a2018c7
SHA25649fe8630d3a4c0315c89b72f886729bd5bd0dca567c52da14bbdc60335ad5e48
SHA51224ed396f719fde0b619463631d85862f97374ffa91e31ac143fc9986124497c960fef3b60571b4714f796bb90a53b182033273f5e1e15f331c471b8c12068bba
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
14KB
MD51b70c065768ca900d60b0a7306b10a7a
SHA110ba2336ba5ee698bd20d6cd22c333bc109e8edd
SHA25667259af0c810b1fc6bc34b5df428c9964fcf76dcd8d6e46a85d42d9b92dacbae
SHA512f19356b296524d432fa72a21138ec4a5244bb3478d24b5ce9f8a027b44e37482f8aaa59b7e4a7acad15d96cc44c8ba28336c16fe111733918e9bb8b157594eb3
-
Filesize
1.8MB
MD5c7ea06c410960a3dc96038e5cf64ec39
SHA1685412972821f239938381f27e5572fbe4fa6ead
SHA256a4e10aeac8a7c3f4df0afcd24b210ae0b74c4966f5b78ff1a73de74165f02b8d
SHA5120af2dffb7e5e8f268f04b272bed041197a0f43392f9c99909bbc17851bdfa9df88634d55b678e825571a259473e748820259382e90ee3cd5ee1e5a79cbcf6711
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
Filesize2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5252757a018ad85cb4b8d3cb177e9e1ab
SHA130d1a8e7d63979af13d84120791844996f795e0c
SHA25673ad30dcba24a25e5d6d0f0882326515b79c9c06023f16acb937a2b12b138f22
SHA5125782fd09608a314142df7b13ac75f2d1980902d18f3f90b555cdd62c89e6f1b3f033ed6b1cfc48d6c103742d21ac645cb1cfd212220cb59a8bd14767620cbfcd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD58a45608689c4b5c8b5d3c02b408e6c86
SHA1b072818c66f4a432d1a13abbae01352887008d16
SHA256b3fab18e93347809c8556ec3cd84746f18f4754b887c4ef469ca00086435789a
SHA5123450391ba6d1e45d8a755ef15d23ac678e3b33ec2d00aabdfac978392093d93b7b18a0c5b6b4d5a7730862648f9576c015a2b3229c550582e3d52677e61232d2
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5b8298281b7a3bd8a18fb1a89fed2a49c
SHA1976476507d31ced5a3adda953c859708606f4071
SHA25637b55a12ffafaffab4c7ae887f6675531a581027f328961cc27226a9c7972c3f
SHA5120bd280fb59e7f02ea5c061931805778a39bfaea035080866c16d2f3b9d10650ca337516a5679b14a1568b6403424e19a50712d665fc48062ccfad9dc13b0a305
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5344f89cf79be626bf1697896d740fc7c
SHA1243c1b8272499fd09640ba3373ae8706415af0fd
SHA2560ad597c904ea51599f54dbf066118cb1a535609b3828a19c8450c9874d241fd6
SHA51299520e74c2cccec886517aee6d649c999dcb3aaa6602cfa809abbc7c9a981d21544c5f980d393741066f174335afead8a657a4fed2f41ed575db0d723a1ee62f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize18KB
MD5efce0b96fa6b86f1f7bac264f463327f
SHA1a35559b60ed4f618457b497ef787aefd88fcca0f
SHA256ee3c0a24ade8ff9fe5090a7e684345e66cd67238be1918f5533b441e875807cb
SHA512347552e868d87179296c54810bef826b5e032916fff26467d47f26748ef03084be43f70320e05e8f38ba4151ea348117cc1e5241a8353413a8e8c50c045f12ce
-
Filesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403140455311\assistant\dbghelp.dll
Filesize1.7MB
MD5925ea07f594d3fce3f73ede370d92ef7
SHA1f67ea921368c288a9d3728158c3f80213d89d7c2
SHA2566d02ebd4ec9a6093f21cd8ccefb9445fa0ab7b1f69ac868a5cfc5d28ed8d2de9
SHA512a809851da820d9fdd8fb860a8f549311dcc2579df2c6f6fba74f50d5d8bf94baa834b09fb5476ac248f18d1deb6b47d4fdd6d658889d5d45ca8774a9264483d2
-
Filesize
960KB
MD5b6b83c45d5230b1cb9ca50273aea8afa
SHA1f69bfe3e35a878c7d70f26f6c9622bd712585c8b
SHA256adfecad074a9ec65fdad2e44ec1efc8980e73575d0196e969c18aea33a6a3af1
SHA5124d61d0e181107050356d33f169accf536a3aa2e80bc8a9e5de8ed05962c53fc6a90ab938fb21938d3a7718a4bab9cb170e113ccff6314f8a6e24299a1e319dc0
-
Filesize
512KB
MD5edcabf3acb09e79b542436c67624d50b
SHA1c36b51cd4ff8d95586e4665e64fc611c3c043425
SHA256e2eebe087ade661f6d17f8765a231b8e4a107bbe7b38200c5dd50de142b85347
SHA512e2103a1f4bdf2bbf7b383785d1aba6294e698961f3cf87629962f35abc115573f842016802adddce7fa65c9e803a63b2717cc1a83bf9fd1b71e05132cc674953
-
Filesize
576KB
MD56585c04ac560776fa8dd6c2b85350b1f
SHA127b918c549a7e0cd3129b2a51f8451ab244f3429
SHA25613624a80c9de106952e6315f00102bf44bfe2ce6192550e3a872d9c223212ef4
SHA5129a40c9a11371b2dcb35a197c78cc991f269f897e281be1c4becbb2d90682b584644dbe367a701d114cfcc742fc4ba34910ff2691e712695986c0983526572bdd
-
Filesize
4.6MB
MD5fdeb4d1d95a738ba8882988a97a12d32
SHA142dd25cae583521aa96a02b5135bba6fde9ac3fb
SHA2561c52520c6d2398a266245a1d29fcf5b58ff7bb8f7ecf8868898bab7bcad37d6e
SHA5124cb87510d4612a36c83543ca58a17469aa8aaee569481c121d2d70a7923d7174efbdcede18342f49bb26aa0bbcd44b58630697ef54986aa5efbf2b3920ef33cf
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47