Analysis
-
max time kernel
81s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-04-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe
Resource
win7-20240221-en
General
-
Target
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe
-
Size
2.9MB
-
MD5
433b486eb9bc49054b16c3c2baa7e193
-
SHA1
11a8f9743118d1360e46b514164595019a846415
-
SHA256
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484
-
SHA512
ef4ad879399a7ed9548c0c952b0b492a31111e432274edaa98aa4be7886ac55c7590aadf98b08052ba131a823ffa0eaadbdd592a0ed177e15326e63486f0c794
-
SSDEEP
49152:drUf3japltWxLT5WAMU/2qLWwS7P5J4zPZser8ewH:drOGPt8LT5WPU/2qLWw4hJ4zPZsxewH
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.17
http://193.233.132.167
-
install_dir
4d0ab15804
-
install_file
chrosha.exe
-
strings_key
1a9519d7b465e1f4880fa09a6162d768
-
url_paths
/enigma/index.php
Extracted
risepro
147.45.47.93:58709
Extracted
redline
@OLEH_PSP
185.172.128.33:8970
Extracted
redline
LiveTraffic
4.184.225.183:30592
Extracted
stealc
http://52.143.157.84
-
url_path
/c73eed764cc59dcb.php
Extracted
lumma
https://affordcharmcropwo.shop/api
https://cleartotalfisherwo.shop/api
https://worryfillvolcawoi.shop/api
https://enthusiasimtitleow.shop/api
https://dismissalcylinderhostw.shop/api
https://diskretainvigorousiw.shop/api
https://communicationgenerwo.shop/api
https://pillowbrocccolipe.shop/api
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe family_redline C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe family_redline behavioral2/memory/2536-456-0x0000000000400000-0x0000000000452000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe family_redline -
Processes:
file300un.exeUni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
explorha.exechrosha.exechrosha.exe1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exeexplorha.exeamert.exe887c48bd6d.exeexplorha.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrosha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amert.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 887c48bd6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 49 4480 rundll32.exe 51 2876 rundll32.exe 114 5812 rundll32.exe 130 4276 rundll32.exe -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exe1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe887c48bd6d.exeexplorha.exeexplorha.exeamert.exechrosha.exechrosha.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 887c48bd6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amert.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 887c48bd6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrosha.exe -
Executes dropped EXE 37 IoCs
Processes:
explorha.exeamert.exe9e758d26ed.exe887c48bd6d.exeexplorha.exeexplorha.exechrosha.exeswiiiii.exealexxxxxxxx.exeTraffic.exepropro.exegold.exeNewB.exeISetup8.exejok.exeswiiii.exetoolspub1.exeu480.0.exe4767d2e713f2021e8fe856e3ea638b58.exechrosha.exeFirstZ.exebuild_1GyXIDXRUC.exeUni400uni.exeQg_Appv5.exeStartup.exeu480.1.exe070.exeis-DV5GM.tmpfile300un.exeUniversalInstaller.execddvdrunner2333.exeUniversalInstaller.execddvdrunner2333.exe6L25L2qcia1XqMVwTklb6y0v.exeTQ0cCu0MTMeYdDLpAs8jCbRO.exeegDpEbNvHiOnnqAF3de66ECF.exeCv3oTFJiOF9b7kUj7XAa7LWN.exepid process 3872 explorha.exe 2568 amert.exe 2572 9e758d26ed.exe 2816 887c48bd6d.exe 2968 explorha.exe 4388 explorha.exe 3636 chrosha.exe 420 swiiiii.exe 192 alexxxxxxxx.exe 4820 Traffic.exe 2712 propro.exe 220 gold.exe 5304 NewB.exe 5472 ISetup8.exe 5568 jok.exe 5936 swiiii.exe 2636 toolspub1.exe 5584 u480.0.exe 5460 4767d2e713f2021e8fe856e3ea638b58.exe 3008 chrosha.exe 3848 FirstZ.exe 5668 build_1GyXIDXRUC.exe 6024 Uni400uni.exe 2644 Qg_Appv5.exe 6116 Startup.exe 5452 u480.1.exe 5512 070.exe 648 is-DV5GM.tmp 6124 file300un.exe 1212 UniversalInstaller.exe 4932 cddvdrunner2333.exe 4960 UniversalInstaller.exe 1872 cddvdrunner2333.exe 4996 6L25L2qcia1XqMVwTklb6y0v.exe 5084 TQ0cCu0MTMeYdDLpAs8jCbRO.exe 408 egDpEbNvHiOnnqAF3de66ECF.exe 4168 Cv3oTFJiOF9b7kUj7XAa7LWN.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
explorha.exeamert.exe887c48bd6d.exeexplorha.exeexplorha.exechrosha.exechrosha.exe1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine amert.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine 887c48bd6d.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine chrosha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine chrosha.exe Key opened \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Wine 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe -
Loads dropped DLL 13 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exeis-DV5GM.tmpUniversalInstaller.exeUniversalInstaller.exeRegAsm.exepid process 1364 rundll32.exe 4480 rundll32.exe 2876 rundll32.exe 5720 rundll32.exe 5812 rundll32.exe 4276 rundll32.exe 648 is-DV5GM.tmp 1212 UniversalInstaller.exe 1212 UniversalInstaller.exe 4960 UniversalInstaller.exe 4960 UniversalInstaller.exe 5144 RegAsm.exe 5144 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorha.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\9e758d26ed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000055001\\9e758d26ed.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Software\Microsoft\Windows\CurrentVersion\Run\887c48bd6d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000056001\\887c48bd6d.exe" explorha.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
Uni400uni.exefile300un.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Uni400uni.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Looks up external IP address via web service 9 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 214 api.myip.com 229 ipinfo.io 228 ipinfo.io 140 ip-api.com 215 api.myip.com 216 ipinfo.io 217 ipinfo.io 225 api.myip.com 227 api.myip.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000055001\9e758d26ed.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exeexplorha.exeamert.exe887c48bd6d.exeexplorha.exechrosha.exeexplorha.exechrosha.exepid process 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe 3872 explorha.exe 2568 amert.exe 2816 887c48bd6d.exe 2968 explorha.exe 3636 chrosha.exe 4388 explorha.exe 3008 chrosha.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
explorha.exeswiiiii.exealexxxxxxxx.exegold.exeswiiii.exechrosha.exebuild_1GyXIDXRUC.exeUni400uni.exefile300un.exedescription pid process target process PID 3872 set thread context of 2968 3872 explorha.exe explorha.exe PID 420 set thread context of 236 420 swiiiii.exe RegAsm.exe PID 192 set thread context of 316 192 alexxxxxxxx.exe RegAsm.exe PID 220 set thread context of 2536 220 gold.exe RegAsm.exe PID 5936 set thread context of 5144 5936 swiiii.exe RegAsm.exe PID 3636 set thread context of 3008 3636 chrosha.exe chrosha.exe PID 5668 set thread context of 5916 5668 build_1GyXIDXRUC.exe RegAsm.exe PID 6024 set thread context of 6092 6024 Uni400uni.exe msbuild.exe PID 6124 set thread context of 2984 6124 file300un.exe jsc.exe -
Drops file in Windows directory 2 IoCs
Processes:
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exeamert.exedescription ioc process File created C:\Windows\Tasks\explorha.job 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe File created C:\Windows\Tasks\chrosha.job amert.exe -
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 2888 sc.exe 652 sc.exe 6352 sc.exe 4148 sc.exe 7096 sc.exe 3084 sc.exe 5472 sc.exe 6500 sc.exe 6636 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 836 420 WerFault.exe swiiiii.exe 5268 2636 WerFault.exe toolspub1.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exeu480.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u480.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u480.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u480.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 5360 schtasks.exe 5732 schtasks.exe 6504 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133579525455831365" chrome.exe -
Processes:
propro.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 propro.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 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 propro.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exeexplorha.exeamert.exechrome.exe887c48bd6d.exerundll32.exepowershell.exeexplorha.exechrosha.exeexplorha.exerundll32.exeRegAsm.exepowershell.exeTraffic.exeRegAsm.exepid process 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe 3872 explorha.exe 3872 explorha.exe 2568 amert.exe 2568 amert.exe 2596 chrome.exe 2596 chrome.exe 2816 887c48bd6d.exe 2816 887c48bd6d.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 4480 rundll32.exe 1928 powershell.exe 1928 powershell.exe 1928 powershell.exe 2968 explorha.exe 2968 explorha.exe 1928 powershell.exe 3636 chrosha.exe 3636 chrosha.exe 4388 explorha.exe 4388 explorha.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5812 rundll32.exe 5144 RegAsm.exe 5144 RegAsm.exe 5480 powershell.exe 5480 powershell.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 4820 Traffic.exe 2536 RegAsm.exe 2536 RegAsm.exe 5480 powershell.exe 5480 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exepowershell.exedescription pid process Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe Token: SeCreatePagefilePrivilege 2596 chrome.exe Token: SeShutdownPrivilege 2596 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
9e758d26ed.exechrome.exeu480.1.exepid process 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2596 chrome.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 5452 u480.1.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
9e758d26ed.exechrome.exeu480.1.exepid process 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2596 chrome.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 2572 9e758d26ed.exe 5452 u480.1.exe 5452 u480.1.exe 5452 u480.1.exe 5452 u480.1.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
Qg_Appv5.exeUniversalInstaller.exeUniversalInstaller.exepid process 2644 Qg_Appv5.exe 1212 UniversalInstaller.exe 1212 UniversalInstaller.exe 4960 UniversalInstaller.exe 4960 UniversalInstaller.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exeexplorha.exe9e758d26ed.exechrome.exedescription pid process target process PID 4144 wrote to memory of 3872 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe explorha.exe PID 4144 wrote to memory of 3872 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe explorha.exe PID 4144 wrote to memory of 3872 4144 1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe explorha.exe PID 3872 wrote to memory of 2568 3872 explorha.exe amert.exe PID 3872 wrote to memory of 2568 3872 explorha.exe amert.exe PID 3872 wrote to memory of 2568 3872 explorha.exe amert.exe PID 3872 wrote to memory of 2572 3872 explorha.exe 9e758d26ed.exe PID 3872 wrote to memory of 2572 3872 explorha.exe 9e758d26ed.exe PID 3872 wrote to memory of 2572 3872 explorha.exe 9e758d26ed.exe PID 2572 wrote to memory of 2596 2572 9e758d26ed.exe chrome.exe PID 2572 wrote to memory of 2596 2572 9e758d26ed.exe chrome.exe PID 2596 wrote to memory of 3008 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3008 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 1812 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 2648 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 2648 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe PID 2596 wrote to memory of 3056 2596 chrome.exe chrome.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
file300un.exeUni400uni.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" file300un.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Uni400uni.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe"C:\Users\Admin\AppData\Local\Temp\1351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"C:\Users\Admin\AppData\Local\Temp\1000054001\amert.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\1000055001\9e758d26ed.exe"C:\Users\Admin\AppData\Local\Temp\1000055001\9e758d26ed.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffcb6319758,0x7ffcb6319768,0x7ffcb63197785⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1528 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:25⤵PID:1812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1844 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:85⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:85⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:15⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:15⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4448 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:15⤵PID:4248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:85⤵PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:85⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4784 --field-trial-handle=1788,i,12342191187631464460,3288468944364913316,131072 /prefetch:85⤵PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000056001\887c48bd6d.exe"C:\Users\Admin\AppData\Local\Temp\1000056001\887c48bd6d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
PID:1364 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4480 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\106386276412_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2876
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000147001\swiiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 420 -s 8323⤵
- Program crash
PID:836
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\alexxxxxxxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:316
-
C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"4⤵PID:6684
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 35⤵PID:2480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\gold.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe"2⤵
- Executes dropped EXE
PID:5304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe" /F3⤵
- Creates scheduled task(s)
PID:5360
-
-
C:\Users\Admin\AppData\Local\Temp\1000193001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000193001\ISetup8.exe"3⤵
- Executes dropped EXE
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\u480.0.exe"C:\Users\Admin\AppData\Local\Temp\u480.0.exe"4⤵
- Executes dropped EXE
PID:5584
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Zqicom_beta\UniversalInstaller.exeC:\Users\Admin\AppData\Local\Temp\Zqicom_beta\UniversalInstaller.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1212 -
C:\Users\Admin\AppData\Roaming\Zqicom_beta\UniversalInstaller.exeC:\Users\Admin\AppData\Roaming\Zqicom_beta\UniversalInstaller.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵PID:1988
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵PID:7164
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u480.1.exe"C:\Users\Admin\AppData\Local\Temp\u480.1.exe"4⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5452
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000194001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000194001\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2636 -s 5164⤵
- Program crash
PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000195001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000195001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Executes dropped EXE
PID:5460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵PID:6180
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000196001\FirstZ.exe"C:\Users\Admin\AppData\Local\Temp\1000196001\FirstZ.exe"3⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵PID:6792
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵PID:5516
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:6112
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:7096
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:3084
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:2888
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:652
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:5472
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵PID:7120
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵PID:5376
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵PID:7048
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵PID:224
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "WSNKISKT"4⤵
- Launches sc.exe
PID:6500
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"4⤵
- Launches sc.exe
PID:6352
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4148
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "WSNKISKT"4⤵
- Launches sc.exe
PID:6636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000198001\Uni400uni.exe"C:\Users\Admin\AppData\Local\Temp\1000198001\Uni400uni.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System policy modification
PID:6024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000198001\Uni400uni.exe" -Force4⤵PID:3440
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"4⤵PID:6092
-
C:\Users\Admin\Pictures\6L25L2qcia1XqMVwTklb6y0v.exe"C:\Users\Admin\Pictures\6L25L2qcia1XqMVwTklb6y0v.exe"5⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\u3us.0.exe"C:\Users\Admin\AppData\Local\Temp\u3us.0.exe"6⤵PID:6412
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"6⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\Zqicom_beta\UniversalInstaller.exeC:\Users\Admin\AppData\Local\Temp\Zqicom_beta\UniversalInstaller.exe7⤵PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\u3us.1.exe"C:\Users\Admin\AppData\Local\Temp\u3us.1.exe"6⤵PID:5868
-
-
-
C:\Users\Admin\Pictures\TQ0cCu0MTMeYdDLpAs8jCbRO.exe"C:\Users\Admin\Pictures\TQ0cCu0MTMeYdDLpAs8jCbRO.exe"5⤵
- Executes dropped EXE
PID:5084
-
-
C:\Users\Admin\Pictures\egDpEbNvHiOnnqAF3de66ECF.exe"C:\Users\Admin\Pictures\egDpEbNvHiOnnqAF3de66ECF.exe"5⤵
- Executes dropped EXE
PID:408
-
-
C:\Users\Admin\Pictures\Cv3oTFJiOF9b7kUj7XAa7LWN.exe"C:\Users\Admin\Pictures\Cv3oTFJiOF9b7kUj7XAa7LWN.exe"5⤵
- Executes dropped EXE
PID:4168
-
-
C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe"C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe" --silent --allusers=05⤵PID:3992
-
C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exeC:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x6a84e1d0,0x6a84e1dc,0x6a84e1e86⤵PID:6212
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\RllzKEXIa1k3SlWC6PYaO3ZR.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\RllzKEXIa1k3SlWC6PYaO3ZR.exe" --version6⤵PID:6452
-
-
C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe"C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3992 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240418222338" --session-guid=80c567ca-91ec-448c-bc6a-20db9408ff99 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C040000000000006⤵PID:6552
-
C:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exeC:\Users\Admin\Pictures\RllzKEXIa1k3SlWC6PYaO3ZR.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2b0,0x2b4,0x2b8,0x280,0x2bc,0x69ece1d0,0x69ece1dc,0x69ece1e87⤵PID:6612
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"6⤵PID:5588
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\assistant_installer.exe" --version6⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x230,0x234,0x238,0x20c,0x23c,0x206038,0x206044,0x2060507⤵PID:652
-
-
-
-
C:\Users\Admin\Pictures\jDHsHSUnv38oNgVASzsWitip.exe"C:\Users\Admin\Pictures\jDHsHSUnv38oNgVASzsWitip.exe"5⤵PID:7128
-
C:\Users\Admin\AppData\Local\Temp\7zSBC85.tmp\Install.exe.\Install.exe /sQwdidHh "385118" /S6⤵PID:6204
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"7⤵PID:7040
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 22:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\vaDVVof.exe\" em /ePsite_idPuK 385118 /S" /V1 /F7⤵
- Creates scheduled task(s)
PID:5732
-
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"4⤵PID:5940
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000200001\070.exe"C:\Users\Admin\AppData\Local\Temp\1000200001\070.exe"3⤵
- Executes dropped EXE
PID:5512 -
C:\Users\Admin\AppData\Local\Temp\is-OS9JJ.tmp\is-DV5GM.tmp"C:\Users\Admin\AppData\Local\Temp\is-OS9JJ.tmp\is-DV5GM.tmp" /SL4 $700E0 "C:\Users\Admin\AppData\Local\Temp\1000200001\070.exe" 3710753 522244⤵
- Executes dropped EXE
- Loads dropped DLL
PID:648 -
C:\Users\Admin\AppData\Local\CD-DVD-Runner\cddvdrunner2333.exe"C:\Users\Admin\AppData\Local\CD-DVD-Runner\cddvdrunner2333.exe" -i5⤵
- Executes dropped EXE
PID:4932
-
-
C:\Users\Admin\AppData\Local\CD-DVD-Runner\cddvdrunner2333.exe"C:\Users\Admin\AppData\Local\CD-DVD-Runner\cddvdrunner2333.exe" -s5⤵
- Executes dropped EXE
PID:1872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"C:\Users\Admin\AppData\Local\Temp\1000152001\jok.exe"2⤵
- Executes dropped EXE
PID:5568
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
PID:5720 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5812 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:5840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\106386276412_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"C:\Users\Admin\AppData\Local\Temp\1000153001\swiiii.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5144
-
-
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\1000167001\build_1GyXIDXRUC.exe"C:\Users\Admin\AppData\Local\Temp\1000167001\build_1GyXIDXRUC.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:5916
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\Startup.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\Startup.exe"2⤵
- Executes dropped EXE
PID:6116
-
-
C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System policy modification
PID:6124 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1000181001\file300un.exe" -Force3⤵PID:428
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:2984
-
C:\Users\Admin\Pictures\wSUgGRm2sGTYTQoix60BY0zS.exe"C:\Users\Admin\Pictures\wSUgGRm2sGTYTQoix60BY0zS.exe"4⤵PID:6992
-
-
C:\Users\Admin\Pictures\t7bimzsIXqIVcXonrFKQwr1f.exe"C:\Users\Admin\Pictures\t7bimzsIXqIVcXonrFKQwr1f.exe"4⤵PID:7008
-
-
C:\Users\Admin\Pictures\BCr7G495T4zETyNhru1gClIt.exe"C:\Users\Admin\Pictures\BCr7G495T4zETyNhru1gClIt.exe"4⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\7zSE7EA.tmp\Install.exe.\Install.exe /sQwdidHh "385118" /S5⤵PID:6788
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"6⤵PID:6452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4908
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 22:25:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\zwJAxZK.exe\" em /rnsite_idEYN 385118 /S" /V1 /F6⤵
- Creates scheduled task(s)
PID:6504
-
-
-
-
C:\Users\Admin\Pictures\ma2T4OOmVJ7i7ioDnaF7ersO.exe"C:\Users\Admin\Pictures\ma2T4OOmVJ7i7ioDnaF7ersO.exe"4⤵PID:7088
-
-
C:\Users\Admin\Pictures\8Y5r0Z6SPAodtJZFyvLklXBJ.exe"C:\Users\Admin\Pictures\8Y5r0Z6SPAodtJZFyvLklXBJ.exe"4⤵PID:7136
-
C:\Users\Admin\AppData\Local\Temp\u5i8.0.exe"C:\Users\Admin\AppData\Local\Temp\u5i8.0.exe"5⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\u5i8.1.exe"C:\Users\Admin\AppData\Local\Temp\u5i8.1.exe"5⤵PID:6776
-
-
-
C:\Users\Admin\Pictures\5Se0lX8ljGDnISY17A49oNuH.exe"C:\Users\Admin\Pictures\5Se0lX8ljGDnISY17A49oNuH.exe" --silent --allusers=04⤵PID:5852
-
C:\Users\Admin\Pictures\5Se0lX8ljGDnISY17A49oNuH.exeC:\Users\Admin\Pictures\5Se0lX8ljGDnISY17A49oNuH.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2a0,0x2a4,0x2a8,0x27c,0x2ac,0x6954e1d0,0x6954e1dc,0x6954e1e85⤵PID:6108
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\5Se0lX8ljGDnISY17A49oNuH.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\5Se0lX8ljGDnISY17A49oNuH.exe" --version5⤵PID:7068
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵PID:1404
-
-
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc1⤵PID:4472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exeC:\Users\Admin\AppData\Local\Temp\1000150001\NewB.exe1⤵PID:6952
-
C:\ProgramData\wikombernizc\reakuqnanrkn.exeC:\ProgramData\wikombernizc\reakuqnanrkn.exe1⤵PID:6812
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵PID:5864
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.9MB
MD580d5389c5a4f9a34ffb6432986f20cf1
SHA19fa64fbf8788152616e84f708655c7278d30e09d
SHA25613d2fce54d140f74b58df72e26d1be9803a2e953f48972bf576c5e4f8b5e8f04
SHA5127d202a373f1d5ca0be5ed9a7e10a396c3b986f4d7f0e4a0ef373ebd71a9cbcb508e11a3a9abab911bc91d0ed6a972e2291e25304c1bf2a74cf3870e9dbc22485
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
216B
MD5f7f903a45767f41144d388122053c90f
SHA14789fcd044aaadc94e9b23dacea814681fc1228b
SHA25601f0998c004fb701382cac0ca3c47c002ebb090c629a2a1eba74f7136b665300
SHA5123b9a1141ce80ef1976588498052d7e67f631c03be2c6d02a1b096b20391a48d1d8ed6505936c8d6af53c4b494c22cf0aab525254c1c20008c58d7efac3ba3e81
-
Filesize
148KB
MD55887fe184d3c98e78f76875408316c3e
SHA11571a65093dcc0507a65941824e7b4d58b699e80
SHA256653c737da4dd865ec6376e9872911c4ad0a4d8fd6b81181ec642760e6a95b15c
SHA512df137bacab76740cc2c6c981577537f289350134702dd17744688cebf44016d7e7fdb1327a6488eeaea156d01b0e1fb837dc72c53609f198a554199e03ddff77
-
Filesize
20KB
MD5826425938ed9ba247ffd556ea8d56b7e
SHA1f42c71d0b46ebfbe55e0967ccfed0c54005f8bc8
SHA256913e07d2d7ea1f675cc8a9ec4681ecfbc3eab05fdf9f0de0482ed8bd300ba63f
SHA512b4dca433635cbe274c4a03a0f60693f449f69e5e8c0a98273af2e917d243301a1e1f37e01dd5154f134ff2a0f4a24743419229a212cf403159f9443876f98267
-
Filesize
705B
MD5b9f0c221ca6c74a4e999bb53eb69a85a
SHA1c3d045d15bf35d67fb48668b5091614b0d80edb3
SHA256f735f5d2a1cc5c6c1cac2be6f8e74d15c730152cd8262aca784bf317908f8745
SHA5125aec9a37ea57cd489396b85b60bcd31215ed59395b82a98707b4c889c00f63cf069ba4d33df0be41ea57980a22d57a1eb2d3271a8b390f2f627f2e65a1ac1485
-
Filesize
6KB
MD5bb86db23c9332685dfb26ffacd9a40f4
SHA1ffc9dfaf5dca574c51af5c711228ed292f7c3275
SHA2566095d3e20fd9529aef7b535faa240025eff42c25465e28486aa12f20fdfe9616
SHA512408200fe031c23b19cfda6a7c8af1cca222d52aeb0923c197ca699cc244850657d705ba25109617d6f23071575b29a98169a9447b47aa1908749725c9843d956
-
Filesize
6KB
MD5944dffb715b87c88e8f0f36f838374e6
SHA1e5874d11ded9e1058d2885f79a53db63edf93354
SHA2567db4b638ff6b15e55129d4157afdc0637eb827bdaae0814e99909d72ecd44fc1
SHA5120f1041088d569a71fad7c1269acd6beba3f0a7bf2879ba63b5bb9f9c246193c7990bfdc710f623dff626cac1155fc032b2ad60ecf80dbd1b741b2b3070567709
-
Filesize
12KB
MD54a2fc91bc1a9f154f400bb8bcfb45b03
SHA1c68d3a3a0b023baf130b6360ec2d4475daf18c30
SHA256920ff6380e554ee388dd3caae02949ea863fee4958331efc77ebad0b364ae106
SHA51286860041ee7e0c6d9b4a33aa062e8b704c412d1dc7364a8b3025ec70867ae12bca4268ee39148520da8c7157ec74e420cba037ca0821435aefb05513478e18d8
-
Filesize
271KB
MD5828e66a0837224b2a923a5a980d6abbb
SHA14218a37b6b3b979d5a24043af008c2215139d0c7
SHA25689f8be143871f0fb216ebb2005990ea02afc958c2533a3f1ea2ba08a694e1cde
SHA512050e6a82a8532bc1cb69ae892a8015a3b2b715836e094b3b975411485906f1a2621ac547e8a25872123de0cb2e3b61a2fdc0ee8f131ce3b05b5621f4a11dfb3a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
3KB
MD57ce47df53c8f0ba7ccf885c309afc484
SHA1b25ad9723b06d3861498caa32ffb1b7b38701a95
SHA2567031b6b7bc43cf4ee90d4ec4860b78a442352243ea28f5d959b56222b13de2e4
SHA51278585fbfcfe2e7a27f0ee168075958923184e67da1668850d0e66e31f0fd0a5516c04a17693ad197da7ffffb179265cd54fe0629fa30e00a6f269c6d68277efd
-
Filesize
1KB
MD50665291e471fc0d65b1feb6204f55d58
SHA1dafd59ed8ba23e4c71740aef1b348e5760812d01
SHA2562792beaa0566acda16c6db83ccc1cd75fac21ef076f4a11bee4c214e2917ddb4
SHA5127260917080b2be01668546f5152d2cbc8902898497e4ecdd5da9a67d2127450bd2ce155b19121a4646cc0ad1337b53d04495e0b54c6e52aee7c1fb2f411e7d64
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\additional_file0.tmp
Filesize2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404182223381\opera_package
Filesize85.0MB
MD579a20d5ca95b963e5fcc883554829796
SHA1ebde7a093f8a9345ecc040dc432a6b507dd3a799
SHA2563366c7f6dd5ffc343f65b9b5a2917b4122411f6f6e6a6fc52f1ef5384b1ffe4b
SHA5129801e9dbd4dd2143c29d08970be76e5ef19736860a3650c74bfa1798099ee9ce577474b4f524e6478d65ab0f13a894dd5da7b2e5e29d847711fa6dc90b7863d8
-
Filesize
2.9MB
MD5433b486eb9bc49054b16c3c2baa7e193
SHA111a8f9743118d1360e46b514164595019a846415
SHA2561351d42fa1dd756c95eb9b787e8d48b2c100721b5b3a7a7056b7292ffb3fb484
SHA512ef4ad879399a7ed9548c0c952b0b492a31111e432274edaa98aa4be7886ac55c7590aadf98b08052ba131a823ffa0eaadbdd592a0ed177e15326e63486f0c794
-
Filesize
1.8MB
MD51ed78f44a2cad6e08da27edbc701b4bc
SHA1e7a8bc103762db81429b13497c065ac16cac4b85
SHA25620bd5a075cfee256a6cc19803fb9964834590840ada1212f7eca0a9d990e8359
SHA5123882675eadbc45a7b534c0efc671551926bbc333275e03e8a4b23fdfc958af231094b65855fceccf6ec7c63ead1ad1a21bf3853e95eb05adca093a7820c22244
-
Filesize
1.1MB
MD576c779d2a6e42c6dbcff43e67bb38ca3
SHA1558f8e6b714efaeaba794e7d2b7821936a4da077
SHA256e820be731929c621a94de7bd83e0da4796c103632961bda20ffbd568279e6f43
SHA512516d91d0e635f3468d135bf51f507fe3d81c1fb72c8baccc08a0e7c05c6dcaefd2816ca937cb2f8ca0ab8f4c8e78a2917b22dc10c289221e8450cfba34bebf3e
-
Filesize
2.2MB
MD53709ad0a7007bcae942b905a07bd6bba
SHA19d25192c841f3b2fb1b9bbb0dfdcec6cdaaca3a7
SHA2562248caa741ec4d757c597091f2bab56f694181ef5a677bdab47d990e4c7f695a
SHA512d41cbc49ded02909e0eae68da22988c36993bde9db4025f64d45007d2c47ed07a7cdc1a2b28ae1cb7ecb8d4c5169cb4084650adaddb656caf33b4e0ad85239fc
-
Filesize
321KB
MD51c7d0f34bb1d85b5d2c01367cc8f62ef
SHA133aedadb5361f1646cffd68791d72ba5f1424114
SHA256e9e09c5e5d03d21fca820bd9b0a0ea7b86ab9e85cdc9996f8f1dc822b0cc801c
SHA51253bf85d2b004f69bbbf7b6dc78e5f021aba71b6f814101c55d3bf76e6d058a973bc58270b6b621b2100c6e02d382f568d1e96024464e8ea81e6db8ccd948679d
-
Filesize
1.7MB
MD585a15f080b09acace350ab30460c8996
SHA13fc515e60e4cfa5b3321f04a96c7fb463e4b9d02
SHA2563a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b
SHA512ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f
-
Filesize
488KB
MD582053649cadec1a338509e46ba776fbd
SHA16d8e479a6dc76d54109bb2e602b8087d55537510
SHA25630468f8b767772214c60a701ecfee11c634516c3e2de146cd07638ea00dd0b6e
SHA512e4b2b219483477a73fec5a207012f77c7167bf7b7f9adcb80ee92f87ddfe592a0d520f2afee531d1cce926ef56da2b065b13630a1cc171f48db8f7987e10897a
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
304KB
MD58510bcf5bc264c70180abe78298e4d5b
SHA12c3a2a85d129b0d750ed146d1d4e4d6274623e28
SHA256096220045877e456edfea1adcd5bf1efd332665ef073c6d1e9474c84ca5433f6
SHA5125ff0a47f9e14e22fc76d41910b2986605376605913173d8ad83d29d85eb79b679459e2723a6ad17bc3c3b8c9b359e2be7348ee1c21fa2e8ceb7cc9220515258d
-
Filesize
158KB
MD5586f7fecacd49adab650fae36e2db994
SHA135d9fb512a8161ce867812633f0a43b042f9a5e6
SHA256cf88d499c83da613ad5ccd8805822901bdc3a12eb9b15804aeff8c53dc05fc4e
SHA512a44a2c99d18509681505cf70a251baf2558030a8648d9c621acc72fafcb2f744e3ef664dfd0229baf7c78fb72e69f5d644c755ded4060dcafa7f711d70e94772
-
Filesize
210KB
MD551b0ed6b4908a21e5cc1d9ec7c046040
SHA1d874f6da7327b2f1b3ace5e66bc763c557ac382e
SHA2564e68c5a537320cbe88842a53e5691b7f1a590b9c0b491a12baaeeda111dcaa4d
SHA51248ec96b209d7061a1276496feb250cf183891b950465d3a916c999aa1efc1c8831b068ce0fce4ce21d09677f945b3d816ed4040146462a0ce0845318041586a2
-
Filesize
3.3MB
MD576eae6ef736073145d6c06d981615ff9
SHA16612a26d5db4a6a745fed7518ec93a1121fffd9c
SHA2563acdea11112584cd1f78da03f6af5cfc0f883309fc5ec552fa6b9c85a6c483bb
SHA512e7c118bbe9f62d5834b374e05242636b32daab2c1fe607521d6e78520665c59f78637b74c85d171f8608e255be50731771f0a09dcca69e016b281ee02ab77231
-
Filesize
559KB
MD59ee0c556e1b952495a74709e6b06459a
SHA11b631e41b43d6f7ef3f7d140c1eb14ecf1cd861d
SHA2560e236536f9fc793be5f2e276555817d0bb9206e9d56904bc509188bc42515129
SHA5121ec91c9e0ab4e359be73677f81150922ed06fc58e621e2115d4c607afb94dbf69a8362db14a531ff6aba69b1dc8e3cd2a0aa0ba626320caa9c250060bbe44558
-
Filesize
412KB
MD56a84e6c0021605ff091449bfbe83a7b3
SHA19ff7c79006f2ec923f3789e92eea390dc987ddca
SHA256850ef11c40f5aeb9e66b7e595842089f74e35134cc2571f1217fc391fb5beec8
SHA512294866d1444906bdb2e270a1bc0363b8da30fcb3e6d5399b13e70b55d9670b5829d20a259b3338d7949e2afdb8d0bdac6c11bf9cbfd360c69ea6d21be9e7361a
-
Filesize
307KB
MD5a11d2533c5dd2b17161fc2eea2ba1bef
SHA1f7f42c054b83cb0cc3bb0a54a75195f920d9ced8
SHA2564da76547d7081b68f3af83c77a5c75b2ff3f0691d7c58aca34632ff2ecd1e98c
SHA5120053214e42b72365bd435ab8f35e4ddc8774c347dfa57d90c9f49c81b23dd1178f0a77b0facb0cce0d29b67b33eb7243a5c7c4f267274374e095a47f4a301a0b
-
Filesize
4.2MB
MD52e78c9318e8d9e63a9bbd8756a1fc49a
SHA15a92c19ea81fd2313a6538d5786368e470f54bce
SHA25691ea2eb28f0db5a6bba60519b77c8dc4005beac2fb3ebc2180aa0032c6a8135c
SHA512ec17194bfc8d1fc54375a63cb2d067753d4c210ad5c62bd6c536606cdeab278b48f3b3618afbc792d6082892d277fd3a0561812bf06337f6af173ce2f1d0f586
-
Filesize
2.5MB
MD5ffada57f998ed6a72b6ba2f072d2690a
SHA16857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f
SHA256677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12
SHA5121de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f
-
Filesize
556KB
MD5e1d8325b086f91769120381b78626e2e
SHA10eb6827878445d3e3e584b7f08067a7a4dc9e618
SHA256b925abb193e7003f4a692064148ffe7840096022a44f4d5ae4c0abb59a287934
SHA512c8c0b424c2ed7ee598997bdc0b0d2099b650a280903716891b0eaa340acf556c0642d921fcb7f654387a4a1f1ec4a32feaf8d872b51ca482a977f11e2974072c
-
Filesize
3.9MB
MD5f1d29fddb47e42d7dbf2cf42ba36cc72
SHA195be0248f53891aa5abecc498af5c3c98b532ba6
SHA256a50431ef857f65eb57d4418d917b25307371dd2612c045c0d34f78cea631996c
SHA512f2e82e4e57dc6b3033ac74846f9830092521a26067d96f1c07b613258267c2d578bee901a0db04cd4fad13d2cc8afbbd3c3a685e040d225afd70203891632bbd
-
Filesize
5.9MB
MD5dcc26dd014bad9eafa9066d3781b615d
SHA1b0cb8621ca58a196ac73bed4e525deacfaf2d836
SHA25669502ffc7e2b8946d420e682cd1421f58a17f489590f761c580ce2a4feb74ae3
SHA5125a7804fdebe09aada86e327899fa7ce6830c26c426d398dd72ef68121c33e59c2572709a725f43d6f1d31c52e7b4ea10b2128d00d530a00ef9db9a8efef204e3
-
Filesize
6.8MB
MD5e77964e011d8880eae95422769249ca4
SHA18e15d7c4b7812a1da6c91738c7178adf0ff3200f
SHA256f200984380d291051fc4b342641cd34e7560cadf4af41b2e02b8778f14418f50
SHA5128feb3dc4432ec0a87416cbc75110d59efaf6504b4de43090fc90286bd37f98fc0a5fb12878bb33ac2f6cd83252e8dfd67dd96871b4a224199c1f595d33d4cade
-
Filesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
Filesize
14.7MB
MD56955715b6ff15bdc153a2431cc395cca
SHA1272e1eec66a1871b300484b2200b507a4abe5420
SHA256a6d40169be9c151e9e6c86fe53d2bac3b4c2ddb41c0b650d961f8328939b4761
SHA512cf82d27d7010be69ab1c288fef9d820905407c8018e2a91f3c39a0eda5e9378e0ff04d077520d556d46d7a9cb0a3a640d15a10ad4090e482be3c83930836019d
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
2.4MB
MD59fb4770ced09aae3b437c1c6eb6d7334
SHA1fe54b31b0db8665aa5b22bed147e8295afc88a03
SHA256a05b592a971fe5011554013bcfe9a4aaf9cfc633bdd1fe3a8197f213d557b8d3
SHA512140fee6daf23fe8b7e441b3b4de83554af804f00ecedc421907a385ac79a63164bd9f28b4be061c2ea2262755d85e14d3a8e7dc910547837b664d78d93667256
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5dc89cfe2a3b5ff9acb683c7237226713
SHA124f19bc7d79fa0c5af945b28616225866ee51dd5
SHA256ceddefa824f1dd6e7e669d4470e18e557c22fe73359f5b31edf4537473b96148
SHA512ee5d047e1124351997ecfaa5c8bd3e9ce8a974ac281675cda4d0a55e40f3883336a2378b9ebf3d1f227d01b386c26473c32e39bcab836da2b392bf778a6cf5c2
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
306KB
MD59e7bd4e6b0220bbb8c4068a02939e692
SHA192b8c83e84d6823bf4cf5238f368c27e5243241d
SHA256a547ce72c56e28616970d53b15e05cf4532a20384cae7a72b8428789a48028ef
SHA5127c1a0dcdcbeb988679ad24cbef85bd0b3f6c6c41c8699d506be3a1d6b0542fff0f6ec85eb53fe98278f787cd108771e2d168e2a9080327706edc629c41f57522
-
Filesize
4.2MB
MD51842fc317e5a1d69802a698ae55c38f2
SHA1151e6beea179734ac936b9a09553694497ac25b5
SHA2563a28b148d121751482a29d954aeed15f8ae208f86cd3ed6b819c5c5c842e0cf9
SHA512c625d83b286c3e704f43ec80a4fed5c91bba6929c1c89e23bdc642d8778ea063507b578a7ef74368c815f4baf03fc1a8edfb4b3d9449619c3651a8cf33b139c2
-
Filesize
6.5MB
MD55d5da0738299d8893b79a6c926765e5f
SHA1b05c2cfd30ca1c163cb829b7e7e5ea2d6c57d1d1
SHA25653c80bee05d28fe65ab0ae6459753fe7b804c0b68b85faaf828576687ef28ca3
SHA512d9fffe943131e71762f5e2e1ad3d23053069f0f028054be9ec2c8491a6812adadacbf099ab8fa79ca9916ceda14ccaedfe4a0e1e5235871a97145ef77d7b0b26
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4106386276-4127174233-3637007343-1000\76b53b3ec448f7ccdda2063b15d2bfc3_ebaa0802-254d-4be1-a642-a8a5c0b06224
Filesize2KB
MD5ff34a105f6eba4937e03807001ea67e9
SHA156e96afe84d44a901438bdd9c89dacba6f46d50c
SHA2566afdcbbf7f03fbf84a886869d36a5dc9cbfa4dd608935425ba57b1f8554e143f
SHA512412b1e1f2534f198b75c28feec7fabd76b2ccd7c4ccdfe4ae31fd6fcfcefb8faaf7fa361c0d965783342292d96ed6956b91233bfa4599f686e5e8f7adeb1a645
-
Filesize
40B
MD5cde47ac03a7d4c5a9ae6193ebeabe294
SHA13296ab6ff9670eeedc91e86811bd71723eb000fa
SHA2562a7e602ef8d1e8fbbab635df584c40b8d4fc64c13791537c9fab42d52eb20881
SHA5129c2b536067bd2dc0e53dcf8efc3bc91d203e4a3b8c8c7ea6aabc237c2a55e86b4741f774017b680453dfe570df2c40c845f8940bb7ea57cf7814d46a9fd7d87b
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
541KB
MD51fc4b9014855e9238a361046cfbf6d66
SHA1c17f18c8246026c9979ab595392a14fe65cc5e9f
SHA256f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50
SHA5122af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12
-
Filesize
304KB
MD5cc90e3326d7b20a33f8037b9aab238e4
SHA1236d173a6ac462d85de4e866439634db3b9eeba3
SHA256bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7
SHA512b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521
-
Filesize
5.1MB
MD50c9c2f9a0ac77ee86f3485352bd676cf
SHA1a35f21542b34b574e89d39b527f2c1473c6a2f1e
SHA256bd77a29dbcca319e91b59980361bc322e3a2a1c35e3521a0cfbcc69d68ab4929
SHA512df248801abc8212ac168648eee3c10f8ebfa6895836a618611b38a08106122f8fbe0b160a24f5bfb70f32a26ad14663b4cef3268fdde20a44c6e34c32df08c2a
-
Filesize
5.1MB
MD56ec0b6275783f0fe13885c32fda09c52
SHA1857ff4eb13527a0678bdcf63d92c3a5f108ae268
SHA2562d0840b5df6f4cd30768e635ae8122c0c7bfa64b65e5b79e91045843590bd7a2
SHA5123afeb5214ff395b216f2f76cc85251f903155d515286ccb958b1a9097317ad1bdca07c7b209086aee7f4d9cf27a41d827b7570f2b8a5e17e31799162fc209533
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
2KB
MD5c01f05f08621230cfd1f0be4f3a083e3
SHA1bd3173b79a6d1cd3ae811689be33b52644926750
SHA25602c8ec24d83d7f8532b8f3e6b28adae62c75945dc0e9e5c76375082563f2fdae
SHA512448a81229144c8df77e496fae37d7885473506504b84d3e4532acd2dc5a156e5b7cbc9038e11c4758e5253e0fc5a13228ffa7f7de30db49a85f23e0e6a4fa326
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
Filesize
127B
MD57cc972a3480ca0a4792dc3379a763572
SHA1f72eb4124d24f06678052706c542340422307317
SHA25602ad5d151250848f2cc4b650a351505aa58ac13c50da207cc06295c123ddf5e5
SHA512ff5f320356e59eaf8f2b7c5a2668541252221be2d9701006fcc64ce802e66eeaf6ecf316d925258eb12ee5b8b7df4f8da075e9524badc0024b55fae639d075b7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e