Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe
Resource
win7-20240221-en
General
-
Target
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe
-
Size
404KB
-
MD5
15ce9e885610d5b85500ea0d139f6d21
-
SHA1
99f1392185a70453f33e15d6f5b75064217c2c18
-
SHA256
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e
-
SHA512
9ee8e3fb682cf7abb5804106f841551f2f0fd8ace9842e67f3bda573772d39a6482d19e853de5a9a48d177350a3398cb814105ced01fdfb1be6db7e8bc9055b9
-
SSDEEP
6144:/IJTLRoSz47P8DiLdwXQIPcnEPjj9tQPBBpRPZi9opzUeqcnoKPcmPuJkJ:wlRoSz4j8DM6gIxfUP+2Ye9oCcmf
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-50-0x0000000004120000-0x0000000004A0B000-memory.dmp family_glupteba behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1416-147-0x0000000003E70000-0x000000000475B000-memory.dmp family_glupteba behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba -
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe -
Processes:
KUtA0iRzg925CZuDgGEAq0cv.exe95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe = "0" 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" KUtA0iRzg925CZuDgGEAq0cv.exe -
Detects Windows executables referencing non-Windows User-Agents 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3080-4-0x0000000000400000-0x0000000000408000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Detects executables Discord URL observed in first stage droppers 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing URLs to raw contents of a Github gist 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing artifacts associated with disabling Widnows Defender 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables packed with Themida 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\pAVeI18RsCEAuLRXNxUXFGEq.exe INDICATOR_EXE_Packed_Themida behavioral2/memory/2336-294-0x00007FF6E0B10000-0x00007FF6E124A000-memory.dmp INDICATOR_EXE_Packed_Themida -
Detects executables packed with or use KoiVM 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4248-3-0x000001E352830000-0x000001E35288E000-memory.dmp INDICATOR_EXE_Packed_KoiVM -
Detects executables referencing many varying, potentially fake Windows User-Agents 21 IoCs
Processes:
resource yara_rule behavioral2/memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA behavioral2/memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TooManyWindowsUA -
UPX dump on OEP (original entry point) 4 IoCs
Processes:
resource yara_rule C:\Windows\windefender.exe UPX behavioral2/memory/4164-517-0x0000000000400000-0x00000000008DF000-memory.dmp UPX behavioral2/memory/2124-520-0x0000000000400000-0x00000000008DF000-memory.dmp UPX behavioral2/memory/2124-583-0x0000000000400000-0x00000000008DF000-memory.dmp UPX -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 368 netsh.exe 3728 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe5TNHvZSkZLk8VtwM0lC3LFLU.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation 5TNHvZSkZLk8VtwM0lC3LFLU.exe -
Drops startup file 6 IoCs
Processes:
jsc.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hmn2yTHzH3biwJCj2LLUxSfR.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mrbr6sIC3rTTQvFeEXyzjVYd.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FamvBBYj6p7vHy8KIyswKVAj.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GENHaNTHGtdd0xtFop9XtGac.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\aA5FPkNBTDYmCURXL9D0814X.bat jsc.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\O9T1w4rT28CFkc12ZTyee0MS.bat jsc.exe -
Executes dropped EXE 19 IoCs
Processes:
KUtA0iRzg925CZuDgGEAq0cv.exe5TNHvZSkZLk8VtwM0lC3LFLU.exeCjNsZwbxq7l5MZje2GVxIAqg.exeKUtA0iRzg925CZuDgGEAq0cv.exeu3e4.0.exeCjNsZwbxq7l5MZje2GVxIAqg.exepAVeI18RsCEAuLRXNxUXFGEq.execsrss.exeinjector.exewindefender.exewindefender.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exepid process 5008 KUtA0iRzg925CZuDgGEAq0cv.exe 4396 5TNHvZSkZLk8VtwM0lC3LFLU.exe 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 4720 u3e4.0.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 2336 pAVeI18RsCEAuLRXNxUXFGEq.exe 2296 csrss.exe 4980 injector.exe 4164 windefender.exe 2124 windefender.exe 4532 3SoEfz9cn0E25HPRjbAsqI44.exe 2084 3SoEfz9cn0E25HPRjbAsqI44.exe 1584 3SoEfz9cn0E25HPRjbAsqI44.exe 980 3SoEfz9cn0E25HPRjbAsqI44.exe 1288 3SoEfz9cn0E25HPRjbAsqI44.exe 1672 Assistant_109.0.5097.45_Setup.exe_sfx.exe 2400 assistant_installer.exe 3116 assistant_installer.exe -
Loads dropped DLL 9 IoCs
Processes:
3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exeassistant_installer.exeassistant_installer.exepid process 4532 3SoEfz9cn0E25HPRjbAsqI44.exe 2084 3SoEfz9cn0E25HPRjbAsqI44.exe 1584 3SoEfz9cn0E25HPRjbAsqI44.exe 980 3SoEfz9cn0E25HPRjbAsqI44.exe 1288 3SoEfz9cn0E25HPRjbAsqI44.exe 2400 assistant_installer.exe 2400 assistant_installer.exe 3116 assistant_installer.exe 3116 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\pAVeI18RsCEAuLRXNxUXFGEq.exe themida behavioral2/memory/2336-294-0x00007FF6E0B10000-0x00007FF6E124A000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/4164-517-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2124-520-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2124-583-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exeKUtA0iRzg925CZuDgGEAq0cv.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe = "0" 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\rss = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\csrss = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\windefender.exe = "0" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\System32\drivers = "0" KUtA0iRzg925CZuDgGEAq0cv.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
KUtA0iRzg925CZuDgGEAq0cv.exeCjNsZwbxq7l5MZje2GVxIAqg.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" CjNsZwbxq7l5MZje2GVxIAqg.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exepAVeI18RsCEAuLRXNxUXFGEq.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pAVeI18RsCEAuLRXNxUXFGEq.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3SoEfz9cn0E25HPRjbAsqI44.exe3SoEfz9cn0E25HPRjbAsqI44.exedescription ioc process File opened (read-only) \??\D: 3SoEfz9cn0E25HPRjbAsqI44.exe File opened (read-only) \??\F: 3SoEfz9cn0E25HPRjbAsqI44.exe File opened (read-only) \??\D: 3SoEfz9cn0E25HPRjbAsqI44.exe File opened (read-only) \??\F: 3SoEfz9cn0E25HPRjbAsqI44.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
pAVeI18RsCEAuLRXNxUXFGEq.exepid process 2336 pAVeI18RsCEAuLRXNxUXFGEq.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exedescription pid process target process PID 4248 set thread context of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
KUtA0iRzg925CZuDgGEAq0cv.exeCjNsZwbxq7l5MZje2GVxIAqg.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN KUtA0iRzg925CZuDgGEAq0cv.exe File opened (read-only) \??\VBoxMiniRdrDN CjNsZwbxq7l5MZje2GVxIAqg.exe -
Drops file in Windows directory 6 IoCs
Processes:
KUtA0iRzg925CZuDgGEAq0cv.exeCjNsZwbxq7l5MZje2GVxIAqg.execsrss.exedescription ioc process File created C:\Windows\rss\csrss.exe KUtA0iRzg925CZuDgGEAq0cv.exe File opened for modification C:\Windows\rss CjNsZwbxq7l5MZje2GVxIAqg.exe File created C:\Windows\rss\csrss.exe CjNsZwbxq7l5MZje2GVxIAqg.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\rss KUtA0iRzg925CZuDgGEAq0cv.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3448 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 532 4720 WerFault.exe u3e4.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4956 schtasks.exe 808 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeKUtA0iRzg925CZuDgGEAq0cv.exepowershell.exepowershell.exepowershell.exepowershell.exewindefender.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1862 = "Russia TZ 6 Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2872 = "Magallanes Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-932 = "Coordinated Universal Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-632 = "Tokyo Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-434 = "Georgian Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-841 = "Argentina Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-492 = "India Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2941 = "Sao Tome Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2062 = "North Korea Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-961 = "Paraguay Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1501 = "Turkey Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-331 = "E. Europe Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2751 = "Tomsk Daylight Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-842 = "Argentina Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-292 = "Central European Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-601 = "Taipei Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-962 = "Paraguay Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-111 = "Eastern Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-731 = "Fiji Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2572 = "Turks and Caicos Standard Time" KUtA0iRzg925CZuDgGEAq0cv.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-572 = "China Standard Time" windefender.exe -
Processes:
3SoEfz9cn0E25HPRjbAsqI44.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 3SoEfz9cn0E25HPRjbAsqI44.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 3SoEfz9cn0E25HPRjbAsqI44.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 3SoEfz9cn0E25HPRjbAsqI44.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 5c00000001000000040000000010000004000000010000001000000078f2fcaa601f2fb4ebc937ba532e7549030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e41d0000000100000010000000a86dc6a233eb339610f3ed414927c559140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac899880b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b06010505070308530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996190000000100000010000000ffac207997bb2cfe865570179ee037b92000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e 3SoEfz9cn0E25HPRjbAsqI44.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 3SoEfz9cn0E25HPRjbAsqI44.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeKUtA0iRzg925CZuDgGEAq0cv.exepowershell.exepowershell.exeCjNsZwbxq7l5MZje2GVxIAqg.exepowershell.exeKUtA0iRzg925CZuDgGEAq0cv.exepowershell.exeCjNsZwbxq7l5MZje2GVxIAqg.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.exepid process 1084 powershell.exe 1084 powershell.exe 3212 powershell.exe 3212 powershell.exe 3212 powershell.exe 5008 KUtA0iRzg925CZuDgGEAq0cv.exe 5008 KUtA0iRzg925CZuDgGEAq0cv.exe 3732 powershell.exe 3732 powershell.exe 3732 powershell.exe 3744 powershell.exe 3744 powershell.exe 3744 powershell.exe 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe 4340 powershell.exe 4340 powershell.exe 4340 powershell.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 1416 KUtA0iRzg925CZuDgGEAq0cv.exe 3960 powershell.exe 3960 powershell.exe 3960 powershell.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe 1144 powershell.exe 1144 powershell.exe 3556 powershell.exe 3556 powershell.exe 1144 powershell.exe 3556 powershell.exe 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 2400 powershell.exe 2400 powershell.exe 2400 powershell.exe 3012 powershell.exe 3012 powershell.exe 3012 powershell.exe 2992 powershell.exe 2992 powershell.exe 2992 powershell.exe 4980 injector.exe 4980 injector.exe 4980 injector.exe 4980 injector.exe 4980 injector.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exepowershell.exejsc.exepowershell.exeKUtA0iRzg925CZuDgGEAq0cv.exepowershell.exepowershell.exeCjNsZwbxq7l5MZje2GVxIAqg.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exedescription pid process Token: SeDebugPrivilege 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 3080 jsc.exe Token: SeDebugPrivilege 3212 powershell.exe Token: SeDebugPrivilege 5008 KUtA0iRzg925CZuDgGEAq0cv.exe Token: SeImpersonatePrivilege 5008 KUtA0iRzg925CZuDgGEAq0cv.exe Token: SeDebugPrivilege 3732 powershell.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeDebugPrivilege 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe Token: SeImpersonatePrivilege 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe Token: SeDebugPrivilege 4340 powershell.exe Token: SeDebugPrivilege 3960 powershell.exe Token: SeDebugPrivilege 1144 powershell.exe Token: SeDebugPrivilege 3556 powershell.exe Token: SeDebugPrivilege 4524 powershell.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 3012 powershell.exe Token: SeDebugPrivilege 2992 powershell.exe Token: SeSystemEnvironmentPrivilege 2296 csrss.exe Token: SeSecurityPrivilege 3448 sc.exe Token: SeSecurityPrivilege 3448 sc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exejsc.exeKUtA0iRzg925CZuDgGEAq0cv.exeCjNsZwbxq7l5MZje2GVxIAqg.exeKUtA0iRzg925CZuDgGEAq0cv.exe5TNHvZSkZLk8VtwM0lC3LFLU.exeCjNsZwbxq7l5MZje2GVxIAqg.execmd.execmd.execsrss.exedescription pid process target process PID 4248 wrote to memory of 1084 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe powershell.exe PID 4248 wrote to memory of 1084 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe powershell.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3080 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3456 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3456 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 4248 wrote to memory of 3456 4248 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe jsc.exe PID 3080 wrote to memory of 5008 3080 jsc.exe KUtA0iRzg925CZuDgGEAq0cv.exe PID 3080 wrote to memory of 5008 3080 jsc.exe KUtA0iRzg925CZuDgGEAq0cv.exe PID 3080 wrote to memory of 5008 3080 jsc.exe KUtA0iRzg925CZuDgGEAq0cv.exe PID 5008 wrote to memory of 3212 5008 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 5008 wrote to memory of 3212 5008 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 5008 wrote to memory of 3212 5008 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 3080 wrote to memory of 4396 3080 jsc.exe 5TNHvZSkZLk8VtwM0lC3LFLU.exe PID 3080 wrote to memory of 4396 3080 jsc.exe 5TNHvZSkZLk8VtwM0lC3LFLU.exe PID 3080 wrote to memory of 4396 3080 jsc.exe 5TNHvZSkZLk8VtwM0lC3LFLU.exe PID 3080 wrote to memory of 3032 3080 jsc.exe CjNsZwbxq7l5MZje2GVxIAqg.exe PID 3080 wrote to memory of 3032 3080 jsc.exe CjNsZwbxq7l5MZje2GVxIAqg.exe PID 3080 wrote to memory of 3032 3080 jsc.exe CjNsZwbxq7l5MZje2GVxIAqg.exe PID 3032 wrote to memory of 3732 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe svchost.exe PID 3032 wrote to memory of 3732 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe svchost.exe PID 3032 wrote to memory of 3732 3032 CjNsZwbxq7l5MZje2GVxIAqg.exe svchost.exe PID 1416 wrote to memory of 3744 1416 KUtA0iRzg925CZuDgGEAq0cv.exe Conhost.exe PID 1416 wrote to memory of 3744 1416 KUtA0iRzg925CZuDgGEAq0cv.exe Conhost.exe PID 1416 wrote to memory of 3744 1416 KUtA0iRzg925CZuDgGEAq0cv.exe Conhost.exe PID 4396 wrote to memory of 4720 4396 5TNHvZSkZLk8VtwM0lC3LFLU.exe u3e4.0.exe PID 4396 wrote to memory of 4720 4396 5TNHvZSkZLk8VtwM0lC3LFLU.exe u3e4.0.exe PID 4396 wrote to memory of 4720 4396 5TNHvZSkZLk8VtwM0lC3LFLU.exe u3e4.0.exe PID 1440 wrote to memory of 4340 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 4340 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 4340 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1416 wrote to memory of 2508 1416 KUtA0iRzg925CZuDgGEAq0cv.exe cmd.exe PID 1416 wrote to memory of 2508 1416 KUtA0iRzg925CZuDgGEAq0cv.exe cmd.exe PID 2508 wrote to memory of 368 2508 cmd.exe netsh.exe PID 2508 wrote to memory of 368 2508 cmd.exe netsh.exe PID 1416 wrote to memory of 3960 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 1416 wrote to memory of 3960 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 1416 wrote to memory of 3960 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 3080 wrote to memory of 2336 3080 jsc.exe pAVeI18RsCEAuLRXNxUXFGEq.exe PID 3080 wrote to memory of 2336 3080 jsc.exe pAVeI18RsCEAuLRXNxUXFGEq.exe PID 1440 wrote to memory of 3952 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe cmd.exe PID 1440 wrote to memory of 3952 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe cmd.exe PID 3952 wrote to memory of 3728 3952 cmd.exe netsh.exe PID 3952 wrote to memory of 3728 3952 cmd.exe netsh.exe PID 1440 wrote to memory of 1144 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 1144 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 1144 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1416 wrote to memory of 3556 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 1416 wrote to memory of 3556 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 1416 wrote to memory of 3556 1416 KUtA0iRzg925CZuDgGEAq0cv.exe powershell.exe PID 1440 wrote to memory of 4524 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 4524 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1440 wrote to memory of 4524 1440 CjNsZwbxq7l5MZje2GVxIAqg.exe powershell.exe PID 1416 wrote to memory of 2296 1416 KUtA0iRzg925CZuDgGEAq0cv.exe csrss.exe PID 1416 wrote to memory of 2296 1416 KUtA0iRzg925CZuDgGEAq0cv.exe csrss.exe PID 1416 wrote to memory of 2296 1416 KUtA0iRzg925CZuDgGEAq0cv.exe csrss.exe PID 2296 wrote to memory of 2400 2296 csrss.exe powershell.exe PID 2296 wrote to memory of 2400 2296 csrss.exe powershell.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe"C:\Users\Admin\AppData\Local\Temp\95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\95442c887f47bbb4b350fca87c45dc6ef95355ce86a63d7c2f50db2d92ae512e.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\KUtA0iRzg925CZuDgGEAq0cv.exe"C:\Users\Admin\Pictures\KUtA0iRzg925CZuDgGEAq0cv.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\KUtA0iRzg925CZuDgGEAq0cv.exe"C:\Users\Admin\Pictures\KUtA0iRzg925CZuDgGEAq0cv.exe"4⤵
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\5TNHvZSkZLk8VtwM0lC3LFLU.exe"C:\Users\Admin\Pictures\5TNHvZSkZLk8VtwM0lC3LFLU.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\u3e4.0.exe"C:\Users\Admin\AppData\Local\Temp\u3e4.0.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 10165⤵
- Program crash
-
C:\Users\Admin\Pictures\CjNsZwbxq7l5MZje2GVxIAqg.exe"C:\Users\Admin\Pictures\CjNsZwbxq7l5MZje2GVxIAqg.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\CjNsZwbxq7l5MZje2GVxIAqg.exe"C:\Users\Admin\Pictures\CjNsZwbxq7l5MZje2GVxIAqg.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\pAVeI18RsCEAuLRXNxUXFGEq.exe"C:\Users\Admin\Pictures\pAVeI18RsCEAuLRXNxUXFGEq.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe"C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
-
C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exeC:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2a8,0x2ac,0x2b0,0x288,0x2b4,0x6f1fe1d0,0x6f1fe1dc,0x6f1fe1e84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\3SoEfz9cn0E25HPRjbAsqI44.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\3SoEfz9cn0E25HPRjbAsqI44.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe"C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4532 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240421011531" --session-guid=1152f253-113c-4dbe-b34e-22fbf4058f21 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A4050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
-
C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exeC:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2b8,0x2b4,0x2bc,0x284,0x2c0,0x6e42e1d0,0x6e42e1dc,0x6e42e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x1016038,0x1016044,0x10160505⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4720 -ip 47201⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Modify Registry
6Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD51d7f3d1036cc09d2b9c5d8d5acfbb867
SHA15a76ade3e2ced7d72b6ce450b074d3c5aaa13b85
SHA2560725190ee120338da973024f3d633bd17d0009af194000fa0a91dde961a8d76c
SHA512dc993da2058b91cd4870b0e868963cadd68d0c03aee091691d7ed0a027215ef5114c9d56ec8d9e228cd7d022339d277903fc12481e2e00df758a3915a17d1fd8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
21KB
MD5c618d281c0df2754a4944d2d67548f19
SHA17fd675cb6168d318e8ddf35a0336070073b66027
SHA25637214749d004c634e62b13fed9d15d2970be47f35db9f495f1ba446f1b0c1b6a
SHA51218573e79ef4fb47736b652799907a955f413cf2ed2f6b8c1b2ffd7f0cd62c1376f09e35e5177f553b7b6ee8e1a2206737543a0e11796aab31b9716a5699ef175
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\additional_file0.tmpFilesize
2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\assistant_installer.exeFilesize
1.9MB
MD5976bc8e5fe65f9bb56831e20f1747150
SHA1f9e7f5628aaaabed9939ef055540e24590a9ccfb
SHA256f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0
SHA5122858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\dbgcore.dllFilesize
166KB
MD59ebb919b96f6f94e1be4cdc6913ef629
SHA131e99ac4fba516f82b36bd81784e8d518b32f9df
SHA256fdae21127deb16eb8ba36f2493d2255f4cb8ab4c18e8bd8ba5e587f5a7ecd119
SHA512a1b42f7d2896da270bb3c80cf9b88c4b4f1491084e7aa7760eeea5533b26f041dc79b21d5ffd2bba2221fe118e0a8d912e170f24fd895c9315b1ee9c7adfe700
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\assistant\dbghelp.dllFilesize
1.7MB
MD5544255258f9d45b4608ccfd27a4ed1dd
SHA1571e30ceb9c977817b5bbac306366ae59f773497
SHA2563b02fc85602e83059f611c658e3cad6bc59c3c51214d4fe7e31f3ac31388dd68
SHA5122093da881fa90eec2b90d1ca6eaaff608fe16ac612571a7fd5ed94dd5f7ff7e5c1e8c862bab0a228850829527886473e3942abd23a81d10cab8f9baad2cc7664
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210115311\opera_packageFilesize
103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404210115314954532.dllFilesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ytdk45yh.wni.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\u3e4.0.exeFilesize
301KB
MD55d835a5d56e1b106a3928a3f96f28c0a
SHA176637a8a47e97b2eca53f849e0e95fc1a5683fa5
SHA256a676e2601f65bd27a7d0c7cc2cf9452ef9880a544c01d75692c2c211699b58fd
SHA512c5b2a3ce8afd27f6a95b29874643eb4dfd7da56550b2451fe16705865c10af6ddc3bb7c94aec5840ed4b1a5d8df630719128dbf1169b2e5c7e0e2e7998a9c6d5
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.datFilesize
40B
MD5f32590796e7910e806d9aaee0470240d
SHA1fb4dea4ea3be89141df8c64e1ecc130bd46f93cd
SHA256151c029b78bd112be74a25d63ca520ee0aa34f2df88390f34d52ece8b11d2345
SHA51220a1c25a0c1a0ec4f3b527b2bff141f221d59e23cbd5a3cc3fb24c2e36b1fe1fcbaca4965a9c3b3077dc39542ad2caa0e8004fac86d647635078bea081894e1f
-
C:\Users\Admin\Pictures\3SoEfz9cn0E25HPRjbAsqI44.exeFilesize
5.1MB
MD5a0ce477043e18abd06f5766bdea12808
SHA12d4490e5fbacf96d23ae7a04c6ac1f237013f4dd
SHA2563733a9d4aad70f0a8464d8096d6103f1aadf35320dd46c6a8e9c1e6bd8ed2ed9
SHA51226a0fc1a3f3222505a03774d57668e922784b9125fdac68ff1f073cbd4408a5f578a4396a8105ada4dd46ce47d0d5e128153ff5f56df926bd4ae608222a7d4d3
-
C:\Users\Admin\Pictures\5TNHvZSkZLk8VtwM0lC3LFLU.exeFilesize
444KB
MD5e1de6a02960c3a776fe4cdbe821efe9b
SHA117da2036ac1d394138c7ad09735b7657968a4ef0
SHA256d5ca5f35b6d80412d3cdad4115a23a464f524bf72d6b811ace5e658075c87232
SHA5126f6b7d63f41afb8d471b9305116f9b1648454a7ee6d1401997102c4638d6a6037f3eb578f5b5ca11b9f6e87f9a236be55d1f617df5f67b39e3618d48a014e59a
-
C:\Users\Admin\Pictures\9CIPnlnOVq9rkGP8bo0zO7sF.exeFilesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Users\Admin\Pictures\KUtA0iRzg925CZuDgGEAq0cv.exeFilesize
4.2MB
MD512c1251ddacc8c6651573aaae2a36711
SHA1aa4a4fc95f24a847f33a0fcc22d318fe947929d0
SHA256a018166a731757f43374b0b24baecfbf31b85cf9de793b9d11b186acf887bf22
SHA512e8e9723b210254504ae06f77ed86ff5c7da0ac1ba5134cb2ab99cd42b06744cdf2379835d5e8cbd413da69b1184a0d6297d29dc8393794d8959c5a2dc94f0a69
-
C:\Users\Admin\Pictures\pAVeI18RsCEAuLRXNxUXFGEq.exeFilesize
5.5MB
MD59f8b8a866575e821310f6203c5bdc044
SHA1f39bbd5eb2f736acdf565d6b56e560a60334dd0e
SHA256277677de19193a2297c88689312d1a294edf4f81b3ff4ba8202e2cbb9c6fbeea
SHA512b8222b6c8ec092ccc352676d4bf8c90a4ecb558a8346ab2628a41071d0747e87cc0c805c5c4efaf922a5e7ff18ad78bfa59a9180670df881085f6fab3b67f209
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD553c0dcab1f314951daabb431106b40d5
SHA167f2247dea01fc7315ee3c8d03bef7ce60781cf2
SHA256c7ab4e1e2cfacf0e434d9c4ec39949c3c24582b80ae277faa93f46e25673f936
SHA512fb197fdfd2ebbb33ea40ee09888bb652634144125fc0b959aa5ec1b8308160678d4029a2a5a1843b5f54535b1696b0e3b098cddf1c4e5a1a1c9a3e1fc58b5f1f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD55d7bf4a0d45e092ad5732957dcf46bd3
SHA1987ca5358de51f4a9611d4a424353fa210313606
SHA25615356c597c7fa2fcee7d8c4aaa1ba3f365767b65a3b34323cde80a3c6a2396bb
SHA51225758a0d27b30ae036efda3c4b47acaf51f9087661e32d105bd3eff1860af3e1373ac5367411f68f54a4f12d64fb24371018b5f764e27ed59d9c808c21cd45ff
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD52a4228450cc47c04683ef99e82661069
SHA1f8b8d7ec573d9632e0ebb734dbcbed5cce85faa0
SHA25654cdb84a28ca44c6c9df22715915a22d92357fc680567224308db97b6f465bdc
SHA512bcd1087271cf9b9f835f39a43704114f0069d2c7da993a9c3c2002af4e960f4988c2b3d1764c510916f30af17ef252e25cbc40e55081a01418b4a9371d36fd8f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD515e8c157083680c7d9ccb690fba1b5db
SHA18f5396da801f54cff41923009c1a7ea0fa85f5f8
SHA256cbd46395b41f75e189208df7c838448cf7c4ee81e4befaa44f1051ce19f670a1
SHA51250a3fcb27d57ba3d7957c52d2946561d9307e0057816582ed9b6872fc10f732044746ecaa27f5f36e78fd98071590fb71b5c10b0be86e9615e9c034f65e03fa9
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5ea0ac8f9f8b7426a2d44bdc7f028b5ee
SHA186b9a401cdc5a7a45317208519bbe1cc51d2096c
SHA256430ba00790071730382da5548dead575b07e4cc9f7cb36cf96ea8bd71b4146cf
SHA5128eacee8a4affc89c6dc34ffe3e67422be8c2b32877cdcbfd2da3bf681858ad68b6ba85920c4bb03bf540c9ce02b1696769ac8a488ee2ead2c2abbcaf18aab2bf
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/1084-22-0x00007FFA64480000-0x00007FFA64F41000-memory.dmpFilesize
10.8MB
-
memory/1084-17-0x0000028DE6AB0000-0x0000028DE6AC0000-memory.dmpFilesize
64KB
-
memory/1084-16-0x0000028DE6AB0000-0x0000028DE6AC0000-memory.dmpFilesize
64KB
-
memory/1084-15-0x00007FFA64480000-0x00007FFA64F41000-memory.dmpFilesize
10.8MB
-
memory/1084-5-0x0000028DE6A70000-0x0000028DE6A92000-memory.dmpFilesize
136KB
-
memory/1416-284-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1416-146-0x0000000003A60000-0x0000000003E63000-memory.dmpFilesize
4.0MB
-
memory/1416-147-0x0000000003E70000-0x000000000475B000-memory.dmpFilesize
8.9MB
-
memory/1416-158-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1416-375-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1440-438-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1440-379-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2124-520-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2124-583-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2296-652-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-512-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-655-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-500-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-581-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-519-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-649-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-646-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-643-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-576-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2296-507-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/2336-294-0x00007FF6E0B10000-0x00007FF6E124A000-memory.dmpFilesize
7.2MB
-
memory/3032-212-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/3032-132-0x0000000003A40000-0x0000000003E39000-memory.dmpFilesize
4.0MB
-
memory/3032-137-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/3080-18-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/3080-86-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/3080-19-0x0000000005450000-0x0000000005460000-memory.dmpFilesize
64KB
-
memory/3080-107-0x0000000005450000-0x0000000005460000-memory.dmpFilesize
64KB
-
memory/3080-4-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/3212-69-0x0000000005600000-0x0000000005954000-memory.dmpFilesize
3.3MB
-
memory/3212-63-0x0000000004CD0000-0x0000000004D36000-memory.dmpFilesize
408KB
-
memory/3212-52-0x00000000020D0000-0x0000000002106000-memory.dmpFilesize
216KB
-
memory/3212-53-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/3212-54-0x0000000004720000-0x0000000004730000-memory.dmpFilesize
64KB
-
memory/3212-55-0x0000000004720000-0x0000000004730000-memory.dmpFilesize
64KB
-
memory/3212-136-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/3212-56-0x0000000004D60000-0x0000000005388000-memory.dmpFilesize
6.2MB
-
memory/3212-57-0x0000000004B30000-0x0000000004B52000-memory.dmpFilesize
136KB
-
memory/3212-127-0x0000000007170000-0x0000000007178000-memory.dmpFilesize
32KB
-
memory/3212-121-0x0000000007180000-0x000000000719A000-memory.dmpFilesize
104KB
-
memory/3212-64-0x0000000005390000-0x00000000053F6000-memory.dmpFilesize
408KB
-
memory/3212-84-0x00000000059F0000-0x0000000005A0E000-memory.dmpFilesize
120KB
-
memory/3212-85-0x0000000005A30000-0x0000000005A7C000-memory.dmpFilesize
304KB
-
memory/3212-115-0x0000000007130000-0x0000000007144000-memory.dmpFilesize
80KB
-
memory/3212-90-0x0000000005F80000-0x0000000005FC4000-memory.dmpFilesize
272KB
-
memory/3212-114-0x0000000007110000-0x000000000711E000-memory.dmpFilesize
56KB
-
memory/3212-91-0x0000000006D30000-0x0000000006DA6000-memory.dmpFilesize
472KB
-
memory/3212-113-0x00000000070D0000-0x00000000070E1000-memory.dmpFilesize
68KB
-
memory/3212-112-0x00000000071D0000-0x0000000007266000-memory.dmpFilesize
600KB
-
memory/3212-111-0x00000000070C0000-0x00000000070CA000-memory.dmpFilesize
40KB
-
memory/3212-110-0x0000000004720000-0x0000000004730000-memory.dmpFilesize
64KB
-
memory/3212-109-0x0000000006FD0000-0x0000000007073000-memory.dmpFilesize
652KB
-
memory/3212-108-0x0000000006FB0000-0x0000000006FCE000-memory.dmpFilesize
120KB
-
memory/3212-97-0x000000006F380000-0x000000006F6D4000-memory.dmpFilesize
3.3MB
-
memory/3212-96-0x000000006F330000-0x000000006F37C000-memory.dmpFilesize
304KB
-
memory/3212-95-0x0000000006F70000-0x0000000006FA2000-memory.dmpFilesize
200KB
-
memory/3212-94-0x000000007F320000-0x000000007F330000-memory.dmpFilesize
64KB
-
memory/3212-93-0x0000000006DB0000-0x0000000006DCA000-memory.dmpFilesize
104KB
-
memory/3212-92-0x0000000007430000-0x0000000007AAA000-memory.dmpFilesize
6.5MB
-
memory/3732-140-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/3732-141-0x00000000030F0000-0x0000000003100000-memory.dmpFilesize
64KB
-
memory/3732-143-0x00000000030F0000-0x0000000003100000-memory.dmpFilesize
64KB
-
memory/3732-160-0x0000000006CF0000-0x0000000006D3C000-memory.dmpFilesize
304KB
-
memory/3732-157-0x0000000006270000-0x00000000065C4000-memory.dmpFilesize
3.3MB
-
memory/3744-162-0x0000000074620000-0x0000000074DD0000-memory.dmpFilesize
7.7MB
-
memory/4164-517-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/4248-3-0x000001E352830000-0x000001E35288E000-memory.dmpFilesize
376KB
-
memory/4248-2-0x000001E350EE0000-0x000001E350EF0000-memory.dmpFilesize
64KB
-
memory/4248-26-0x00007FFA64480000-0x00007FFA64F41000-memory.dmpFilesize
10.8MB
-
memory/4248-0-0x000001E350AF0000-0x000001E350AFE000-memory.dmpFilesize
56KB
-
memory/4248-1-0x00007FFA64480000-0x00007FFA64F41000-memory.dmpFilesize
10.8MB
-
memory/4396-87-0x0000000001C30000-0x0000000001D30000-memory.dmpFilesize
1024KB
-
memory/4396-161-0x0000000001C30000-0x0000000001D30000-memory.dmpFilesize
1024KB
-
memory/4396-88-0x0000000001BA0000-0x0000000001C0E000-memory.dmpFilesize
440KB
-
memory/4396-89-0x0000000000400000-0x0000000001A3A000-memory.dmpFilesize
22.2MB
-
memory/4396-204-0x0000000000400000-0x0000000001A3A000-memory.dmpFilesize
22.2MB
-
memory/4720-244-0x0000000000400000-0x0000000001A16000-memory.dmpFilesize
22.1MB
-
memory/5008-133-0x0000000003D20000-0x000000000411A000-memory.dmpFilesize
4.0MB
-
memory/5008-49-0x0000000003D20000-0x000000000411A000-memory.dmpFilesize
4.0MB
-
memory/5008-50-0x0000000004120000-0x0000000004A0B000-memory.dmpFilesize
8.9MB
-
memory/5008-51-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/5008-145-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/5008-138-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB