Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-04-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe
Resource
win10v2004-20240412-en
General
-
Target
4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe
-
Size
3.3MB
-
MD5
b9882fe8bb7ab2a4d094f9ff5442df1c
-
SHA1
e17c146530a4371e0595c195c24863935a3dee8b
-
SHA256
4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628
-
SHA512
bee33d43deb43854975e6c7a57f27ab8c6519ea3e6df51297ca670ac62831f29f6a18eff0bb0af14f9e985ebf9e2169ed97582fa64998cfb33b1d8b61ec72db4
-
SSDEEP
49152:zUIbNigeVE2MD7ZDAgUf0dgF8bEOlf84L:JI3bg3J
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 16 IoCs
Processes:
resource yara_rule behavioral2/memory/1384-29-0x0000000003F80000-0x000000000486B000-memory.dmp family_glupteba behavioral2/memory/1384-30-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1436-82-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1436-83-0x0000000004090000-0x000000000497B000-memory.dmp family_glupteba behavioral2/memory/1384-126-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/1436-219-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-307-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-332-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-398-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/432-401-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-405-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-411-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-449-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-456-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-525-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba behavioral2/memory/4132-596-0x0000000000400000-0x0000000001DF9000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
hLaqxMPTtCi8TAPOi8Pcyp1b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
hLaqxMPTtCi8TAPOi8Pcyp1b.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 4220 netsh.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
hLaqxMPTtCi8TAPOi8Pcyp1b.exeInstall.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hLaqxMPTtCi8TAPOi8Pcyp1b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hLaqxMPTtCi8TAPOi8Pcyp1b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Install.exe -
Drops startup file 7 IoCs
Processes:
CasPol.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mK5q1Q8vDKuSAeLsy1gMITPG.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vdz7DpQ4QBq7NrHELqwcNjj2.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bh4OTGE2T8nvgamvgWEXkWA8.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eReCxuBhnWr8Agy45TlH5tXP.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DIr6ruP8jysmtviWXJTVyFrI.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tvRb2tmZ6TrqZoSIOVUtSMpn.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Qmwr3G5DWWCyKAz3LPKnqSSb.bat CasPol.exe -
Executes dropped EXE 21 IoCs
Processes:
XFUHkOGTO7wQRuFr6kSjsTs8.exeXFUHkOGTO7wQRuFr6kSjsTs8.exevkWT1RGD5lz0iEn9sAaCcAhM.exeur4.0.execsrss.exeinjector.exewindefender.exewindefender.exexVwdI8AkNJ9rRGGDXKQk03Ev.exexVwdI8AkNJ9rRGGDXKQk03Ev.exehLaqxMPTtCi8TAPOi8Pcyp1b.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exeG4jM0hRRtZRx2hRx4yeD5cnJ.exeInstall.exepid process 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 976 vkWT1RGD5lz0iEn9sAaCcAhM.exe 2052 ur4.0.exe 4132 csrss.exe 1856 injector.exe 1468 windefender.exe 2952 windefender.exe 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe 432 xVwdI8AkNJ9rRGGDXKQk03Ev.exe 3908 hLaqxMPTtCi8TAPOi8Pcyp1b.exe 2628 2LqbapS3RfXJDR1x2hiP6UhU.exe 3688 2LqbapS3RfXJDR1x2hiP6UhU.exe 1588 2LqbapS3RfXJDR1x2hiP6UhU.exe 2608 2LqbapS3RfXJDR1x2hiP6UhU.exe 3824 2LqbapS3RfXJDR1x2hiP6UhU.exe 4516 Assistant_109.0.5097.45_Setup.exe_sfx.exe 4544 assistant_installer.exe 128 assistant_installer.exe 4060 G4jM0hRRtZRx2hRx4yeD5cnJ.exe 2736 Install.exe -
Loads dropped DLL 9 IoCs
Processes:
2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exeassistant_installer.exeassistant_installer.exepid process 2628 2LqbapS3RfXJDR1x2hiP6UhU.exe 3688 2LqbapS3RfXJDR1x2hiP6UhU.exe 1588 2LqbapS3RfXJDR1x2hiP6UhU.exe 2608 2LqbapS3RfXJDR1x2hiP6UhU.exe 3824 2LqbapS3RfXJDR1x2hiP6UhU.exe 4544 assistant_installer.exe 4544 assistant_installer.exe 128 assistant_installer.exe 128 assistant_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\hLaqxMPTtCi8TAPOi8Pcyp1b.exe themida behavioral2/memory/3908-428-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-429-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-430-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-433-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-434-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-432-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-437-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-438-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida behavioral2/memory/3908-453-0x00007FF769E20000-0x00007FF76A55A000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/1468-316-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2952-409-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
XFUHkOGTO7wQRuFr6kSjsTs8.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\S-1-5-21-801765966-3955847401-2235691403-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
hLaqxMPTtCi8TAPOi8Pcyp1b.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2LqbapS3RfXJDR1x2hiP6UhU.exe2LqbapS3RfXJDR1x2hiP6UhU.exedescription ioc process File opened (read-only) \??\F: 2LqbapS3RfXJDR1x2hiP6UhU.exe File opened (read-only) \??\D: 2LqbapS3RfXJDR1x2hiP6UhU.exe File opened (read-only) \??\F: 2LqbapS3RfXJDR1x2hiP6UhU.exe File opened (read-only) \??\D: 2LqbapS3RfXJDR1x2hiP6UhU.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 35 api.myip.com 35 ipinfo.io 36 api.myip.com 38 ipinfo.io -
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 12 IoCs
Processes:
powershell.exepowershell.exepowershell.exehLaqxMPTtCi8TAPOi8Pcyp1b.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy hLaqxMPTtCi8TAPOi8Pcyp1b.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI hLaqxMPTtCi8TAPOi8Pcyp1b.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol hLaqxMPTtCi8TAPOi8Pcyp1b.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
hLaqxMPTtCi8TAPOi8Pcyp1b.exepid process 3908 hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exedescription pid process target process PID 1736 set thread context of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
XFUHkOGTO7wQRuFr6kSjsTs8.exexVwdI8AkNJ9rRGGDXKQk03Ev.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN XFUHkOGTO7wQRuFr6kSjsTs8.exe File opened (read-only) \??\VBoxMiniRdrDN xVwdI8AkNJ9rRGGDXKQk03Ev.exe -
Drops file in Windows directory 5 IoCs
Processes:
XFUHkOGTO7wQRuFr6kSjsTs8.execsrss.exeschtasks.exedescription ioc process File opened for modification C:\Windows\rss XFUHkOGTO7wQRuFr6kSjsTs8.exe File created C:\Windows\rss\csrss.exe XFUHkOGTO7wQRuFr6kSjsTs8.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe File created C:\Windows\Tasks\bWycNackLSywaqkmgR.job schtasks.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1748 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3988 2052 WerFault.exe ur4.0.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2108 schtasks.exe 4700 schtasks.exe 2436 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
Install.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Install.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Install.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
XFUHkOGTO7wQRuFr6kSjsTs8.exewindefender.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2492 = "Aus Central W. Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2772 = "Omsk Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-691 = "Tasmania Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2492 = "Aus Central W. Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-412 = "E. Africa Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-341 = "Egypt Daylight Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-442 = "Arabian Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1721 = "Libya Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-742 = "New Zealand Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-3141 = "South Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-532 = "Sri Lanka Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2892 = "Sudan Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-241 = "Samoa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-252 = "Dateline Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2772 = "Omsk Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-162 = "Central Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-531 = "Sri Lanka Daylight Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-591 = "Malay Peninsula Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-391 = "Arab Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2061 = "North Korea Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2891 = "Sudan Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-251 = "Dateline Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-411 = "E. Africa Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-681 = "E. Australia Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2002 = "Cabo Verde Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-212 = "Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-372 = "Jerusalem Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1412 = "Syria Standard Time" XFUHkOGTO7wQRuFr6kSjsTs8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-412 = "E. Africa Standard Time" windefender.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Processes:
2LqbapS3RfXJDR1x2hiP6UhU.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 2LqbapS3RfXJDR1x2hiP6UhU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 2LqbapS3RfXJDR1x2hiP6UhU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 2LqbapS3RfXJDR1x2hiP6UhU.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 2LqbapS3RfXJDR1x2hiP6UhU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 2LqbapS3RfXJDR1x2hiP6UhU.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 2LqbapS3RfXJDR1x2hiP6UhU.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeXFUHkOGTO7wQRuFr6kSjsTs8.exepowershell.exeXFUHkOGTO7wQRuFr6kSjsTs8.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepowershell.exepid process 1012 powershell.exe 1012 powershell.exe 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1600 powershell.exe 1600 powershell.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe 4232 powershell.exe 4232 powershell.exe 2088 powershell.exe 2088 powershell.exe 3556 powershell.exe 3556 powershell.exe 1480 powershell.exe 1480 powershell.exe 3660 powershell.exe 3660 powershell.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 4132 csrss.exe 4132 csrss.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 4132 csrss.exe 4132 csrss.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 4132 csrss.exe 4132 csrss.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1856 injector.exe 1588 powershell.exe 1588 powershell.exe 1856 injector.exe 1856 injector.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
Processes:
CasPol.exepowershell.exeXFUHkOGTO7wQRuFr6kSjsTs8.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exepowershell.exexVwdI8AkNJ9rRGGDXKQk03Ev.exepowershell.exepowershell.exeWMIC.exedescription pid process Token: SeDebugPrivilege 4580 CasPol.exe Token: SeDebugPrivilege 1012 powershell.exe Token: SeDebugPrivilege 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe Token: SeImpersonatePrivilege 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 4232 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 3556 powershell.exe Token: SeDebugPrivilege 1480 powershell.exe Token: SeDebugPrivilege 3660 powershell.exe Token: SeSystemEnvironmentPrivilege 4132 csrss.exe Token: SeSecurityPrivilege 1748 sc.exe Token: SeSecurityPrivilege 1748 sc.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe Token: SeImpersonatePrivilege 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeIncreaseQuotaPrivilege 4912 WMIC.exe Token: SeSecurityPrivilege 4912 WMIC.exe Token: SeTakeOwnershipPrivilege 4912 WMIC.exe Token: SeLoadDriverPrivilege 4912 WMIC.exe Token: SeSystemProfilePrivilege 4912 WMIC.exe Token: SeSystemtimePrivilege 4912 WMIC.exe Token: SeProfSingleProcessPrivilege 4912 WMIC.exe Token: SeIncBasePriorityPrivilege 4912 WMIC.exe Token: SeCreatePagefilePrivilege 4912 WMIC.exe Token: SeBackupPrivilege 4912 WMIC.exe Token: SeRestorePrivilege 4912 WMIC.exe Token: SeShutdownPrivilege 4912 WMIC.exe Token: SeDebugPrivilege 4912 WMIC.exe Token: SeSystemEnvironmentPrivilege 4912 WMIC.exe Token: SeRemoteShutdownPrivilege 4912 WMIC.exe Token: SeUndockPrivilege 4912 WMIC.exe Token: SeManageVolumePrivilege 4912 WMIC.exe Token: 33 4912 WMIC.exe Token: 34 4912 WMIC.exe Token: 35 4912 WMIC.exe Token: 36 4912 WMIC.exe Token: SeIncreaseQuotaPrivilege 4912 WMIC.exe Token: SeSecurityPrivilege 4912 WMIC.exe Token: SeTakeOwnershipPrivilege 4912 WMIC.exe Token: SeLoadDriverPrivilege 4912 WMIC.exe Token: SeSystemProfilePrivilege 4912 WMIC.exe Token: SeSystemtimePrivilege 4912 WMIC.exe Token: SeProfSingleProcessPrivilege 4912 WMIC.exe Token: SeIncBasePriorityPrivilege 4912 WMIC.exe Token: SeCreatePagefilePrivilege 4912 WMIC.exe Token: SeBackupPrivilege 4912 WMIC.exe Token: SeRestorePrivilege 4912 WMIC.exe Token: SeShutdownPrivilege 4912 WMIC.exe Token: SeDebugPrivilege 4912 WMIC.exe Token: SeSystemEnvironmentPrivilege 4912 WMIC.exe Token: SeRemoteShutdownPrivilege 4912 WMIC.exe Token: SeUndockPrivilege 4912 WMIC.exe Token: SeManageVolumePrivilege 4912 WMIC.exe Token: 33 4912 WMIC.exe Token: 34 4912 WMIC.exe Token: 35 4912 WMIC.exe Token: 36 4912 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exeCasPol.exeXFUHkOGTO7wQRuFr6kSjsTs8.exeXFUHkOGTO7wQRuFr6kSjsTs8.execmd.exevkWT1RGD5lz0iEn9sAaCcAhM.execsrss.exewindefender.execmd.exexVwdI8AkNJ9rRGGDXKQk03Ev.exexVwdI8AkNJ9rRGGDXKQk03Ev.exedescription pid process target process PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 1736 wrote to memory of 4580 1736 4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe CasPol.exe PID 4580 wrote to memory of 1384 4580 CasPol.exe XFUHkOGTO7wQRuFr6kSjsTs8.exe PID 4580 wrote to memory of 1384 4580 CasPol.exe XFUHkOGTO7wQRuFr6kSjsTs8.exe PID 4580 wrote to memory of 1384 4580 CasPol.exe XFUHkOGTO7wQRuFr6kSjsTs8.exe PID 1384 wrote to memory of 1012 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe Conhost.exe PID 1384 wrote to memory of 1012 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe Conhost.exe PID 1384 wrote to memory of 1012 1384 XFUHkOGTO7wQRuFr6kSjsTs8.exe Conhost.exe PID 1436 wrote to memory of 1600 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 1600 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 1600 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 4580 wrote to memory of 976 4580 CasPol.exe vkWT1RGD5lz0iEn9sAaCcAhM.exe PID 4580 wrote to memory of 976 4580 CasPol.exe vkWT1RGD5lz0iEn9sAaCcAhM.exe PID 4580 wrote to memory of 976 4580 CasPol.exe vkWT1RGD5lz0iEn9sAaCcAhM.exe PID 1436 wrote to memory of 3224 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe cmd.exe PID 1436 wrote to memory of 3224 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe cmd.exe PID 3224 wrote to memory of 4220 3224 cmd.exe netsh.exe PID 3224 wrote to memory of 4220 3224 cmd.exe netsh.exe PID 1436 wrote to memory of 4232 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 4232 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 4232 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 976 wrote to memory of 2052 976 vkWT1RGD5lz0iEn9sAaCcAhM.exe ur4.0.exe PID 976 wrote to memory of 2052 976 vkWT1RGD5lz0iEn9sAaCcAhM.exe ur4.0.exe PID 976 wrote to memory of 2052 976 vkWT1RGD5lz0iEn9sAaCcAhM.exe ur4.0.exe PID 1436 wrote to memory of 2088 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 2088 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 2088 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe powershell.exe PID 1436 wrote to memory of 4132 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe csrss.exe PID 1436 wrote to memory of 4132 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe csrss.exe PID 1436 wrote to memory of 4132 1436 XFUHkOGTO7wQRuFr6kSjsTs8.exe csrss.exe PID 4132 wrote to memory of 3556 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 3556 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 3556 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 1480 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 1480 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 1480 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 3660 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 3660 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 3660 4132 csrss.exe powershell.exe PID 4132 wrote to memory of 1856 4132 csrss.exe injector.exe PID 4132 wrote to memory of 1856 4132 csrss.exe injector.exe PID 1468 wrote to memory of 476 1468 windefender.exe cmd.exe PID 1468 wrote to memory of 476 1468 windefender.exe cmd.exe PID 1468 wrote to memory of 476 1468 windefender.exe cmd.exe PID 476 wrote to memory of 1748 476 cmd.exe sc.exe PID 476 wrote to memory of 1748 476 cmd.exe sc.exe PID 476 wrote to memory of 1748 476 cmd.exe sc.exe PID 4580 wrote to memory of 4868 4580 CasPol.exe xVwdI8AkNJ9rRGGDXKQk03Ev.exe PID 4580 wrote to memory of 4868 4580 CasPol.exe xVwdI8AkNJ9rRGGDXKQk03Ev.exe PID 4580 wrote to memory of 4868 4580 CasPol.exe xVwdI8AkNJ9rRGGDXKQk03Ev.exe PID 4868 wrote to memory of 1588 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 4868 wrote to memory of 1588 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 4868 wrote to memory of 1588 4868 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 432 wrote to memory of 2664 432 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 432 wrote to memory of 2664 432 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 432 wrote to memory of 2664 432 xVwdI8AkNJ9rRGGDXKQk03Ev.exe powershell.exe PID 4580 wrote to memory of 3908 4580 CasPol.exe hLaqxMPTtCi8TAPOi8Pcyp1b.exe PID 4580 wrote to memory of 3908 4580 CasPol.exe hLaqxMPTtCi8TAPOi8Pcyp1b.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe"C:\Users\Admin\AppData\Local\Temp\4f47d84b03f5cfa3845d1b36df5e40df984756fc6ba2d98586eb39dced212628.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Pictures\XFUHkOGTO7wQRuFr6kSjsTs8.exe"C:\Users\Admin\Pictures\XFUHkOGTO7wQRuFr6kSjsTs8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\XFUHkOGTO7wQRuFr6kSjsTs8.exe"C:\Users\Admin\Pictures\XFUHkOGTO7wQRuFr6kSjsTs8.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
-
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\vkWT1RGD5lz0iEn9sAaCcAhM.exe"C:\Users\Admin\Pictures\vkWT1RGD5lz0iEn9sAaCcAhM.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ur4.0.exe"C:\Users\Admin\AppData\Local\Temp\ur4.0.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 10965⤵
- Program crash
-
C:\Users\Admin\Pictures\xVwdI8AkNJ9rRGGDXKQk03Ev.exe"C:\Users\Admin\Pictures\xVwdI8AkNJ9rRGGDXKQk03Ev.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\xVwdI8AkNJ9rRGGDXKQk03Ev.exe"C:\Users\Admin\Pictures\xVwdI8AkNJ9rRGGDXKQk03Ev.exe"4⤵
- Executes dropped EXE
- Checks for VirtualBox DLLs, possible anti-VM trick
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Pictures\hLaqxMPTtCi8TAPOi8Pcyp1b.exe"C:\Users\Admin\Pictures\hLaqxMPTtCi8TAPOi8Pcyp1b.exe"3⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe"C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
-
C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exeC:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2c0,0x2c4,0x2c8,0x2a0,0x2cc,0x6f38e1d0,0x6f38e1dc,0x6f38e1e84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\2LqbapS3RfXJDR1x2hiP6UhU.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\2LqbapS3RfXJDR1x2hiP6UhU.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe"C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2628 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240421051442" --session-guid=931c8f80-e126-4c96-af9c-eb4bd314afde --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=30050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
-
C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exeC:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2b0,0x2b4,0x2b8,0x28c,0x2bc,0x6e3ae1d0,0x6e3ae1dc,0x6e3ae1e85⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x234,0x238,0x23c,0x210,0x240,0x1e6038,0x1e6044,0x1e60505⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\Pictures\G4jM0hRRtZRx2hRx4yeD5cnJ.exe"C:\Users\Admin\Pictures\G4jM0hRRtZRx2hRx4yeD5cnJ.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS27D1.tmp\Install.exe.\Install.exe /nxdidQZJ "385118" /S4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"5⤵
-
C:\Windows\SysWOW64\cmd.exe/C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True6⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bWycNackLSywaqkmgR" /SC once /ST 05:16:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\JMPZeWvHhArmqROvY\NwfPJCCpQqPYDzK\BMfnaDV.exe\" em /vmsite_idsbk 385118 /S" /V1 /F5⤵
- Drops file in Windows directory
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2052 -ip 20521⤵
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Defense Evasion
Modify Registry
3Virtualization/Sandbox Evasion
1Impair Defenses
1Disable or Modify System Firewall
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD54ae6bd79d510282e5a3327bd448dd0c4
SHA1a1d04654d36636c91ff27a6ea696fb6b43fdcdc0
SHA2560ebe50b1b1fad01fd593a3e8bbbaeea78d563709e6b9cd1164f8b96f7b4dbcc4
SHA512922f385cf4a2dcad32aaa6983b3808866867e2ccbb5cd1c270f7c85bd0bf5d0e375c47ee0583bafbca31d12eef6f3540d43c7fc1e4de4d68caa05f926b4e5584
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
20KB
MD5d62a702a3c1ac61683bc7fdcd737ea1a
SHA1962f0a3cc87ff7bbc4fac83fc6ecd0318a2ca8d4
SHA256f2d7aa1bb49be3caa17b8b7beab4ee032f551ad6eb2d6bb330290e3b096fcdf4
SHA51287b39f3773b74c0283c0fe1b994526e26c743d0a7c9c62c91f103c839d46734d91b77fcb43ec7a51e7a69e432f2d235effd5a66f6841f5baff43630fe282a5b8
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exeFilesize
2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\assistant_installer.exeFilesize
1.9MB
MD5976bc8e5fe65f9bb56831e20f1747150
SHA1f9e7f5628aaaabed9939ef055540e24590a9ccfb
SHA256f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0
SHA5122858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\dbgcore.dllFilesize
166KB
MD59ebb919b96f6f94e1be4cdc6913ef629
SHA131e99ac4fba516f82b36bd81784e8d518b32f9df
SHA256fdae21127deb16eb8ba36f2493d2255f4cb8ab4c18e8bd8ba5e587f5a7ecd119
SHA512a1b42f7d2896da270bb3c80cf9b88c4b4f1491084e7aa7760eeea5533b26f041dc79b21d5ffd2bba2221fe118e0a8d912e170f24fd895c9315b1ee9c7adfe700
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\assistant\dbghelp.dllFilesize
1.7MB
MD5544255258f9d45b4608ccfd27a4ed1dd
SHA1571e30ceb9c977817b5bbac306366ae59f773497
SHA2563b02fc85602e83059f611c658e3cad6bc59c3c51214d4fe7e31f3ac31388dd68
SHA5122093da881fa90eec2b90d1ca6eaaff608fe16ac612571a7fd5ed94dd5f7ff7e5c1e8c862bab0a228850829527886473e3942abd23a81d10cab8f9baad2cc7664
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404210514421\opera_packageFilesize
103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
C:\Users\Admin\AppData\Local\Temp\7zS27D1.tmp\Install.exeFilesize
6.8MB
MD5e77964e011d8880eae95422769249ca4
SHA18e15d7c4b7812a1da6c91738c7178adf0ff3200f
SHA256f200984380d291051fc4b342641cd34e7560cadf4af41b2e02b8778f14418f50
SHA5128feb3dc4432ec0a87416cbc75110d59efaf6504b4de43090fc90286bd37f98fc0a5fb12878bb33ac2f6cd83252e8dfd67dd96871b4a224199c1f595d33d4cade
-
C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404210514427682628.dllFilesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ra5d5phh.yqw.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\ur4.0.exeFilesize
323KB
MD51d4341aa0ca4aefcb043d19eb205d8ac
SHA1c6e7a063a22e6bad72b2c81017747ab31cb59579
SHA25642af762221074082dc3aa6e4efdc2b6439cc026d6e94d6eeae97fcfafda272b4
SHA5121bcc133000feb1ab7944295a14601ff1a66432dcbe117e9e60c9f98cb8aee5b28f0ddcbbc25e2b6d91b677ca67de32a8930a1317de9b8be17524a9bea43c73a7
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.datFilesize
40B
MD57c1ad3ed6b14bfa16c8f453989419252
SHA1213bc67aaea0661d9094f41fc2c9df5af0a8d268
SHA25603ca7b7410730711edebd65e729ffe67318f88cfec7f2deb378c232c71755921
SHA512a43d3db7ea02436d3e86640a5fc5f00bc15376b280119afdf5c1a614dd1057e30a40bf45e1b04bd776cc920343f7f9a7ff8049575bd265ab7cc33c85a95fd9c0
-
C:\Users\Admin\Pictures\2LqbapS3RfXJDR1x2hiP6UhU.exeFilesize
5.1MB
MD51977faedc058d84443bd77f4c38a6a10
SHA1f02ce490fd7e8e094552eddd1af794b939d1ac22
SHA256aad8c474f62651f5818cdf05877eafab404bb78878c50c6f7bd3be1a016fb484
SHA512ab2768982bf595fd657b74cc60330de0d53bd3b2b1f30c47a7ed3fad31e4349d2d72640a4c73f78803d325ba3f8a4095a015ef2e77ede10745709d3e2ba8443a
-
C:\Users\Admin\Pictures\5d1y8bKUraTuSSaiEXN8fghi.exeFilesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Users\Admin\Pictures\G4jM0hRRtZRx2hRx4yeD5cnJ.exeFilesize
6.4MB
MD5aaa56797070369ad346fbd9bb6cc5e8b
SHA1a1d01943f0a354d3a000628262671254ca6a91b8
SHA2569d7d08ac35f0113f7c814d257bf88b8222975aaa0a3fdeda88ac7185dbc50905
SHA512e69d25a158567c6bce6e9450de17d0814b9b9c11f4bb31e5dcc3e8b4378062cc7e31da625f6ba4a2280b393034a6c832a0fc0a1e16364dc7e8c8146de245b5be
-
C:\Users\Admin\Pictures\XFUHkOGTO7wQRuFr6kSjsTs8.exeFilesize
4.2MB
MD512c1251ddacc8c6651573aaae2a36711
SHA1aa4a4fc95f24a847f33a0fcc22d318fe947929d0
SHA256a018166a731757f43374b0b24baecfbf31b85cf9de793b9d11b186acf887bf22
SHA512e8e9723b210254504ae06f77ed86ff5c7da0ac1ba5134cb2ab99cd42b06744cdf2379835d5e8cbd413da69b1184a0d6297d29dc8393794d8959c5a2dc94f0a69
-
C:\Users\Admin\Pictures\hLaqxMPTtCi8TAPOi8Pcyp1b.exeFilesize
5.5MB
MD59f8b8a866575e821310f6203c5bdc044
SHA1f39bbd5eb2f736acdf565d6b56e560a60334dd0e
SHA256277677de19193a2297c88689312d1a294edf4f81b3ff4ba8202e2cbb9c6fbeea
SHA512b8222b6c8ec092ccc352676d4bf8c90a4ecb558a8346ab2628a41071d0747e87cc0c805c5c4efaf922a5e7ff18ad78bfa59a9180670df881085f6fab3b67f209
-
C:\Users\Admin\Pictures\vkWT1RGD5lz0iEn9sAaCcAhM.exeFilesize
445KB
MD5ddbb9a4caa78db40bb47ee413252f12f
SHA16153acfbb9773424f3d3ccfcca917c277b2500d5
SHA256f2c98424e2142ea86ef140dd1b0bdf1b3c7b8cc99ec6194c851ad2f0ed3b2e31
SHA5125afa0ee709e43f3445b9c9733ac8df92c04682d9b3e8b25441e5392cb17303c0c39e9c56c9d3bf27ea266815d571d659749dedc18af0506c987b056c6d9dbb60
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5d0c46cad6c0778401e21910bd6b56b70
SHA17be418951ea96326aca445b8dfe449b2bfa0dca6
SHA2569600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02
SHA512057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5defca98021f17581ab091f22649412e9
SHA1c6c211275387952abdba30325bc8b0c7933ddc68
SHA25645f723cf168bb0c2ec34572083aa4eae3dff72f50aca8fd9e43db0010a6d5a36
SHA5128030f4e18c8629563941d26b46f743290a8c74c679790561509823e8f974fcac71de10fb843db3ae1d95520557e61d97595c7e67e56fbb80faa41f6f21b0fac1
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5174f65d56fbbe97eb2a8fd731be34ce0
SHA13643c7d1761f7f625683a40e75e0c3315fba8c6c
SHA256de3aec8a1eb30991b19503dcd582d07a7407ed1740f510e5f31d64329c41878e
SHA512ff7efe820dc3c788a5b14696469430cf46a9e86782bc2e6601fdaf8ad16a2b9e8c04cbf61879e00fbc34d1e1bcb15058e7cd15816e138df1e5167a0b0a030a88
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5373105f1b0c3be5895a2897c81704f67
SHA14fd56c7ef6e1a007a9a11ac6213252cf06a83255
SHA2566c8960163888c0f0c1867a29bdbee02f95df8e852d9745115556dd2dc4f1ba0b
SHA5125823898313b41c8a77812a5a85120c8b917dc65da28811174b0ccc2eabb6449772d2e45160e0357b9a9f07a598e1854b167b1e4166b9713638eb1f654a7347ca
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5e230c96c46b3ca3f3b208a1bae40fe14
SHA1504b7db8a59d0eab16cc8299e781dd6b329f7f2b
SHA2562d23990b44c3cfb3f9e0ad12a5ea2bf4b2da025031d39a0d4f92adbdf82d8462
SHA512edb154d02b06c25a3f44283986ce12bc1fcbd132b2541d31419d3f4299609ed3908d2c700b2245c05518b58369b9cc0e591e42fe286c4e6b20d3649c38977bcf
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD543b7a737ee19cadc754feed44f54eb22
SHA16e6d072e71ff9df5a9fa76207bd7e39425046672
SHA256fe28725788c2838df9581cdaccd8824630f5fb079fe24f8e7faf3724e2d0ec44
SHA51223ebf14657734d3b23ec252d4e068acc47ec4892c2553b424f01dae4fed7fdf7d1033bde9d3bf08416ffbad9342227e5fa193c36b1632d1c136cc7dfbd5fcb8e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5f6fc510e171c230004b33f87172afa36
SHA196123ecaaaf54ed1466e6cb49e0607c0c5b9123e
SHA256afd7d7c997f96c3e6051733abe149aab89e3470c31a03385fc67dd70d35a9bdc
SHA512424242c435a998adc116278cb4b703c4829d9b7e8e6569abd202419fb6859116bc0b631395a8116575ddd0f67a180a803964fa8576aa66e2130c1523e41827d4
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/432-401-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/976-114-0x0000000000400000-0x0000000001A3A000-memory.dmpFilesize
22.2MB
-
memory/976-110-0x0000000001D00000-0x0000000001E00000-memory.dmpFilesize
1024KB
-
memory/976-112-0x00000000037A0000-0x000000000380E000-memory.dmpFilesize
440KB
-
memory/1012-66-0x00000000082A0000-0x000000000891A000-memory.dmpFilesize
6.5MB
-
memory/1012-46-0x00000000061A0000-0x0000000006206000-memory.dmpFilesize
408KB
-
memory/1012-71-0x0000000007D10000-0x0000000007D1E000-memory.dmpFilesize
56KB
-
memory/1012-72-0x0000000007D20000-0x0000000007D35000-memory.dmpFilesize
84KB
-
memory/1012-73-0x0000000007D70000-0x0000000007D8A000-memory.dmpFilesize
104KB
-
memory/1012-74-0x0000000007D60000-0x0000000007D68000-memory.dmpFilesize
32KB
-
memory/1012-77-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/1012-36-0x0000000005900000-0x0000000005922000-memory.dmpFilesize
136KB
-
memory/1012-33-0x0000000005A00000-0x000000000602A000-memory.dmpFilesize
6.2MB
-
memory/1012-65-0x0000000007B30000-0x0000000007BD4000-memory.dmpFilesize
656KB
-
memory/1012-34-0x00000000053C0000-0x00000000053D0000-memory.dmpFilesize
64KB
-
memory/1012-35-0x00000000053C0000-0x00000000053D0000-memory.dmpFilesize
64KB
-
memory/1012-32-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/1012-48-0x00000000066A0000-0x00000000066BE000-memory.dmpFilesize
120KB
-
memory/1012-31-0x00000000031D0000-0x0000000003206000-memory.dmpFilesize
216KB
-
memory/1012-69-0x0000000007DB0000-0x0000000007E46000-memory.dmpFilesize
600KB
-
memory/1012-68-0x0000000007CA0000-0x0000000007CAA000-memory.dmpFilesize
40KB
-
memory/1012-49-0x0000000006750000-0x000000000679C000-memory.dmpFilesize
304KB
-
memory/1012-67-0x0000000007C60000-0x0000000007C7A000-memory.dmpFilesize
104KB
-
memory/1012-47-0x0000000006210000-0x0000000006567000-memory.dmpFilesize
3.3MB
-
memory/1012-53-0x000000006F5D0000-0x000000006F61C000-memory.dmpFilesize
304KB
-
memory/1012-50-0x0000000006C30000-0x0000000006C76000-memory.dmpFilesize
280KB
-
memory/1012-52-0x0000000007AD0000-0x0000000007B04000-memory.dmpFilesize
208KB
-
memory/1012-54-0x000000006F620000-0x000000006F977000-memory.dmpFilesize
3.3MB
-
memory/1012-51-0x000000007F8A0000-0x000000007F8B0000-memory.dmpFilesize
64KB
-
memory/1012-63-0x0000000007B10000-0x0000000007B2E000-memory.dmpFilesize
120KB
-
memory/1012-70-0x0000000007CC0000-0x0000000007CD1000-memory.dmpFilesize
68KB
-
memory/1012-64-0x00000000053C0000-0x00000000053D0000-memory.dmpFilesize
64KB
-
memory/1012-42-0x0000000006130000-0x0000000006196000-memory.dmpFilesize
408KB
-
memory/1384-126-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1384-30-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1384-85-0x0000000003B80000-0x0000000003F79000-memory.dmpFilesize
4.0MB
-
memory/1384-29-0x0000000003F80000-0x000000000486B000-memory.dmpFilesize
8.9MB
-
memory/1384-28-0x0000000003B80000-0x0000000003F79000-memory.dmpFilesize
4.0MB
-
memory/1436-219-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1436-83-0x0000000004090000-0x000000000497B000-memory.dmpFilesize
8.9MB
-
memory/1436-82-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/1436-81-0x0000000003C90000-0x000000000408D000-memory.dmpFilesize
4.0MB
-
memory/1468-316-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/1600-86-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/1600-133-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/1600-130-0x0000000007930000-0x0000000007945000-memory.dmpFilesize
84KB
-
memory/1600-129-0x00000000078E0000-0x00000000078F1000-memory.dmpFilesize
68KB
-
memory/1600-128-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/1600-127-0x000000007F580000-0x000000007F590000-memory.dmpFilesize
64KB
-
memory/1600-125-0x0000000007590000-0x0000000007634000-memory.dmpFilesize
656KB
-
memory/1600-116-0x000000006F5C0000-0x000000006F917000-memory.dmpFilesize
3.3MB
-
memory/1600-115-0x000000006F570000-0x000000006F5BC000-memory.dmpFilesize
304KB
-
memory/1600-113-0x00000000063F0000-0x000000000643C000-memory.dmpFilesize
304KB
-
memory/1600-111-0x0000000005F10000-0x0000000006267000-memory.dmpFilesize
3.3MB
-
memory/1600-87-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2052-163-0x0000000000400000-0x0000000001A1C000-memory.dmpFilesize
22.1MB
-
memory/2052-160-0x0000000001BD0000-0x0000000001CD0000-memory.dmpFilesize
1024KB
-
memory/2052-181-0x0000000000400000-0x0000000001A1C000-memory.dmpFilesize
22.1MB
-
memory/2052-161-0x0000000003720000-0x0000000003747000-memory.dmpFilesize
156KB
-
memory/2952-409-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/3908-438-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-434-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-453-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-437-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-432-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-428-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-429-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-430-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/3908-433-0x00007FF769E20000-0x00007FF76A55A000-memory.dmpFilesize
7.2MB
-
memory/4132-449-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-398-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-411-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-332-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-405-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-596-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-456-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-307-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4132-525-0x0000000000400000-0x0000000001DF9000-memory.dmpFilesize
26.0MB
-
memory/4232-154-0x0000000006100000-0x0000000006457000-memory.dmpFilesize
3.3MB
-
memory/4232-155-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4232-144-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4232-145-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4232-162-0x0000000006C10000-0x0000000006C5C000-memory.dmpFilesize
304KB
-
memory/4580-0-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4580-84-0x0000000003100000-0x0000000003110000-memory.dmpFilesize
64KB
-
memory/4580-80-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB
-
memory/4580-2-0x0000000003100000-0x0000000003110000-memory.dmpFilesize
64KB
-
memory/4580-1-0x00000000748A0000-0x0000000075051000-memory.dmpFilesize
7.7MB