Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
3.3MB
-
MD5
09bd16d82a747ef0621aa367c0e14a9c
-
SHA1
da57e4b192b7cb50b6e71b48d5f233d2a6b5a4f1
-
SHA256
b79b3ab665881eadd15b67b9b105db7d99eb091905350a53c6bbc7b91a42cd48
-
SHA512
7365b17d9ec7264941b88d61e69ea1214ef44b9b8bff9ebc8227794b696142050f267635cdb4e588ba121259b2f2a07519df8053f143db58ebc1a048d08b49a1
-
SSDEEP
49152:9UIbNigeVE2MD7ZDAgUftcgFEptOkf8Ug:jI3bg5W
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/1516-39-0x0000000004020000-0x000000000490B000-memory.dmp family_glupteba behavioral2/memory/1516-44-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/1864-45-0x0000000003FF0000-0x00000000048DB000-memory.dmp family_glupteba behavioral2/memory/1864-47-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/1864-146-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/1516-148-0x0000000004020000-0x000000000490B000-memory.dmp family_glupteba behavioral2/memory/2204-149-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4420-151-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/1516-152-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/2204-353-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4420-355-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/2204-385-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4420-406-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-494-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-560-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-565-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-633-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-638-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba behavioral2/memory/4336-706-0x0000000000400000-0x0000000001DEE000-memory.dmp family_glupteba -
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
IyEc0DKHgStVM8HS1OfW8HLX.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" IyEc0DKHgStVM8HS1OfW8HLX.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
IyEc0DKHgStVM8HS1OfW8HLX.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IyEc0DKHgStVM8HS1OfW8HLX.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2556 netsh.exe 1464 netsh.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
IyEc0DKHgStVM8HS1OfW8HLX.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IyEc0DKHgStVM8HS1OfW8HLX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IyEc0DKHgStVM8HS1OfW8HLX.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SVuhZcqoCkyjaZNXeP8EAlVx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation SVuhZcqoCkyjaZNXeP8EAlVx.exe -
Drops startup file 6 IoCs
Processes:
CasPol.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TKfQQrpqA6XA9nIUVaj3erEH.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SRCPLrJAmrCZG7ohnHPzzppn.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\0kHt5znLqXMJhuKVINMPmONf.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Khr9JLWLo3M5RGOzH9p12jPs.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gdmbtuG7cJspNOBFFfSG4bCN.bat CasPol.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ovNN1D4hnrMx2bmTjhh9gPvq.bat CasPol.exe -
Executes dropped EXE 22 IoCs
Processes:
UICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exeSVuhZcqoCkyjaZNXeP8EAlVx.exeUICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exeIyEc0DKHgStVM8HS1OfW8HLX.exeu2h8.0.execsrss.exeinjector.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exewindefender.exewindefender.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exeQg_Appv5.exeptInst.exeptInst.exepid process 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe 1864 oH93hO477Ln8YT1h2rj9THeR.exe 3212 SVuhZcqoCkyjaZNXeP8EAlVx.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4740 IyEc0DKHgStVM8HS1OfW8HLX.exe 4412 u2h8.0.exe 4336 csrss.exe 3972 injector.exe 2864 YijrmedmSk4L6ZaYNHz6KZ0y.exe 1944 YijrmedmSk4L6ZaYNHz6KZ0y.exe 5108 YijrmedmSk4L6ZaYNHz6KZ0y.exe 2720 YijrmedmSk4L6ZaYNHz6KZ0y.exe 2664 YijrmedmSk4L6ZaYNHz6KZ0y.exe 2044 windefender.exe 2472 windefender.exe 1600 Assistant_109.0.5097.45_Setup.exe_sfx.exe 4852 assistant_installer.exe 2744 assistant_installer.exe 1788 Qg_Appv5.exe 3080 ptInst.exe 1472 ptInst.exe -
Loads dropped DLL 15 IoCs
Processes:
YijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exeassistant_installer.exeassistant_installer.exeptInst.exeptInst.exepid process 2864 YijrmedmSk4L6ZaYNHz6KZ0y.exe 1944 YijrmedmSk4L6ZaYNHz6KZ0y.exe 5108 YijrmedmSk4L6ZaYNHz6KZ0y.exe 2720 YijrmedmSk4L6ZaYNHz6KZ0y.exe 2664 YijrmedmSk4L6ZaYNHz6KZ0y.exe 4852 assistant_installer.exe 4852 assistant_installer.exe 2744 assistant_installer.exe 2744 assistant_installer.exe 3080 ptInst.exe 3080 ptInst.exe 3080 ptInst.exe 1472 ptInst.exe 1472 ptInst.exe 1472 ptInst.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\IyEc0DKHgStVM8HS1OfW8HLX.exe themida behavioral2/memory/4740-334-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida behavioral2/memory/4740-345-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida behavioral2/memory/4740-347-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida behavioral2/memory/4740-350-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida behavioral2/memory/4740-354-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida behavioral2/memory/4740-493-0x00007FF71FB60000-0x00007FF720669000-memory.dmp themida -
Processes:
resource yara_rule C:\Windows\windefender.exe upx behavioral2/memory/2044-549-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2472-564-0x0000000000400000-0x00000000008DF000-memory.dmp upx behavioral2/memory/2472-637-0x0000000000400000-0x00000000008DF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
UICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" UICTY6XdFzHkEkcLPbzfmXp3.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" oH93hO477Ln8YT1h2rj9THeR.exe Set value (str) \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
IyEc0DKHgStVM8HS1OfW8HLX.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IyEc0DKHgStVM8HS1OfW8HLX.exe -
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
YijrmedmSk4L6ZaYNHz6KZ0y.exeYijrmedmSk4L6ZaYNHz6KZ0y.exedescription ioc process File opened (read-only) \??\D: YijrmedmSk4L6ZaYNHz6KZ0y.exe File opened (read-only) \??\F: YijrmedmSk4L6ZaYNHz6KZ0y.exe File opened (read-only) \??\D: YijrmedmSk4L6ZaYNHz6KZ0y.exe File opened (read-only) \??\F: YijrmedmSk4L6ZaYNHz6KZ0y.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 14 IoCs
Processes:
powershell.exepowershell.exeIyEc0DKHgStVM8HS1OfW8HLX.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini IyEc0DKHgStVM8HS1OfW8HLX.exe File opened for modification C:\Windows\System32\GroupPolicy IyEc0DKHgStVM8HS1OfW8HLX.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI IyEc0DKHgStVM8HS1OfW8HLX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol IyEc0DKHgStVM8HS1OfW8HLX.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
IyEc0DKHgStVM8HS1OfW8HLX.exepid process 4740 IyEc0DKHgStVM8HS1OfW8HLX.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exeptInst.execmd.exedescription pid process target process PID 4328 set thread context of 4216 4328 tmp.exe CasPol.exe PID 1472 set thread context of 5056 1472 ptInst.exe cmd.exe PID 5056 set thread context of 1788 5056 cmd.exe MSBuild.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
UICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN UICTY6XdFzHkEkcLPbzfmXp3.exe File opened (read-only) \??\VBoxMiniRdrDN oH93hO477Ln8YT1h2rj9THeR.exe -
Drops file in Windows directory 6 IoCs
Processes:
UICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.execsrss.exedescription ioc process File opened for modification C:\Windows\rss UICTY6XdFzHkEkcLPbzfmXp3.exe File created C:\Windows\rss\csrss.exe UICTY6XdFzHkEkcLPbzfmXp3.exe File opened for modification C:\Windows\rss oH93hO477Ln8YT1h2rj9THeR.exe File created C:\Windows\rss\csrss.exe oH93hO477Ln8YT1h2rj9THeR.exe File created C:\Windows\windefender.exe csrss.exe File opened for modification C:\Windows\windefender.exe csrss.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4856 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3340 2924 WerFault.exe powershell.exe 4884 4412 WerFault.exe u2h8.0.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4044 schtasks.exe 4556 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exewindefender.exeUICTY6XdFzHkEkcLPbzfmXp3.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1831 = "Russia TZ 2 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-332 = "E. Europe Standard Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1841 = "Russia TZ 4 Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2871 = "Magallanes Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-571 = "China Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-364 = "Middle East Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-441 = "Arabian Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-662 = "Cen. Australia Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1891 = "Russia TZ 3 Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-449 = "Azerbaijan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1472 = "Magadan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-1041 = "Ulaanbaatar Daylight Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-461 = "Afghanistan Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1411 = "Syria Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-722 = "Central Pacific Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-92 = "Pacific SA Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-1832 = "Russia TZ 2 Standard Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-172 = "Central Standard Time (Mexico)" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2182 = "Astrakhan Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-2181 = "Astrakhan Daylight Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-221 = "Alaskan Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-71 = "Newfoundland Daylight Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-82 = "Atlantic Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-72 = "Newfoundland Standard Time" windefender.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" UICTY6XdFzHkEkcLPbzfmXp3.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@tzres.dll,-442 = "Arabian Standard Time" windefender.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe -
Processes:
YijrmedmSk4L6ZaYNHz6KZ0y.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 YijrmedmSk4L6ZaYNHz6KZ0y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 YijrmedmSk4L6ZaYNHz6KZ0y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 YijrmedmSk4L6ZaYNHz6KZ0y.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exeUICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exepowershell.exepowershell.exeUICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 2924 powershell.exe 2924 powershell.exe 2832 powershell.exe 2832 powershell.exe 2924 powershell.exe 2832 powershell.exe 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe 1864 oH93hO477Ln8YT1h2rj9THeR.exe 1864 oH93hO477Ln8YT1h2rj9THeR.exe 4016 powershell.exe 4016 powershell.exe 3688 powershell.exe 3688 powershell.exe 3688 powershell.exe 4016 powershell.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4420 oH93hO477Ln8YT1h2rj9THeR.exe 4848 powershell.exe 4848 powershell.exe 4848 powershell.exe 2032 powershell.exe 2032 powershell.exe 2032 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 2664 powershell.exe 2664 powershell.exe 2664 powershell.exe 4092 powershell.exe 4092 powershell.exe 4092 powershell.exe 1236 powershell.exe 1236 powershell.exe 1236 powershell.exe 3972 injector.exe 3972 injector.exe 3972 injector.exe 3972 injector.exe 3972 injector.exe 3972 injector.exe 4336 csrss.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
ptInst.execmd.exepid process 1472 ptInst.exe 5056 cmd.exe 5056 cmd.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
CasPol.exepowershell.exepowershell.exeUICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exesc.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 4216 CasPol.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe Token: SeImpersonatePrivilege 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe Token: SeDebugPrivilege 1864 oH93hO477Ln8YT1h2rj9THeR.exe Token: SeImpersonatePrivilege 1864 oH93hO477Ln8YT1h2rj9THeR.exe Token: SeDebugPrivilege 4016 powershell.exe Token: SeDebugPrivilege 3688 powershell.exe Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 4092 powershell.exe Token: SeDebugPrivilege 1236 powershell.exe Token: SeSystemEnvironmentPrivilege 4336 csrss.exe Token: SeSecurityPrivilege 4856 sc.exe Token: SeSecurityPrivilege 4856 sc.exe Token: SeDebugPrivilege 1788 MSBuild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exeCasPol.exeoH93hO477Ln8YT1h2rj9THeR.exeUICTY6XdFzHkEkcLPbzfmXp3.exeUICTY6XdFzHkEkcLPbzfmXp3.exeoH93hO477Ln8YT1h2rj9THeR.execmd.execmd.exeSVuhZcqoCkyjaZNXeP8EAlVx.execsrss.exedescription pid process target process PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4328 wrote to memory of 4216 4328 tmp.exe CasPol.exe PID 4216 wrote to memory of 1516 4216 CasPol.exe UICTY6XdFzHkEkcLPbzfmXp3.exe PID 4216 wrote to memory of 1516 4216 CasPol.exe UICTY6XdFzHkEkcLPbzfmXp3.exe PID 4216 wrote to memory of 1516 4216 CasPol.exe UICTY6XdFzHkEkcLPbzfmXp3.exe PID 4216 wrote to memory of 1864 4216 CasPol.exe oH93hO477Ln8YT1h2rj9THeR.exe PID 4216 wrote to memory of 1864 4216 CasPol.exe oH93hO477Ln8YT1h2rj9THeR.exe PID 4216 wrote to memory of 1864 4216 CasPol.exe oH93hO477Ln8YT1h2rj9THeR.exe PID 4216 wrote to memory of 3212 4216 CasPol.exe SVuhZcqoCkyjaZNXeP8EAlVx.exe PID 4216 wrote to memory of 3212 4216 CasPol.exe SVuhZcqoCkyjaZNXeP8EAlVx.exe PID 4216 wrote to memory of 3212 4216 CasPol.exe SVuhZcqoCkyjaZNXeP8EAlVx.exe PID 1864 wrote to memory of 2924 1864 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 1516 wrote to memory of 2832 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 1864 wrote to memory of 2924 1864 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 1864 wrote to memory of 2924 1864 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 1516 wrote to memory of 2832 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 1516 wrote to memory of 2832 1516 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4016 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4016 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4016 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 4420 wrote to memory of 3688 4420 oH93hO477Ln8YT1h2rj9THeR.exe wuapihost.exe PID 4420 wrote to memory of 3688 4420 oH93hO477Ln8YT1h2rj9THeR.exe wuapihost.exe PID 4420 wrote to memory of 3688 4420 oH93hO477Ln8YT1h2rj9THeR.exe wuapihost.exe PID 2204 wrote to memory of 1976 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe cmd.exe PID 2204 wrote to memory of 1976 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe cmd.exe PID 1976 wrote to memory of 2556 1976 cmd.exe netsh.exe PID 1976 wrote to memory of 2556 1976 cmd.exe netsh.exe PID 4420 wrote to memory of 404 4420 oH93hO477Ln8YT1h2rj9THeR.exe cmd.exe PID 4420 wrote to memory of 404 4420 oH93hO477Ln8YT1h2rj9THeR.exe cmd.exe PID 404 wrote to memory of 1464 404 cmd.exe netsh.exe PID 404 wrote to memory of 1464 404 cmd.exe netsh.exe PID 2204 wrote to memory of 4848 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4848 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4848 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 4420 wrote to memory of 2032 4420 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 4420 wrote to memory of 2032 4420 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 4420 wrote to memory of 2032 4420 oH93hO477Ln8YT1h2rj9THeR.exe powershell.exe PID 2204 wrote to memory of 4116 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4116 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 2204 wrote to memory of 4116 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe powershell.exe PID 4420 wrote to memory of 4608 4420 oH93hO477Ln8YT1h2rj9THeR.exe Conhost.exe PID 4420 wrote to memory of 4608 4420 oH93hO477Ln8YT1h2rj9THeR.exe Conhost.exe PID 4420 wrote to memory of 4608 4420 oH93hO477Ln8YT1h2rj9THeR.exe Conhost.exe PID 4216 wrote to memory of 4740 4216 CasPol.exe IyEc0DKHgStVM8HS1OfW8HLX.exe PID 4216 wrote to memory of 4740 4216 CasPol.exe IyEc0DKHgStVM8HS1OfW8HLX.exe PID 3212 wrote to memory of 4412 3212 SVuhZcqoCkyjaZNXeP8EAlVx.exe u2h8.0.exe PID 3212 wrote to memory of 4412 3212 SVuhZcqoCkyjaZNXeP8EAlVx.exe u2h8.0.exe PID 3212 wrote to memory of 4412 3212 SVuhZcqoCkyjaZNXeP8EAlVx.exe u2h8.0.exe PID 2204 wrote to memory of 4336 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe csrss.exe PID 2204 wrote to memory of 4336 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe csrss.exe PID 2204 wrote to memory of 4336 2204 UICTY6XdFzHkEkcLPbzfmXp3.exe csrss.exe PID 4336 wrote to memory of 2664 4336 csrss.exe YijrmedmSk4L6ZaYNHz6KZ0y.exe PID 4336 wrote to memory of 2664 4336 csrss.exe YijrmedmSk4L6ZaYNHz6KZ0y.exe PID 4336 wrote to memory of 2664 4336 csrss.exe YijrmedmSk4L6ZaYNHz6KZ0y.exe PID 4336 wrote to memory of 4092 4336 csrss.exe powershell.exe PID 4336 wrote to memory of 4092 4336 csrss.exe powershell.exe PID 4336 wrote to memory of 4092 4336 csrss.exe powershell.exe PID 4336 wrote to memory of 1236 4336 csrss.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\Pictures\UICTY6XdFzHkEkcLPbzfmXp3.exe"C:\Users\Admin\Pictures\UICTY6XdFzHkEkcLPbzfmXp3.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\Pictures\UICTY6XdFzHkEkcLPbzfmXp3.exe"C:\Users\Admin\Pictures\UICTY6XdFzHkEkcLPbzfmXp3.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:2556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116 -
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4044 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f6⤵PID:2900
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵PID:4608
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3972 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F6⤵
- Creates scheduled task(s)
PID:4556 -
C:\Windows\windefender.exe"C:\Windows\windefender.exe"6⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)7⤵PID:1200
-
C:\Windows\SysWOW64\sc.exesc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)8⤵
- Launches sc.exe
- Suspicious use of AdjustPrivilegeToken
PID:4856 -
C:\Users\Admin\Pictures\oH93hO477Ln8YT1h2rj9THeR.exe"C:\Users\Admin\Pictures\oH93hO477Ln8YT1h2rj9THeR.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 24805⤵
- Program crash
PID:3340 -
C:\Users\Admin\Pictures\oH93hO477Ln8YT1h2rj9THeR.exe"C:\Users\Admin\Pictures\oH93hO477Ln8YT1h2rj9THeR.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Users\Admin\Pictures\SVuhZcqoCkyjaZNXeP8EAlVx.exe"C:\Users\Admin\Pictures\SVuhZcqoCkyjaZNXeP8EAlVx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\u2h8.0.exe"C:\Users\Admin\AppData\Local\Temp\u2h8.0.exe"4⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 10165⤵
- Program crash
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"4⤵
- Executes dropped EXE
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3080 -
C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Users\Admin\Pictures\IyEc0DKHgStVM8HS1OfW8HLX.exe"C:\Users\Admin\Pictures\IyEc0DKHgStVM8HS1OfW8HLX.exe"3⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4740 -
C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe"C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe" --silent --allusers=03⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
PID:2864 -
C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exeC:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x288,0x2ac,0x2b0,0x280,0x2b4,0x6f50e1d0,0x6f50e1dc,0x6f50e1e84⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\YijrmedmSk4L6ZaYNHz6KZ0y.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\YijrmedmSk4L6ZaYNHz6KZ0y.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5108 -
C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe"C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2864 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240421124115" --session-guid=ee642306-8c39-4eab-9735-9edba2bc60d2 --server-tracking-blob="YjJkMzQ0NDlhMDI5MWU3YjI1YzI0OGMzMjk4ODM2ZGU2MGQ2YWI5NDNiZGY4NzhkMzU2MTBhMDkxYzIwYTc5NTp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2N19fMTIzIiwic3lzdGVtIjp7InBsYXRmb3JtIjp7ImFyY2giOiJ4ODZfNjQiLCJvcHN5cyI6IldpbmRvd3MiLCJvcHN5cy12ZXJzaW9uIjoiMTAiLCJwYWNrYWdlIjoiRVhFIn19LCJ0aW1lc3RhbXAiOiIxNzEzNzAzMjQxLjA0MjkiLCJ1dG0iOnsiY2FtcGFpZ24iOiI3NjdfXzEyMyIsIm1lZGl1bSI6ImFwYiIsInNvdXJjZSI6Im1rdCJ9LCJ1dWlkIjoiYzRkMjMzMWQtOWMxNS00ZTZiLTg4YTctNThlODMyM2Q5ODE2In0= " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=7C050000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
PID:2720 -
C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exeC:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x2c4,0x2c8,0x2cc,0x2c0,0x2d0,0x6e25e1d0,0x6e25e1dc,0x6e25e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x8f6038,0x8f6044,0x8f60505⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2924 -ip 29241⤵PID:4368
-
C:\Windows\System32\wuapihost.exeC:\Windows\System32\wuapihost.exe -Embedding1⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4412 -ip 44121⤵PID:3452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3224
-
C:\Windows\windefender.exeC:\Windows\windefender.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\additional_file0.tmpFilesize
2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\assistant_installer.exeFilesize
1.9MB
MD5976bc8e5fe65f9bb56831e20f1747150
SHA1f9e7f5628aaaabed9939ef055540e24590a9ccfb
SHA256f53c916ccf3d24d6793227283de2db0f6cc98a2275413851807cc080643d21a0
SHA5122858e7e08418b170b21b599afb02236d0480d35a5605de142f10976489e01daf2ad80df0f09c2eb38bc5a971336d1f6aa9909c520bcdb18e9c9a8e903379dcd9
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\dbgcore.dllFilesize
166KB
MD59ebb919b96f6f94e1be4cdc6913ef629
SHA131e99ac4fba516f82b36bd81784e8d518b32f9df
SHA256fdae21127deb16eb8ba36f2493d2255f4cb8ab4c18e8bd8ba5e587f5a7ecd119
SHA512a1b42f7d2896da270bb3c80cf9b88c4b4f1491084e7aa7760eeea5533b26f041dc79b21d5ffd2bba2221fe118e0a8d912e170f24fd895c9315b1ee9c7adfe700
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\assistant\dbghelp.dllFilesize
1.7MB
MD5544255258f9d45b4608ccfd27a4ed1dd
SHA1571e30ceb9c977817b5bbac306366ae59f773497
SHA2563b02fc85602e83059f611c658e3cad6bc59c3c51214d4fe7e31f3ac31388dd68
SHA5122093da881fa90eec2b90d1ca6eaaff608fe16ac612571a7fd5ed94dd5f7ff7e5c1e8c862bab0a228850829527886473e3942abd23a81d10cab8f9baad2cc7664
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404211241151\opera_packageFilesize
103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
C:\Users\Admin\AppData\Local\Temp\Opera_installer_2404211241152632864.dllFilesize
4.6MB
MD50415cb7be0361a74a039d5f31e72fa65
SHA146ae154436c8c059ee75cbc6a18ccda96bb2021d
SHA256bb38a8806705980ee3e9181c099e8d5c425e6c9505a88e5af538ca6a48951798
SHA512f71c2b9e1559aa4eb2d72f852ef9807c781d4a7b96b8e0c2c53b895885319146bd43aa6e4223d43159f3d40bc60704206404dc034500e47fca0a94e53b60239e
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exeFilesize
7.6MB
MD5862bf3003dca41d88ac49a6846149623
SHA1b34f1d42dd0649d6b83f9a92124a554f48df0434
SHA25650c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c
SHA512fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\WCLDll.dllFilesize
590KB
MD563206e3b4f1fa4dcfbe1f2cc5d0c4e9d
SHA1fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924
SHA2568f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885
SHA51232bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\cosmetician.mpegFilesize
79KB
MD58e1bbc6d6c4d207393b59853f73945ae
SHA1b66d632eae41267175bf5332d43a785dd929d79f
SHA256b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279
SHA5121b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\msvcp140.dllFilesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeFilesize
938KB
MD5b15bac961f62448c872e1dc6d3931016
SHA11dcb61babb08fe5db711e379cb67335357a5db82
SHA256bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
SHA512932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\quersprung.vhdFilesize
1.3MB
MD53bee67dd0e04559c8fdc7761336dee47
SHA1027ef9dca01fb928db79e57b418130165f06ed5f
SHA25657745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812
SHA51235fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce
-
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\vcruntime140.dllFilesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k0eryx2r.ewj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Users\Admin\AppData\Local\Temp\de973c0Filesize
3.8MB
MD513418f74a7ce25cdd6997c9fcb718a0e
SHA1f4c880821fee72c37c882b1e8ebf100efcafe31c
SHA256a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0
SHA51259017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1
-
C:\Users\Admin\AppData\Local\Temp\u2h8.0.exeFilesize
281KB
MD5c5318e9c9f65897b3056660265c36606
SHA11c21d52fc5e89a209dea7d0926e129ab4e7c047e
SHA2569d2aea90748a97565e0056764ab94e0c8ca44d2008b5f22a3285983b6a8f1e41
SHA512d8b61ae8790c8ec299069a1aa3172c45951b49d864ab317f3743367fcdd7068825ef9a866124225464d4b1f8831a0eba8168014cddfe29feb85d20360224ed92
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.datFilesize
40B
MD5b081c2f4dd03628d8c55560b683c2f43
SHA1c0a3d5bf0fbb08256dbd9732f57e332500707734
SHA2560a2a839fa5e1f4b77cd227192e4117e1cd55bc34dbbd0304c7e11289b6457cc4
SHA5120f802d6ddec3bdab92ac4aeb18ccbd3c2a787595dc4495284bfc44129bf3f7142fc071d6b02fefdee4f0d52259390e3aeb9cef9eb8796862b297137200b79907
-
C:\Users\Admin\Pictures\Gbay3tYWlrlCdeCohmFCJ5xg.exeFilesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
C:\Users\Admin\Pictures\IyEc0DKHgStVM8HS1OfW8HLX.exeFilesize
3.9MB
MD5ffee05ea98b1d51026a44fad0841a8a9
SHA150a703329c7b9812c17a02b554cf406040079fec
SHA2564cb040696b9ffb14794955b0e56eed04fde0cae3a5ee748dd513ad42c411c823
SHA512626ddc18a906b74a231daa5bcc092a90708e0e3d42e4db645d59d19de7ef38a2d91a843f11dbc7873d379bfa14e87c5fc6d09a657e0b44abd24b9991cb971f86
-
C:\Users\Admin\Pictures\SVuhZcqoCkyjaZNXeP8EAlVx.exeFilesize
425KB
MD509eb90cae8ed15b4122a57034baf54c1
SHA1b435f528d2b4678f7d62d200b2e5bde46a9b6272
SHA256697a4d8670f9330d5aa6be0662390681851bb957bf1da3f5ec52b94ec647dbca
SHA512ce186a4067f785dcd8c3487070611a5aa10936d106dfddc75a2a5e63def0143f7a5a66c3e946637aee708c4ae57ce547faf29b1dc7d3f8409178f1800dfa1130
-
C:\Users\Admin\Pictures\UICTY6XdFzHkEkcLPbzfmXp3.exeFilesize
4.1MB
MD5782bd8a27c54fc9c58ea40e8a3e8f03c
SHA12b500d25ce1260d21ac710665a63f4ba3f239272
SHA2569c3a3426921d1425ffae5e2da871be86df71a75413f63a0b07a07f29c6267d57
SHA512972e24980c5d571e75ebe49f5779d9950d9afebc1e301746c6b16115139abf2893c8135b04c358284b30c1ca31872d1f542d41a5ccc794256f0e2b0641c272ed
-
C:\Users\Admin\Pictures\YijrmedmSk4L6ZaYNHz6KZ0y.exeFilesize
5.1MB
MD59fcd4ab09e9bc1be8b2f650f2c433ee8
SHA1bda8ea70218012f5489e8eb7b9a44eebcb7edae6
SHA2565244d42dd7f5cbfdf6b87bdec03f5fcfd3c1a8ba02981065aaa2b4b6ab8cb7a0
SHA512340ef9c1d59065adeff6804f7a1c926530153953b676686f66549c6a5aaa4a68a9dc25d4e67fbab003e5af98b852fbc09d0b34a57cee99614b0146ec910d68f8
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD507c2f8bb8397c7a92a6ceef6937cc4d8
SHA14a8011ef4982b1a1f2739f328faa189a06d59b4f
SHA25671013befe321446301d0c540e8275da502192c812d5482e0be961d4abec89d82
SHA5128a24c9782000ac1e59990a634d721028e49daf70a0c89ea4883d0d1ea94bd6a59d58d96e16c5d2d8203bed247940d32b025ac2cb4bc325222a5efaa578064b4f
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD52c59ae6574ea633ef1dcb4bcb950b598
SHA146cf225217520a075289036ee0704acb1e225a79
SHA256a042731e7fcbce8acc4088195494e7602979b667b67dddf90c89178846abf3a5
SHA5126c9ed12d66f4ddbceec9f0ca2f78c250dc5b33fc0cddf3ae74e7f4114c1cd97dcfedfdd31b3433cf7766e8d3de1fa1fa41aba581178de6d3dc56616367b4f58c
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD51d49f1355f379b8dfbd116928ebfe0b6
SHA1d6304c6de8ba0cc4f20b26b3108fdc9cc52686ba
SHA256f05102c85bf95370a11eb7c386ca0896784af9d56986dac81dd3c02dcb6eb50d
SHA5123ec83147290b86074e65e14f3d29e352ac55f4de8c8db30a72a97a90036c0371ff43b51209b9613425580325654a645db7222185f2fb66206de2fc612722a525
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD50bb757f52a992536c27eee149446c018
SHA194d919315c9b604c33283fdfccb4e75c7f6cc1cc
SHA256ed0c1b37a29bfd542d531a97d8f6ebbb57f9fc4dc8554d843709bc391207af70
SHA512ea5897b09a3b28387e22be8705e950c30d6ab4b7fee0269d6bec7a6283030caec6ee0833bbce1dcc3d2467e49d48448385f6d0290c571f45b7d83d8c443781b5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD52eb19d427ec0e8858133f6e0c0f6bf53
SHA1c4aeb19783185045dac2fc7dc14ec8ea12890d40
SHA2563429672915e32a5683f28b9961ee8ab3101ad4213fe5953f2961e07fa655c6e9
SHA512c7aac287bd5f4ac22346e582cbdce00c9153c7d38057e0acf15f154c8e0665460f4d22d3b5907305b5cd51f383a9033ca296f302917975507e64e6bea776081e
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD57e1c2250c3fe140dabc3ef4fad61de06
SHA1a48516491149117dc70f93dc9858f5d258e4031a
SHA256024bb048ac35bce209475ec9dbb3a113e2c45fc82b950a9f6cd538b4e8ee92c1
SHA512b1f04cba624fa0de2c9b39bcd2cf8453592b99d313d604ecca886ca60024d961f3865df2eb4471f4f39cb8fc7a987aa1282ea51fcaed65476bde03a05090fe24
-
C:\Windows\System32\GroupPolicy\gpt.iniFilesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005
-
C:\Windows\windefender.exeFilesize
2.0MB
MD58e67f58837092385dcf01e8a2b4f5783
SHA1012c49cfd8c5d06795a6f67ea2baf2a082cf8625
SHA256166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa
SHA51240d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec
-
memory/1472-695-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/1472-696-0x00007FFEE9FD0000-0x00007FFEEA1C5000-memory.dmpFilesize
2.0MB
-
memory/1472-703-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/1516-148-0x0000000004020000-0x000000000490B000-memory.dmpFilesize
8.9MB
-
memory/1516-152-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/1516-31-0x0000000003C20000-0x0000000004019000-memory.dmpFilesize
4.0MB
-
memory/1516-39-0x0000000004020000-0x000000000490B000-memory.dmpFilesize
8.9MB
-
memory/1516-44-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/1788-701-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/1788-700-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/1788-658-0x00007FFEE9FD0000-0x00007FFEEA1C5000-memory.dmpFilesize
2.0MB
-
memory/1788-651-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/1788-657-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/1788-660-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/1864-45-0x0000000003FF0000-0x00000000048DB000-memory.dmpFilesize
8.9MB
-
memory/1864-46-0x0000000003BE0000-0x0000000003FE7000-memory.dmpFilesize
4.0MB
-
memory/1864-47-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/1864-146-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/2044-549-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2204-147-0x0000000003A40000-0x0000000003E42000-memory.dmpFilesize
4.0MB
-
memory/2204-353-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/2204-385-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/2204-149-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/2472-637-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2472-564-0x0000000000400000-0x00000000008DF000-memory.dmpFilesize
4.9MB
-
memory/2832-108-0x000000006F360000-0x000000006F6B4000-memory.dmpFilesize
3.3MB
-
memory/2832-132-0x0000000007ED0000-0x0000000007F66000-memory.dmpFilesize
600KB
-
memory/2832-106-0x000000006F910000-0x000000006F95C000-memory.dmpFilesize
304KB
-
memory/2832-98-0x0000000007A60000-0x0000000007AD6000-memory.dmpFilesize
472KB
-
memory/2832-100-0x0000000008160000-0x00000000087DA000-memory.dmpFilesize
6.5MB
-
memory/2832-130-0x0000000003240000-0x0000000003250000-memory.dmpFilesize
64KB
-
memory/2832-129-0x0000000007D10000-0x0000000007DB3000-memory.dmpFilesize
652KB
-
memory/2832-137-0x0000000007EB0000-0x0000000007EB8000-memory.dmpFilesize
32KB
-
memory/2832-107-0x000000007F080000-0x000000007F090000-memory.dmpFilesize
64KB
-
memory/2832-134-0x0000000007E70000-0x0000000007E7E000-memory.dmpFilesize
56KB
-
memory/2832-135-0x0000000007E80000-0x0000000007E94000-memory.dmpFilesize
80KB
-
memory/2832-136-0x0000000007F70000-0x0000000007F8A000-memory.dmpFilesize
104KB
-
memory/2832-133-0x0000000007E30000-0x0000000007E41000-memory.dmpFilesize
68KB
-
memory/2832-96-0x0000000006780000-0x00000000067CC000-memory.dmpFilesize
304KB
-
memory/2832-95-0x0000000006750000-0x000000000676E000-memory.dmpFilesize
120KB
-
memory/2832-140-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/2832-93-0x0000000003240000-0x0000000003250000-memory.dmpFilesize
64KB
-
memory/2832-83-0x0000000003240000-0x0000000003250000-memory.dmpFilesize
64KB
-
memory/2832-66-0x0000000005950000-0x0000000005F78000-memory.dmpFilesize
6.2MB
-
memory/2832-67-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/2832-65-0x0000000003160000-0x0000000003196000-memory.dmpFilesize
216KB
-
memory/2924-99-0x00000000074E0000-0x00000000074FA000-memory.dmpFilesize
104KB
-
memory/2924-76-0x0000000005D20000-0x0000000005D86000-memory.dmpFilesize
408KB
-
memory/2924-68-0x0000000005460000-0x0000000005482000-memory.dmpFilesize
136KB
-
memory/2924-70-0x0000000005C40000-0x0000000005CA6000-memory.dmpFilesize
408KB
-
memory/2924-69-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/2924-77-0x00000000029D0000-0x00000000029E0000-memory.dmpFilesize
64KB
-
memory/2924-82-0x00000000029D0000-0x00000000029E0000-memory.dmpFilesize
64KB
-
memory/2924-94-0x0000000005E90000-0x00000000061E4000-memory.dmpFilesize
3.3MB
-
memory/2924-97-0x0000000006870000-0x00000000068B4000-memory.dmpFilesize
272KB
-
memory/2924-103-0x000000007F980000-0x000000007F990000-memory.dmpFilesize
64KB
-
memory/2924-105-0x000000006F360000-0x000000006F6B4000-memory.dmpFilesize
3.3MB
-
memory/2924-118-0x00000000078E0000-0x00000000078FE000-memory.dmpFilesize
120KB
-
memory/2924-104-0x000000006F910000-0x000000006F95C000-memory.dmpFilesize
304KB
-
memory/2924-101-0x00000000078A0000-0x00000000078D2000-memory.dmpFilesize
200KB
-
memory/2924-131-0x00000000079F0000-0x00000000079FA000-memory.dmpFilesize
40KB
-
memory/2924-141-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/3080-686-0x00007FFEE9FD0000-0x00007FFEEA1C5000-memory.dmpFilesize
2.0MB
-
memory/3080-685-0x000000006D500000-0x000000006D67B000-memory.dmpFilesize
1.5MB
-
memory/3212-256-0x0000000000400000-0x0000000001A35000-memory.dmpFilesize
22.2MB
-
memory/3212-178-0x0000000001CA0000-0x0000000001DA0000-memory.dmpFilesize
1024KB
-
memory/3212-62-0x0000000001CA0000-0x0000000001DA0000-memory.dmpFilesize
1024KB
-
memory/3212-177-0x0000000000400000-0x0000000001A35000-memory.dmpFilesize
22.2MB
-
memory/3212-442-0x0000000000400000-0x0000000001A35000-memory.dmpFilesize
22.2MB
-
memory/3212-64-0x0000000000400000-0x0000000001A35000-memory.dmpFilesize
22.2MB
-
memory/3212-697-0x0000000000400000-0x0000000001A35000-memory.dmpFilesize
22.2MB
-
memory/3212-63-0x0000000001C20000-0x0000000001C8E000-memory.dmpFilesize
440KB
-
memory/3688-162-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/3688-156-0x0000000002610000-0x0000000002620000-memory.dmpFilesize
64KB
-
memory/4016-163-0x0000000005740000-0x0000000005A94000-memory.dmpFilesize
3.3MB
-
memory/4016-155-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/4016-154-0x00000000028C0000-0x00000000028D0000-memory.dmpFilesize
64KB
-
memory/4016-153-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/4216-2-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4216-128-0x00000000052C0000-0x00000000052D0000-memory.dmpFilesize
64KB
-
memory/4216-1-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/4216-102-0x00000000746B0000-0x0000000074E60000-memory.dmpFilesize
7.7MB
-
memory/4216-0-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4336-638-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4336-706-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4336-633-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4336-494-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4336-565-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4336-560-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4412-380-0x0000000000400000-0x0000000001A11000-memory.dmpFilesize
22.1MB
-
memory/4420-355-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4420-406-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4420-150-0x0000000003B50000-0x0000000003F4A000-memory.dmpFilesize
4.0MB
-
memory/4420-151-0x0000000000400000-0x0000000001DEE000-memory.dmpFilesize
25.9MB
-
memory/4740-493-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/4740-350-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/4740-354-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/4740-345-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/4740-334-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/4740-347-0x00007FF71FB60000-0x00007FF720669000-memory.dmpFilesize
11.0MB
-
memory/5056-707-0x00007FFEE9FD0000-0x00007FFEEA1C5000-memory.dmpFilesize
2.0MB