Malware Analysis Report

2025-04-14 06:04

Sample ID 230925-c9d4mabf2t
Target 501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7
SHA256 501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7
Tags
djvu glupteba privateloader redline smokeloader logsdiller cloud (tg: @logsdillabot) pub1 up3 backdoor discovery dropper evasion infostealer loader ransomware themida trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7

Threat Level: Known bad

The file 501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7 was found to be: Known bad.

Malicious Activity Summary

djvu glupteba privateloader redline smokeloader logsdiller cloud (tg: @logsdillabot) pub1 up3 backdoor discovery dropper evasion infostealer loader ransomware themida trojan upx

SmokeLoader

Glupteba

RedLine

PrivateLoader

Glupteba payload

Djvu Ransomware

Detected Djvu ransomware

Stops running service(s)

Downloads MZ/PE file

Modifies file permissions

.NET Reactor proctector

Themida packer

Executes dropped EXE

UPX packed file

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

AutoIT Executable

Suspicious use of SetThreadContext

Launches sc.exe

Unsigned PE

Program crash

Checks SCSI registry key(s)

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Creates scheduled task(s)

Uses Task Scheduler COM API

Suspicious behavior: MapViewOfSection

Runs ping.exe

Kills process with taskkill

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-09-25 02:46

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-25 02:46

Reported

2023-09-25 02:48

Platform

win10v2004-20230915-en

Max time kernel

26s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe"

Signatures

Detected Djvu ransomware

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Djvu Ransomware

ransomware djvu

Glupteba

loader dropper glupteba

Glupteba payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

PrivateLoader

loader privateloader

RedLine

infostealer redline

SmokeLoader

trojan backdoor smokeloader

Downloads MZ/PE file

Stops running service(s)

evasion

.NET Reactor proctector

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies file permissions

discovery
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\icacls.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A ipinfo.io N/A N/A
N/A ipinfo.io N/A N/A
N/A ip-api.com N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.2ip.ua N/A N/A
N/A api.myip.com N/A N/A
N/A api.myip.com N/A N/A

AutoIT Executable

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A
N/A N/A C:\Windows\System32\sc.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A
Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A
Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\taskkill.exe N/A

Runs net.exe

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: MapViewOfSection

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeShutdownPrivilege N/A N/A N/A
Token: SeCreatePagefilePrivilege N/A N/A N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3132 wrote to memory of 3376 N/A N/A C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3132 wrote to memory of 3376 N/A N/A C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3132 wrote to memory of 3376 N/A N/A C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3132 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe
PID 3132 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe
PID 3132 wrote to memory of 448 N/A N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3376 wrote to memory of 1776 N/A C:\Users\Admin\AppData\Local\Temp\C498.exe C:\Users\Admin\AppData\Local\Temp\C498.exe
PID 3132 wrote to memory of 1112 N/A N/A C:\Users\Admin\AppData\Local\Temp\C853.exe
PID 3132 wrote to memory of 1112 N/A N/A C:\Users\Admin\AppData\Local\Temp\C853.exe
PID 1112 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 2492 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 1112 wrote to memory of 3344 N/A C:\Users\Admin\AppData\Local\Temp\C853.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
PID 448 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 448 wrote to memory of 1292 N/A C:\Users\Admin\AppData\Local\Temp\C5B2.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe

"C:\Users\Admin\AppData\Local\Temp\501520b1139c7d6c1840454e091588be2cd44f0bdbe5097e34d77ad66beec0a7.exe"

C:\Users\Admin\AppData\Local\Temp\C498.exe

C:\Users\Admin\AppData\Local\Temp\C498.exe

C:\Users\Admin\AppData\Local\Temp\C5B2.exe

C:\Users\Admin\AppData\Local\Temp\C5B2.exe

C:\Users\Admin\AppData\Local\Temp\C498.exe

C:\Users\Admin\AppData\Local\Temp\C498.exe

C:\Users\Admin\AppData\Local\Temp\C853.exe

C:\Users\Admin\AppData\Local\Temp\C853.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 448 -ip 448

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 268

C:\Windows\SysWOW64\icacls.exe

icacls "C:\Users\Admin\AppData\Local\5630d703-a58b-4617-9b7c-51a85944b3b8" /deny *S-1-1-0:(OI)(CI)(DE,DC)

C:\Users\Admin\Pictures\vl1AAKPNAKuQqMCxoQDQZcMG.exe

"C:\Users\Admin\Pictures\vl1AAKPNAKuQqMCxoQDQZcMG.exe"

C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe

"C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe"

C:\Users\Admin\Pictures\7RcKaOPE7tM0N6Zl9aLQvh4W.exe

"C:\Users\Admin\Pictures\7RcKaOPE7tM0N6Zl9aLQvh4W.exe" /s

C:\Users\Admin\Pictures\7L6DY3SaisuQOub9ugNjuboc.exe

"C:\Users\Admin\Pictures\7L6DY3SaisuQOub9ugNjuboc.exe"

C:\Users\Admin\AppData\Local\Temp\7zSF58B.tmp\Install.exe

.\Install.exe

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\0s1LZaya5iUApiNv6FfGpmMv.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\0s1LZaya5iUApiNv6FfGpmMv.exe" --version

C:\Users\Admin\AppData\Local\Temp\is-LO75D.tmp\1xwj068Wkis1xDUEaUq3yvp4.tmp

"C:\Users\Admin\AppData\Local\Temp\is-LO75D.tmp\1xwj068Wkis1xDUEaUq3yvp4.tmp" /SL5="$80028,4692544,832512,C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=5333

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=102.0.4880.56 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2c0,0x2f0,0x6c563578,0x6c563588,0x6c563594

C:\Users\Admin\Pictures\B5tH6UhNfG05rSmE1p5hMCRM.exe

"C:\Users\Admin\Pictures\B5tH6UhNfG05rSmE1p5hMCRM.exe"

C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe

"C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=5333

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

"C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe" --silent --allusers=0

C:\Users\Admin\Pictures\l0YcVUj3b0M6YJBVWGVWwht1.exe

"C:\Users\Admin\Pictures\l0YcVUj3b0M6YJBVWGVWwht1.exe"

C:\Users\Admin\Pictures\ervYvAKHcL0o79LNvQMUC4yl.exe

"C:\Users\Admin\Pictures\ervYvAKHcL0o79LNvQMUC4yl.exe"

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

"C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe"

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

"C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=5180 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20230915070258" --session-guid=710ea4d4-ca40-4d6e-b0d5-d7fd36954795 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=4C04000000000000

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=102.0.4880.56 --initial-client-data=0x2f0,0x2f4,0x2f8,0x2c0,0x2fc,0x6b063578,0x6b063588,0x6b063594

C:\Users\Admin\AppData\Local\Temp\is-B431P.tmp\_isetup\_setup64.tmp

helper 105 0x444

C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe

"C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe"

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

"C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe"

C:\Users\Admin\Pictures\EpEiPWqewrChUzQ3ZY5W9Z5e.exe

"C:\Users\Admin\Pictures\EpEiPWqewrChUzQ3ZY5W9Z5e.exe"

C:\Users\Admin\AppData\Local\Temp\1EF0.exe

C:\Users\Admin\AppData\Local\Temp\1EF0.exe

C:\Users\Admin\AppData\Local\Temp\C498.exe

"C:\Users\Admin\AppData\Local\Temp\C498.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\7zS913.tmp\Install.exe

.\Install.exe /jyafdidIl "385118" /S

C:\Windows\system32\schtasks.exe

"schtasks" /Query /TN "DigitalPulseUpdateTask"

C:\Users\Admin\AppData\Local\Temp\C498.exe

"C:\Users\Admin\AppData\Local\Temp\C498.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\4FA6.exe

C:\Users\Admin\AppData\Local\Temp\4FA6.exe

C:\Users\Admin\AppData\Local\Temp\1939788285.exe

C:\Users\Admin\AppData\Local\Temp\1939788285.exe

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\3854297379.exe"

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

"C:\Users\Admin\AppData\Local\Temp\aafg31.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Users\Admin\AppData\Local\Temp\781F.exe

C:\Users\Admin\AppData\Local\Temp\781F.exe

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

"C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe"

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

"C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"

C:\Windows\system32\schtasks.exe

"schtasks" /Create /TN "DigitalPulseUpdateTask" /SC HOURLY /TR "C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseUpdate.exe"

C:\Users\Admin\AppData\Local\Temp\781F.exe

C:\Users\Admin\AppData\Local\Temp\781F.exe

C:\Users\Admin\AppData\Local\Temp\kos1.exe

"C:\Users\Admin\AppData\Local\Temp\kos1.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c taskkill /im "Hr5ptP1pih3GphAMZMgv76P8.exe" /f & erase "C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe" & exit

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2872 -ip 2872

C:\Users\Admin\AppData\Local\Temp\set16.exe

"C:\Users\Admin\AppData\Local\Temp\set16.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc

C:\Users\Admin\AppData\Local\Temp\3854297379.exe

"C:\Users\Admin\AppData\Local\Temp\3854297379.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 1492

C:\Users\Admin\AppData\Local\Temp\kos.exe

"C:\Users\Admin\AppData\Local\Temp\kos.exe"

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build2.exe

"C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build2.exe"

C:\Users\Admin\AppData\Local\Temp\is-LMOHP.tmp\is-21QSI.tmp

"C:\Users\Admin\AppData\Local\Temp\is-LMOHP.tmp\is-21QSI.tmp" /SL4 $102FC "C:\Users\Admin\AppData\Local\Temp\set16.exe" 1232936 52224

C:\Program Files (x86)\PA Previewer\previewer.exe

"C:\Program Files (x86)\PA Previewer\previewer.exe" -i

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\SysWOW64\net.exe

"C:\Windows\system32\net.exe" helpmsg 8

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

"C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe" 5333:::clickId=:::srcId=

C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build3.exe

"C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build3.exe"

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"

C:\Windows\SysWOW64\forfiles.exe

"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32&REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"

C:\Users\Admin\AppData\Local\Temp\781F.exe

"C:\Users\Admin\AppData\Local\Temp\781F.exe" --Admin IsNotAutoStart IsNotTask

C:\Windows\SysWOW64\taskkill.exe

taskkill /im "Hr5ptP1pih3GphAMZMgv76P8.exe" /f

C:\Windows\SysWOW64\schtasks.exe

schtasks /CREATE /TN "gLLieFJnt" /SC once /ST 00:17:52 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Program Files (x86)\PA Previewer\previewer.exe

"C:\Program Files (x86)\PA Previewer\previewer.exe" -s

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\SysWOW64\schtasks.exe

schtasks /run /I /tn "gLLieFJnt"

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Users\Admin\AppData\Local\Temp\781F.exe

"C:\Users\Admin\AppData\Local\Temp\781F.exe" --Admin IsNotAutoStart IsNotTask

C:\Users\Admin\AppData\Local\Temp\ci.exe

"C:\Users\Admin\AppData\Local\Temp\ci.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

C:\Windows\SysWOW64\net1.exe

C:\Windows\system32\net1 helpmsg 8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==

C:\Windows\SysWOW64\cmd.exe

/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2280 -ip 2280

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 568

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\Assistant_100.0.4815.21_Setup.exe_sfx.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\Assistant_100.0.4815.21_Setup.exe_sfx.exe"

C:\Windows\System32\sc.exe

sc stop bits

C:\Users\Admin\AppData\Local\Temp\840071799.exe

C:\Users\Admin\AppData\Local\Temp\840071799.exe

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

\??\c:\windows\SysWOW64\reg.exe

REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5812 -ip 5812

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 5812 -s 236

\??\c:\windows\SysWOW64\reg.exe

REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xyvvnnvseiqa.xml"

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\SysWOW64\cmd.exe

/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32&REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\assistant_installer.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\assistant_installer.exe" --version

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\assistant_installer.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=100.0.4815.21 --initial-client-data=0x26c,0x270,0x274,0x24c,0x278,0x3ce8a0,0x3ce8b0,0x3ce8bc

\??\c:\windows\SysWOW64\reg.exe

REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

\??\c:\windows\SysWOW64\reg.exe

REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\system32\cmd.exe" /k ping 0 & del C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe & exit

C:\Windows\SysWOW64\schtasks.exe

schtasks /DELETE /F /TN "gLLieFJnt"

C:\Windows\SysWOW64\schtasks.exe

schtasks /CREATE /TN "bdAEmUkuYkKgCXqjlm" /SC once /ST 07:05:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\SdHRwpKgZPxspyIlq\LMwtKUUKafaivvb\WRWLXfW.exe\" Ux /Eisite_idsGz 385118 /S" /V1 /F

C:\Windows\SysWOW64\schtasks.exe

/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"

C:\Windows\SysWOW64\PING.EXE

ping 0

C:\Users\Admin\Pictures\360TS_Setup.exe

"C:\Users\Admin\Pictures\360TS_Setup.exe" /c:WW.InstallRox.CPI202211 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo=

C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build2.exe

"C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build2.exe"

C:\Program Files (x86)\1694761469_0\360TS_Setup.exe

"C:\Program Files (x86)\1694761469_0\360TS_Setup.exe" /c:WW.InstallRox.CPI202211 /pmode:2 /s /promo:eyJib290dGltZSI6IjciLCJtZWRhbCI6IjciLCJuZXdzIjoiMCIsIm9wZXJhIjoiNyIsIm9wZXJhX2lucyI6IjAiLCJwb3B1cCI6IjciLCJyZW1pbmRlciI6IjciLCJ1cGdyYWRlX25vdyI6IjAifQo= /TSinstall

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 6176 -ip 6176

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 6176 -s 1844

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

powershell -nologo -noprofile

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 240.81.21.72.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 135.1.85.104.in-addr.arpa udp
US 8.8.8.8:53 8.3.197.209.in-addr.arpa udp
US 8.8.8.8:53 potunulit.org udp
US 188.114.96.0:80 potunulit.org tcp
BG 193.42.32.101:80 193.42.32.101 tcp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
US 8.8.8.8:53 api.2ip.ua udp
RU 79.137.192.18:80 79.137.192.18 tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 101.32.42.193.in-addr.arpa udp
US 8.8.8.8:53 254.217.0.162.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.67.143:443 pastebin.com tcp
US 8.8.8.8:53 flyawayaero.net udp
US 8.8.8.8:53 ji.alie3ksgbb.com udp
US 8.8.8.8:53 hbn42414.beget.tech udp
US 8.8.8.8:53 downloads.digitalpulsedata.com udp
US 8.8.8.8:53 jetpackdelivery.net udp
RU 5.42.64.10:80 5.42.64.10 tcp
US 8.8.8.8:53 lycheepanel.info udp
US 8.8.8.8:53 galandskiyher3.com udp
US 8.8.8.8:53 net.geo.opera.com udp
US 8.8.8.8:53 int.down.360safe.com udp
US 85.217.144.143:80 85.217.144.143 tcp
US 8.8.8.8:53 nuevo.strattegi.com.co udp
US 8.8.8.8:53 wasasoftcom.info udp
US 8.8.8.8:53 yip.su udp
US 188.114.96.0:80 jetpackdelivery.net tcp
US 172.67.216.81:443 flyawayaero.net tcp
US 188.114.97.0:443 jetpackdelivery.net tcp
US 172.67.187.122:443 lycheepanel.info tcp
DE 148.251.234.93:443 yip.su tcp
NL 13.227.219.74:443 downloads.digitalpulsedata.com tcp
RU 77.246.100.5:80 wasasoftcom.info tcp
US 107.180.58.67:443 nuevo.strattegi.com.co tcp
NL 185.26.182.112:80 net.geo.opera.com tcp
RU 87.236.19.5:80 hbn42414.beget.tech tcp
NL 185.26.182.112:443 net.geo.opera.com tcp
US 8.8.8.8:53 101.14.18.104.in-addr.arpa udp
US 8.8.8.8:53 143.67.20.104.in-addr.arpa udp
US 8.8.8.8:53 18.192.137.79.in-addr.arpa udp
US 8.8.8.8:53 101.15.18.104.in-addr.arpa udp
US 8.8.8.8:53 10.64.42.5.in-addr.arpa udp
US 8.8.8.8:53 143.144.217.85.in-addr.arpa udp
US 8.8.8.8:53 81.216.67.172.in-addr.arpa udp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 122.187.67.172.in-addr.arpa udp
US 8.8.8.8:53 74.219.227.13.in-addr.arpa udp
US 8.8.8.8:53 112.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 93.234.251.148.in-addr.arpa udp
US 8.8.8.8:53 5.100.246.77.in-addr.arpa udp
NL 194.169.175.127:80 galandskiyher3.com tcp
US 8.8.8.8:53 justsafepay.com udp
US 8.8.8.8:53 d241.userscloud.net udp
US 188.114.97.0:443 justsafepay.com tcp
DE 168.119.1.241:443 d241.userscloud.net tcp
NL 108.156.60.9:80 int.down.360safe.com tcp
PL 146.59.10.173:45035 tcp
US 8.8.8.8:53 5.19.236.87.in-addr.arpa udp
US 8.8.8.8:53 67.58.180.107.in-addr.arpa udp
US 8.8.8.8:53 127.175.169.194.in-addr.arpa udp
US 8.8.8.8:53 241.1.119.168.in-addr.arpa udp
US 8.8.8.8:53 9.60.156.108.in-addr.arpa udp
US 8.8.8.8:53 173.10.59.146.in-addr.arpa udp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
US 8.8.8.8:53 iplogger.com udp
DE 148.251.234.93:443 iplogger.com tcp
US 8.8.8.8:53 121.72.236.156.in-addr.arpa udp
RU 5.42.64.10:80 5.42.64.10 tcp
US 8.8.8.8:53 st.p.360safe.com udp
US 8.8.8.8:53 tr.p.360safe.com udp
IE 54.76.174.118:80 tr.p.360safe.com udp
IE 54.77.42.29:3478 st.p.360safe.com udp
IE 54.77.42.29:3478 st.p.360safe.com udp
US 8.8.8.8:53 iup.360safe.com udp
NL 151.236.127.236:80 iup.360safe.com tcp
NL 151.236.127.236:80 iup.360safe.com tcp
NL 151.236.127.236:80 iup.360safe.com tcp
NL 151.236.127.236:80 iup.360safe.com tcp
NL 151.236.127.236:80 iup.360safe.com tcp
NL 151.236.127.236:80 iup.360safe.com tcp
US 8.8.8.8:53 118.174.76.54.in-addr.arpa udp
US 8.8.8.8:53 29.42.77.54.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 s.360safe.com udp
US 8.8.8.8:53 int.down.360safe.com udp
DE 52.29.179.141:80 s.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
US 8.8.8.8:53 147.174.42.23.in-addr.arpa udp
US 8.8.8.8:53 236.127.236.151.in-addr.arpa udp
DE 52.29.179.141:80 s.360safe.com tcp
RU 5.42.64.10:80 5.42.64.10 tcp
US 104.192.108.20:80 int.down.360safe.com tcp
US 104.192.108.19:80 int.down.360safe.com tcp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.17:80 int.down.360safe.com tcp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.20:80 int.down.360safe.com tcp
US 8.8.8.8:53 141.179.29.52.in-addr.arpa udp
US 8.8.8.8:53 21.108.192.104.in-addr.arpa udp
US 8.8.8.8:53 20.108.192.104.in-addr.arpa udp
US 8.8.8.8:53 17.108.192.104.in-addr.arpa udp
US 8.8.8.8:53 19.108.192.104.in-addr.arpa udp
US 8.8.8.8:53 sd.p.360safe.com udp
NL 52.222.137.147:80 sd.p.360safe.com tcp
US 8.8.8.8:53 desktop-netinstaller-sub.osp.opera.software udp
US 8.8.8.8:53 autoupdate.geo.opera.com udp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
NL 185.26.182.123:443 autoupdate.geo.opera.com tcp
NL 185.26.182.123:443 autoupdate.geo.opera.com tcp
US 8.8.8.8:53 147.137.222.52.in-addr.arpa udp
US 8.8.8.8:53 121.217.145.82.in-addr.arpa udp
US 8.8.8.8:53 123.182.26.185.in-addr.arpa udp
DE 148.251.234.93:443 iplogger.com tcp
US 8.8.8.8:53 alayyadcare.com udp
US 8.8.8.8:53 seriopoli.info udp
RU 77.246.100.5:80 seriopoli.info tcp
PS 213.6.54.58:443 alayyadcare.com tcp
US 8.8.8.8:53 133.121.18.2.in-addr.arpa udp
US 8.8.8.8:53 58.54.6.213.in-addr.arpa udp
RU 5.42.64.10:80 5.42.64.10 tcp
US 104.192.108.19:80 int.down.360safe.com tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 script.google.com udp
DE 172.217.23.206:80 script.google.com tcp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
DE 172.217.23.206:443 script.google.com tcp
US 8.8.8.8:53 features.opera-api2.com udp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
NL 82.145.216.16:443 features.opera-api2.com tcp
US 8.8.8.8:53 m7val1dat0r.info udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 download.opera.com udp
US 188.114.96.0:443 m7val1dat0r.info tcp
NL 82.145.216.24:443 download.opera.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 16.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
US 8.8.8.8:53 24.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 download3.operacdn.com udp
US 8.8.8.8:53 script.googleusercontent.com udp
GB 95.101.143.243:443 download3.operacdn.com tcp
NL 142.251.36.1:443 script.googleusercontent.com tcp
US 8.8.8.8:53 243.143.101.95.in-addr.arpa udp
US 8.8.8.8:53 1.36.251.142.in-addr.arpa udp
US 208.67.104.60:80 tcp
US 8.8.8.8:53 colisumy.com udp
ET 196.188.169.138:80 colisumy.com tcp
US 8.8.8.8:53 zexeq.com udp
US 8.8.8.8:53 138.169.188.196.in-addr.arpa udp
BG 95.158.162.200:80 zexeq.com tcp
NL 162.0.217.254:443 api.2ip.ua tcp
US 8.8.8.8:53 200.162.158.95.in-addr.arpa udp
BG 95.158.162.200:80 zexeq.com tcp
NL 94.142.138.113:80 94.142.138.113 tcp
US 8.8.8.8:53 api.myip.com udp
US 172.67.75.163:443 api.myip.com tcp
US 8.8.8.8:53 ipinfo.io udp
US 34.117.59.81:443 ipinfo.io tcp
US 8.8.8.8:53 113.138.142.94.in-addr.arpa udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 163.75.67.172.in-addr.arpa udp
US 8.8.8.8:53 81.59.117.34.in-addr.arpa udp
DE 148.251.234.93:443 iplogger.com tcp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 233.130.159.162.in-addr.arpa udp
US 8.8.8.8:53 vk.com udp
RU 87.240.132.67:80 vk.com tcp
RU 87.240.132.67:80 vk.com tcp
RU 87.240.132.67:80 vk.com tcp
RU 87.240.132.67:443 vk.com tcp
US 8.8.8.8:53 1.202.248.87.in-addr.arpa udp
US 8.8.8.8:53 67.132.240.87.in-addr.arpa udp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 bapp.digitalpulsedata.com udp
US 104.192.108.17:80 int.down.360safe.com tcp
CA 3.98.219.138:443 bapp.digitalpulsedata.com tcp
US 8.8.8.8:53 226.20.18.104.in-addr.arpa udp
US 8.8.8.8:53 138.219.98.3.in-addr.arpa udp
NL 94.142.138.113:80 94.142.138.113 tcp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 bakbakbak.info udp
RU 77.246.100.5:80 bakbakbak.info tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.20:80 int.down.360safe.com tcp
US 8.8.8.8:53 trecube.store udp
US 172.67.184.106:443 trecube.store tcp
US 8.8.8.8:53 106.184.67.172.in-addr.arpa udp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.17:80 int.down.360safe.com tcp
US 104.192.108.19:80 int.down.360safe.com tcp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.20:80 int.down.360safe.com tcp
US 104.192.108.17:80 int.down.360safe.com tcp
US 104.192.108.21:80 int.down.360safe.com tcp
US 104.192.108.19:80 int.down.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
DE 52.29.179.141:80 s.360safe.com tcp
US 8.8.8.8:53 t.me udp
NL 149.154.167.99:443 t.me tcp
US 8.8.8.8:53 99.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 orion.ts.360.com udp
NL 82.145.215.152:443 orion.ts.360.com tcp
US 8.8.8.8:53 36.249.124.192.in-addr.arpa udp
US 8.8.8.8:53 152.215.145.82.in-addr.arpa udp
DE 49.13.80.90:10088 49.13.80.90 tcp
US 8.8.8.8:53 90.80.13.49.in-addr.arpa udp
US 8.8.8.8:53 85.65.42.20.in-addr.arpa udp

Files

memory/4664-1-0x00000000027B0000-0x00000000028B0000-memory.dmp

memory/4664-2-0x0000000000400000-0x000000000259F000-memory.dmp

memory/4664-3-0x00000000041A0000-0x00000000041A9000-memory.dmp

memory/3132-4-0x0000000000AD0000-0x0000000000AE6000-memory.dmp

memory/4664-6-0x0000000000400000-0x000000000259F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

C:\Users\Admin\AppData\Local\Temp\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

C:\Users\Admin\AppData\Local\Temp\C5B2.exe

MD5 5c5eb6489ecad14a5161afa90f965adc
SHA1 6922636c390d47f9a77dd30a1ef20a91a369587f
SHA256 cd0a41dd6a4877a00dce17561da67e03b99a6d88886be9b4b035735d16f1429d
SHA512 46c7d4f26a742d793bf26d430e6f185b2de8f5b7c6a6f7cf0c2bf14d971591c23cc2537341174548f7cfb3a1bc216d14ef95c9008a4bad068b8c8323ecdcdd1c

memory/3376-20-0x0000000002780000-0x0000000002814000-memory.dmp

memory/3376-21-0x0000000004410000-0x000000000452B000-memory.dmp

memory/1776-22-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

memory/1776-24-0x0000000000400000-0x0000000000537000-memory.dmp

memory/1776-25-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C5B2.exe

MD5 5c5eb6489ecad14a5161afa90f965adc
SHA1 6922636c390d47f9a77dd30a1ef20a91a369587f
SHA256 cd0a41dd6a4877a00dce17561da67e03b99a6d88886be9b4b035735d16f1429d
SHA512 46c7d4f26a742d793bf26d430e6f185b2de8f5b7c6a6f7cf0c2bf14d971591c23cc2537341174548f7cfb3a1bc216d14ef95c9008a4bad068b8c8323ecdcdd1c

memory/1776-26-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C853.exe

MD5 3240f8928a130bb155571570c563200a
SHA1 aa621ddde551f7e0dbeed157ab1eac3f1906f493
SHA256 a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42
SHA512 e7c357e54b7768f1a66e0dabe2c604afe3765eb858f8b4e5751659a4b373b10fb6cc1dc72641aabf83e34d097f28fa70a78482310ecd93e9aa0347378bde409b

C:\Users\Admin\AppData\Local\Temp\C853.exe

MD5 3240f8928a130bb155571570c563200a
SHA1 aa621ddde551f7e0dbeed157ab1eac3f1906f493
SHA256 a12c63a33382720b5ce010cc050106c3909316477b956ca8c17f4a1f6ca6aa42
SHA512 e7c357e54b7768f1a66e0dabe2c604afe3765eb858f8b4e5751659a4b373b10fb6cc1dc72641aabf83e34d097f28fa70a78482310ecd93e9aa0347378bde409b

memory/3344-31-0x0000000000400000-0x0000000000408000-memory.dmp

memory/3344-32-0x0000000073D00000-0x00000000744B0000-memory.dmp

memory/3344-33-0x00000000054B0000-0x00000000054C0000-memory.dmp

memory/1292-34-0x0000000000400000-0x0000000000430000-memory.dmp

memory/1292-38-0x0000000073D00000-0x00000000744B0000-memory.dmp

memory/1292-35-0x00000000010F0000-0x00000000010F6000-memory.dmp

memory/1292-47-0x00000000058B0000-0x0000000005EC8000-memory.dmp

memory/1292-49-0x0000000005130000-0x0000000005142000-memory.dmp

memory/1292-54-0x00000000052D0000-0x000000000530C000-memory.dmp

memory/1292-55-0x0000000005310000-0x000000000535C000-memory.dmp

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

MD5 77896d2d72a6bacaca4384f46a89e2eb
SHA1 b7e194f17d7e7510ff5d787e34f9fb75c2b86fc1
SHA256 878b9453053e9f577409c80b3f62aa772162c9138ce9cfcc6cfbd59a074e1e70
SHA512 fa2f663f06fbad69062e44a471a236e5a268fe6776eb5eceaeadc48f47937601466571b88e2e0fa3525aeeeffcb8c0b561d2b22e30086947b2544b3e8fef4b5b

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

MD5 77896d2d72a6bacaca4384f46a89e2eb
SHA1 b7e194f17d7e7510ff5d787e34f9fb75c2b86fc1
SHA256 878b9453053e9f577409c80b3f62aa772162c9138ce9cfcc6cfbd59a074e1e70
SHA512 fa2f663f06fbad69062e44a471a236e5a268fe6776eb5eceaeadc48f47937601466571b88e2e0fa3525aeeeffcb8c0b561d2b22e30086947b2544b3e8fef4b5b

C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe

MD5 01206ed92910ce58526e694749ff3e82
SHA1 37ee91aae8d6b2047607bcfb07cfcfa3aedc97c4
SHA256 5a28576593d1f6218f098e907daee2f0f191ddc3bacd472cc9ac5593c13351fc
SHA512 3d382ee06bebfcb12171193cea0c887efb3b3e3cdf532db9b109f8ee4cf0a907ffa6b20974d3a5cc8b52d33bacfbbd22a003e725bce7e5213f93c89ac6f8a2d1

memory/2716-139-0x00000000002A0000-0x00000000005BC000-memory.dmp

C:\Users\Admin\Pictures\l0YcVUj3b0M6YJBVWGVWwht1.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe

MD5 3e74b7359f603f61b92cf7df47073d4a
SHA1 c6155f69a35f3baff84322b30550eee58b7dcff3
SHA256 f783c71bcb9e1fb5c91dbe78899537244467dbfd0262491fa4bc607e27013cf6
SHA512 4ab9c603a928c52b757231f6f43c109ecce7fc04aa85cdf2c6597c5ae920316bf1d082aae153fe11f78cb45ca420de9026a9f4c16dd031239d29a1abb807ce05

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

MD5 77896d2d72a6bacaca4384f46a89e2eb
SHA1 b7e194f17d7e7510ff5d787e34f9fb75c2b86fc1
SHA256 878b9453053e9f577409c80b3f62aa772162c9138ce9cfcc6cfbd59a074e1e70
SHA512 fa2f663f06fbad69062e44a471a236e5a268fe6776eb5eceaeadc48f47937601466571b88e2e0fa3525aeeeffcb8c0b561d2b22e30086947b2544b3e8fef4b5b

C:\Users\Admin\Pictures\ervYvAKHcL0o79LNvQMUC4yl.exe

MD5 8e46f4e85d08e81c9a0dd9b10346bb14
SHA1 b0ad02442da9ef4a3671e9adaf60cc9a9838d38c
SHA256 f72c373db3c56f66dc54bf1a1cc9ba64ef2c71cdb099ca6bef5720c3fba6306a
SHA512 e01d22444b0a12dc52341d2b3b733bb55aeffb97eac95696f0259bfc97f1a8b1840013984d79bc9570058269c9d6ba767f5f3bcd7b35fd4fb711f0bd7557cecb

memory/2716-194-0x00000000050D0000-0x0000000005292000-memory.dmp

memory/2716-199-0x0000000004FA0000-0x000000000503C000-memory.dmp

memory/2716-203-0x0000000005040000-0x00000000050A6000-memory.dmp

C:\Users\Admin\Pictures\B5tH6UhNfG05rSmE1p5hMCRM.exe

MD5 80bb20952314f7f75d2b1b31c8eb602f
SHA1 e1620d9d3f5277f62ceff601c389304e004067cf
SHA256 eeff3a3739d2479ee3dc5165b96229ab5d7a9b67963ff1ce0eca4523ad32252d
SHA512 eaa8387c83638ea488120dc7f122ddf707f2a2df6d793cce102d8e8b5046d4d1421dd6ba045a56b64cf389eba81c0cd0b3aeab3888c9ca3fd62ac1066bfe7fc3

C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe

MD5 3e74b7359f603f61b92cf7df47073d4a
SHA1 c6155f69a35f3baff84322b30550eee58b7dcff3
SHA256 f783c71bcb9e1fb5c91dbe78899537244467dbfd0262491fa4bc607e27013cf6
SHA512 4ab9c603a928c52b757231f6f43c109ecce7fc04aa85cdf2c6597c5ae920316bf1d082aae153fe11f78cb45ca420de9026a9f4c16dd031239d29a1abb807ce05

memory/2872-206-0x0000000000400000-0x00000000025B1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150702468845180.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

memory/5188-193-0x0000000000400000-0x00000000004D8000-memory.dmp

memory/5240-210-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/4888-211-0x0000000000400000-0x0000000000409000-memory.dmp

memory/2716-214-0x0000000004F50000-0x0000000004F60000-memory.dmp

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150702494965436.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

memory/2872-230-0x0000000002820000-0x0000000002920000-memory.dmp

memory/3132-232-0x0000000002AE0000-0x0000000002AF6000-memory.dmp

C:\Users\Admin\Pictures\7L6DY3SaisuQOub9ugNjuboc.exe

MD5 c582d0c4448b428dddb04a6a21f440ff
SHA1 8ba225fe248601a8192c0e0a51bb78c15f825656
SHA256 f6933b70a82f621c116566015c6e2ee758f276b40cdd45f09ac32ec4a23b0148
SHA512 0ae54b79ef4e54f5314078710fa2189935c0334b6cd8383ed68541174ab45f5488c5a4d3be94fbbe30a8fc3b6481ea0e56de5956f0ac9e874c2596c92ad47378

C:\Users\Admin\Pictures\7L6DY3SaisuQOub9ugNjuboc.exe

MD5 c582d0c4448b428dddb04a6a21f440ff
SHA1 8ba225fe248601a8192c0e0a51bb78c15f825656
SHA256 f6933b70a82f621c116566015c6e2ee758f276b40cdd45f09ac32ec4a23b0148
SHA512 0ae54b79ef4e54f5314078710fa2189935c0334b6cd8383ed68541174ab45f5488c5a4d3be94fbbe30a8fc3b6481ea0e56de5956f0ac9e874c2596c92ad47378

memory/4888-236-0x0000000000400000-0x0000000000409000-memory.dmp

memory/1292-234-0x00000000055B0000-0x0000000005626000-memory.dmp

memory/1776-231-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5240-226-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-LO75D.tmp\1xwj068Wkis1xDUEaUq3yvp4.tmp

MD5 5b1d2e9056c5f18324fa9dd4041b5463
SHA1 64a703559e8d67514181f5449a1493ade67227af
SHA256 dda18b38700ca62172ba3bd0d2d3b3b0dd43e91fdb67b2b8e24044046ff17769
SHA512 961183656c2e0ed1f01ec937e01c5023b9aea5a9922aa9170735895a3a1e4bbe2b7de89f16f8c7df231b145975d103a02debf2f24b07daf0b90c341fe070a324

memory/4632-223-0x0000000004AA0000-0x000000000538B000-memory.dmp

C:\Users\Admin\Pictures\7L6DY3SaisuQOub9ugNjuboc.exe

MD5 c582d0c4448b428dddb04a6a21f440ff
SHA1 8ba225fe248601a8192c0e0a51bb78c15f825656
SHA256 f6933b70a82f621c116566015c6e2ee758f276b40cdd45f09ac32ec4a23b0148
SHA512 0ae54b79ef4e54f5314078710fa2189935c0334b6cd8383ed68541174ab45f5488c5a4d3be94fbbe30a8fc3b6481ea0e56de5956f0ac9e874c2596c92ad47378

memory/4632-216-0x00000000045A0000-0x000000000499D000-memory.dmp

C:\Users\Admin\Pictures\1xwj068Wkis1xDUEaUq3yvp4.exe

MD5 3e74b7359f603f61b92cf7df47073d4a
SHA1 c6155f69a35f3baff84322b30550eee58b7dcff3
SHA256 f783c71bcb9e1fb5c91dbe78899537244467dbfd0262491fa4bc607e27013cf6
SHA512 4ab9c603a928c52b757231f6f43c109ecce7fc04aa85cdf2c6597c5ae920316bf1d082aae153fe11f78cb45ca420de9026a9f4c16dd031239d29a1abb807ce05

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

memory/2716-190-0x0000000004E60000-0x0000000004EF2000-memory.dmp

C:\Users\Admin\Pictures\ervYvAKHcL0o79LNvQMUC4yl.exe

MD5 8e46f4e85d08e81c9a0dd9b10346bb14
SHA1 b0ad02442da9ef4a3671e9adaf60cc9a9838d38c
SHA256 f72c373db3c56f66dc54bf1a1cc9ba64ef2c71cdb099ca6bef5720c3fba6306a
SHA512 e01d22444b0a12dc52341d2b3b733bb55aeffb97eac95696f0259bfc97f1a8b1840013984d79bc9570058269c9d6ba767f5f3bcd7b35fd4fb711f0bd7557cecb

C:\Users\Admin\Pictures\l0YcVUj3b0M6YJBVWGVWwht1.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

C:\Users\Admin\Pictures\B5tH6UhNfG05rSmE1p5hMCRM.exe

MD5 80bb20952314f7f75d2b1b31c8eb602f
SHA1 e1620d9d3f5277f62ceff601c389304e004067cf
SHA256 eeff3a3739d2479ee3dc5165b96229ab5d7a9b67963ff1ce0eca4523ad32252d
SHA512 eaa8387c83638ea488120dc7f122ddf707f2a2df6d793cce102d8e8b5046d4d1421dd6ba045a56b64cf389eba81c0cd0b3aeab3888c9ca3fd62ac1066bfe7fc3

memory/2716-179-0x0000000005330000-0x00000000058D4000-memory.dmp

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

memory/2872-166-0x00000000041C0000-0x00000000041FE000-memory.dmp

memory/4888-152-0x0000000000400000-0x0000000000409000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\{E87EF2AD-1F96-4ff3-ADED-18FD89957C2B}.tmp\360P2SP.dll

MD5 fc1796add9491ee757e74e65cedd6ae7
SHA1 603e87ab8cb45f62ecc7a9ef52d5dedd261ea812
SHA256 bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60
SHA512 8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

memory/5180-247-0x0000000000030000-0x0000000000565000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

memory/3724-151-0x0000000002950000-0x0000000002A50000-memory.dmp

C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe

MD5 01206ed92910ce58526e694749ff3e82
SHA1 37ee91aae8d6b2047607bcfb07cfcfa3aedc97c4
SHA256 5a28576593d1f6218f098e907daee2f0f191ddc3bacd472cc9ac5593c13351fc
SHA512 3d382ee06bebfcb12171193cea0c887efb3b3e3cdf532db9b109f8ee4cf0a907ffa6b20974d3a5cc8b52d33bacfbbd22a003e725bce7e5213f93c89ac6f8a2d1

memory/3724-142-0x00000000041B0000-0x00000000041B9000-memory.dmp

C:\Users\Admin\Pictures\7RcKaOPE7tM0N6Zl9aLQvh4W.exe

MD5 aa3602359bb93695da27345d82a95c77
SHA1 9cb550458f95d631fef3a89144fc9283d6c9f75a
SHA256 e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d
SHA512 adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36

C:\Users\Admin\Pictures\7RcKaOPE7tM0N6Zl9aLQvh4W.exe

MD5 aa3602359bb93695da27345d82a95c77
SHA1 9cb550458f95d631fef3a89144fc9283d6c9f75a
SHA256 e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d
SHA512 adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36

memory/2716-138-0x0000000073D00000-0x00000000744B0000-memory.dmp

C:\Users\Admin\Pictures\ervYvAKHcL0o79LNvQMUC4yl.exe

MD5 8e46f4e85d08e81c9a0dd9b10346bb14
SHA1 b0ad02442da9ef4a3671e9adaf60cc9a9838d38c
SHA256 f72c373db3c56f66dc54bf1a1cc9ba64ef2c71cdb099ca6bef5720c3fba6306a
SHA512 e01d22444b0a12dc52341d2b3b733bb55aeffb97eac95696f0259bfc97f1a8b1840013984d79bc9570058269c9d6ba767f5f3bcd7b35fd4fb711f0bd7557cecb

memory/5188-262-0x0000000000400000-0x00000000004D8000-memory.dmp

C:\Users\Admin\AppData\Local\5630d703-a58b-4617-9b7c-51a85944b3b8\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150702545345728.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150702545345728.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

C:\Users\Admin\Pictures\7RcKaOPE7tM0N6Zl9aLQvh4W.exe

MD5 aa3602359bb93695da27345d82a95c77
SHA1 9cb550458f95d631fef3a89144fc9283d6c9f75a
SHA256 e9225898ffe63c67058ea7e7eb5e0dc2a9ce286e83624bd85604142a07619e7d
SHA512 adf43781d3f1fec56bc9cdcd1d4a8ddf1c4321206b16f70968b6ffccb59c943aed77c1192bf701ccc1ab2ce0f29b77eb76a33eba47d129a9248b61476db78a36

memory/2332-112-0x00007FF702670000-0x00007FF702712000-memory.dmp

C:\Users\Admin\Pictures\V2SeXLzIe7NctYAjQP0N09Ki.exe

MD5 01206ed92910ce58526e694749ff3e82
SHA1 37ee91aae8d6b2047607bcfb07cfcfa3aedc97c4
SHA256 5a28576593d1f6218f098e907daee2f0f191ddc3bacd472cc9ac5593c13351fc
SHA512 3d382ee06bebfcb12171193cea0c887efb3b3e3cdf532db9b109f8ee4cf0a907ffa6b20974d3a5cc8b52d33bacfbbd22a003e725bce7e5213f93c89ac6f8a2d1

C:\Users\Admin\Pictures\EpEiPWqewrChUzQ3ZY5W9Z5e.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

C:\Users\Admin\Pictures\EpEiPWqewrChUzQ3ZY5W9Z5e.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

C:\Users\Admin\AppData\Local\Temp\7zSF58B.tmp\Install.exe

MD5 e7d34bf1997ab7450fa65621eeb231b6
SHA1 3e8aef62c5d4dfa0ffa8c59b0a8eefb6582481eb
SHA256 86fdf002f79d8ffdc4d63790da26827e809d4ac05eec81659f189615a4dbf79f
SHA512 6d2e5cdf4d795f4e13cfc029fb263e54a93f82356144de41181c895b840dace2d8ae012ebe281d17c74539392e0825cba2e46dbb9cc98b4801232afd30d3c635

C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini

MD5 13701b5f47799e064b1ddeb18bce96d9
SHA1 1807f0c2ae8a72a823f0fdb0a2c3401a6e89a095
SHA256 a34a5bbba3330c67d8bef87a9888f6d25faf554254a1b2b40ffdaf2ce07b81aa
SHA512 c247ee79649e6467d0e50e8380ada70df8f809016b460ebe5570bfa6c6181284181231bf94c4e5288982741e343c4cf8af735351e7bb38469b0546ef237c30bf

C:\Users\Admin\AppData\Local\Temp\[email protected]

MD5 4881eb0e1607cfc7dbedc665c4dd36c7
SHA1 b27952f43ad10360b2e5810c029dec0bc932b9c0
SHA256 eb59b5a0fcba7d2e2e1692da1fa0ca61c4bf15e118a1cc52f366c0fc61d6983e
SHA512 8b2e138ed14789f67b75ba1c0483255cd6706319025ca073d38178b856986d0c5288ba18c449da6310ec7828627dd410a0b356580a1f98f9dd53c506bf929a3a

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150702592692540.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

C:\Users\Admin\AppData\Local\Temp\is-B431P.tmp\_isetup\_setup64.tmp

MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA512 17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

memory/2872-268-0x0000000000400000-0x00000000025B1000-memory.dmp

memory/5728-273-0x0000000000B30000-0x0000000001065000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zSF58B.tmp\Install.exe

MD5 e7d34bf1997ab7450fa65621eeb231b6
SHA1 3e8aef62c5d4dfa0ffa8c59b0a8eefb6582481eb
SHA256 86fdf002f79d8ffdc4d63790da26827e809d4ac05eec81659f189615a4dbf79f
SHA512 6d2e5cdf4d795f4e13cfc029fb263e54a93f82356144de41181c895b840dace2d8ae012ebe281d17c74539392e0825cba2e46dbb9cc98b4801232afd30d3c635

C:\Users\Admin\Pictures\vl1AAKPNAKuQqMCxoQDQZcMG.exe

MD5 2d05cb7fb4726bb51c6059540f0e013e
SHA1 e7d75ad671c662ba956e54ccfff28465e851624d
SHA256 8f116aee53abca68ca7be71a7b5574c84f5df03d38fc8a524ce4d256ab380aa4
SHA512 890999d65ab16445eb6743ad83802c14d3798da9485a973b237dc3c419683358e9c2609a3566594e53a60ae207561724c06c533c4d1fa2c42f9f9056e0e8b82b

C:\Users\Admin\Pictures\vl1AAKPNAKuQqMCxoQDQZcMG.exe

MD5 2d05cb7fb4726bb51c6059540f0e013e
SHA1 e7d75ad671c662ba956e54ccfff28465e851624d
SHA256 8f116aee53abca68ca7be71a7b5574c84f5df03d38fc8a524ce4d256ab380aa4
SHA512 890999d65ab16445eb6743ad83802c14d3798da9485a973b237dc3c419683358e9c2609a3566594e53a60ae207561724c06c533c4d1fa2c42f9f9056e0e8b82b

C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe

MD5 4ddfa7b084debe6cdba857fcd0d5f3c1
SHA1 e7f370af0ed0af0b0126612031ecdb2505abe0e2
SHA256 820d79ec1cd5cdb741f0952384ee337364eeda44c5423674f23ce5488bb9d902
SHA512 353ebedc9deda0a22424c7aed5bd38f3fe70bec72d10e76b8fd40504162f0790bdc229fa73f794df35996359d3a5f87d8344bca7bc51dbe22efe3bf5c1442c59

C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe

MD5 4ddfa7b084debe6cdba857fcd0d5f3c1
SHA1 e7f370af0ed0af0b0126612031ecdb2505abe0e2
SHA256 820d79ec1cd5cdb741f0952384ee337364eeda44c5423674f23ce5488bb9d902
SHA512 353ebedc9deda0a22424c7aed5bd38f3fe70bec72d10e76b8fd40504162f0790bdc229fa73f794df35996359d3a5f87d8344bca7bc51dbe22efe3bf5c1442c59

C:\Users\Admin\Pictures\goxseOr7D2gJ5t40GcyHzTFV.exe

MD5 77896d2d72a6bacaca4384f46a89e2eb
SHA1 b7e194f17d7e7510ff5d787e34f9fb75c2b86fc1
SHA256 878b9453053e9f577409c80b3f62aa772162c9138ce9cfcc6cfbd59a074e1e70
SHA512 fa2f663f06fbad69062e44a471a236e5a268fe6776eb5eceaeadc48f47937601466571b88e2e0fa3525aeeeffcb8c0b561d2b22e30086947b2544b3e8fef4b5b

C:\Users\Admin\Pictures\EpEiPWqewrChUzQ3ZY5W9Z5e.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

C:\Users\Admin\Pictures\vl1AAKPNAKuQqMCxoQDQZcMG.exe

MD5 2d05cb7fb4726bb51c6059540f0e013e
SHA1 e7d75ad671c662ba956e54ccfff28465e851624d
SHA256 8f116aee53abca68ca7be71a7b5574c84f5df03d38fc8a524ce4d256ab380aa4
SHA512 890999d65ab16445eb6743ad83802c14d3798da9485a973b237dc3c419683358e9c2609a3566594e53a60ae207561724c06c533c4d1fa2c42f9f9056e0e8b82b

C:\Users\Admin\Pictures\Hr5ptP1pih3GphAMZMgv76P8.exe

MD5 4ddfa7b084debe6cdba857fcd0d5f3c1
SHA1 e7f370af0ed0af0b0126612031ecdb2505abe0e2
SHA256 820d79ec1cd5cdb741f0952384ee337364eeda44c5423674f23ce5488bb9d902
SHA512 353ebedc9deda0a22424c7aed5bd38f3fe70bec72d10e76b8fd40504162f0790bdc229fa73f794df35996359d3a5f87d8344bca7bc51dbe22efe3bf5c1442c59

memory/1292-50-0x0000000005180000-0x0000000005190000-memory.dmp

memory/1292-48-0x00000000053A0000-0x00000000054AA000-memory.dmp

C:\Users\Admin\Pictures\0s1LZaya5iUApiNv6FfGpmMv.exe

MD5 a65c28c47520370267c4d1be13e1e6fd
SHA1 e278a6bfb1be5f47aa4858b7aacfea6c059927fe
SHA256 c53a9d5e738d64094bb795772bc0ff16743890394a3a7167ae2ebf10ea3bd7d1
SHA512 4e4853e7f65425b9d03763204ba950c825d61f1b4e8fc262dd8be00188e24ab129c22b9b7100c9b2b7e15d47cc479d5ad35b2ee0b6def8d74ec49a3784314680

memory/1292-317-0x00000000051E0000-0x0000000005230000-memory.dmp

memory/4632-304-0x0000000000400000-0x0000000002985000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2309150703023873296.dll

MD5 6aceaeba686345df2e1f3284cc090abe
SHA1 5cc8eb87a170c5bc91472cd6cc6d435370ae741b
SHA256 73e29a88eccb162b70b366b9c91986b7bf5ce90b9072eaa88f146fb06e8d8885
SHA512 8448a64feaed4bb1af04c9a34d92c5ecfbf7da3c4cb2a1f23ccc024cfd53da8a18a6bdb45c8c337f212c23e0f1b25da44118e9b41774d7aa74b6e0a64f944d69

C:\Users\Admin\AppData\Local\Temp\is-LO75D.tmp\1xwj068Wkis1xDUEaUq3yvp4.tmp

MD5 5b1d2e9056c5f18324fa9dd4041b5463
SHA1 64a703559e8d67514181f5449a1493ade67227af
SHA256 dda18b38700ca62172ba3bd0d2d3b3b0dd43e91fdb67b2b8e24044046ff17769
SHA512 961183656c2e0ed1f01ec937e01c5023b9aea5a9922aa9170735895a3a1e4bbe2b7de89f16f8c7df231b145975d103a02debf2f24b07daf0b90c341fe070a324

memory/4324-322-0x00007FF7028A0000-0x00007FF702DE3000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

MD5 60fe01df86be2e5331b0cdbe86165686
SHA1 2a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256 c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512 ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

MD5 5ccd77a9c79a0b2467cb73dbeb784c57
SHA1 823d57df9d9fa94c30dd33e690297a335b609f1c
SHA256 50fec506a781031fc74c66dfe3cc9d06af545ee2ca29ccbc6119ce903e4b3fb3
SHA512 efac54ef5ea155506ee8f403f378accda886cdc86c272f768d29bddefb47e433adb6f79c77ae63a7991a5e24c6a984374698704c3bb164296c9314a716851419

C:\Users\Admin\AppData\Local\Temp\1EF0.exe

MD5 46ec3f1333f627b301fa9c871343bc9a
SHA1 59483a7dd5c33a5a14c4da9441230f7810cd4329
SHA256 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6
SHA512 b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d

C:\Users\Admin\AppData\Local\Temp\1EF0.exe

MD5 46ec3f1333f627b301fa9c871343bc9a
SHA1 59483a7dd5c33a5a14c4da9441230f7810cd4329
SHA256 9b9cbe098bcd6261d2ec404c6da54c7977f7d9919b3daac26c72fa30fa8aafe6
SHA512 b64ba101fb60943980826d3b4597fdada8670beb2a927d0a022901c09be1833cfa83b990a67bbada136108146b301436bd6ebdf90b0d36a5c01978ca95413e1d

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 364a27253148700700eb627a2418ab21
SHA1 79ca97dc2b8ed724b8a44d2396e3729f51468b24
SHA256 4f0e90ef8e5f4f70981929926ce2b0f305f6d4f0bebadabdadb336aacdc0c41d
SHA512 d82718126f4e3d1bb5b4a52ec784e62876d4d4e0ecdce9ac39ed18ab71e413a30818fc8903149fe397bd3b3801249a1bc834f276ae8c952aa0ef03fcfca9caeb

memory/5240-321-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/3684-340-0x0000000000CA0000-0x0000000001334000-memory.dmp

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 364a27253148700700eb627a2418ab21
SHA1 79ca97dc2b8ed724b8a44d2396e3729f51468b24
SHA256 4f0e90ef8e5f4f70981929926ce2b0f305f6d4f0bebadabdadb336aacdc0c41d
SHA512 d82718126f4e3d1bb5b4a52ec784e62876d4d4e0ecdce9ac39ed18ab71e413a30818fc8903149fe397bd3b3801249a1bc834f276ae8c952aa0ef03fcfca9caeb

memory/5188-339-0x0000000000400000-0x00000000004D8000-memory.dmp

memory/5436-343-0x0000000000030000-0x0000000000565000-memory.dmp

memory/5240-338-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/1776-348-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

memory/5532-358-0x0000000000400000-0x000000000071C000-memory.dmp

memory/5240-347-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\DigitalPulse\DigitalPulse.lnk

MD5 9499238058cc604eec97f4b755922571
SHA1 a7c9eb0b6d4c909bd1b527d1983043f57f3d6059
SHA256 7c9aaee639765b854a57139053f31c41b3215cca5b035d40e2bf151c747861b6
SHA512 4625f2c8c3f003b6227a7327d958279dd44cb97023e3bb6a96b3c39a4a3ede5b6deb4c6206551b151c301cbdc50c72778d1df2495478f0681c8104af9c421391

C:\Users\Admin\AppData\Local\Temp\4FA6.exe

MD5 709e3804971890408519b936b6d64959
SHA1 b886c31e10f2d75803ab6d4fb5cb056bf7e64a7a
SHA256 1b1b0f03060682817cab40085ad1b647452c199125ed70ca890d49baf78fdf5e
SHA512 c5d5110408679d1cb2c38475e289df23a20cadd41ef9313d1e8dc50eb12594b8d0b3421f351b538c9bb94dec6dc9e16cec79d961dd9e8d368f7551131316e076

C:\Users\Admin\AppData\Local\Temp\4FA6.exe

MD5 709e3804971890408519b936b6d64959
SHA1 b886c31e10f2d75803ab6d4fb5cb056bf7e64a7a
SHA256 1b1b0f03060682817cab40085ad1b647452c199125ed70ca890d49baf78fdf5e
SHA512 c5d5110408679d1cb2c38475e289df23a20cadd41ef9313d1e8dc50eb12594b8d0b3421f351b538c9bb94dec6dc9e16cec79d961dd9e8d368f7551131316e076

C:\Users\Admin\AppData\Local\Temp\1939788285.exe

MD5 f5b876ad68af0c15aa89b27194cb18b5
SHA1 30f8f97a269595ceab646508a080a186ed7b7fab
SHA256 3eea4fcf202b741cac6739d97aa13fd37d60ffb92e893ebf3260bb336005e661
SHA512 2c4470ee698e90d9328976a507e75ad70b8715df55048221d514f88d376ec9f5471dc770ee4f4b0446d95624723b89e8ef13afaa61517ae3ea4dec6a9926b0c0

memory/2212-388-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5380-387-0x000000000286E000-0x00000000028FF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\C498.exe

MD5 d1720162dd86f22f6779f9b3494d9c26
SHA1 fc1c7735355ec627796e85bf7c181aa7dd14091e
SHA256 828186e86db3578c3d79c7ccbdce3a9702054522d5025b1bd4bb55231cc9de32
SHA512 7d3dc7213eeab249b13afa7660dd3d8f1382b96c2f2b8c223aa4a632242542c32b995bb35fcdf20cf84fdcdfe7ce45da0728d6dad84cb38b89c8b54e90cf66b9

memory/5240-369-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/2212-376-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5240-359-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/2716-368-0x0000000006450000-0x000000000697C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\7zS913.tmp\Install.exe

MD5 5db0193da7e649b4780931ec50e42756
SHA1 a1ffbc1c4732e4bb6b17c381ead46823af967e75
SHA256 7b0d42f7aa62939194632c7077daca05f2399de0b462e72b2b75b52b779e6d83
SHA512 f4fbd0d8cb15d7ccd2b831d0e8574a223c45c142787e94779a20751edf28007ef0f3aeb67b246cd442dbf769a0f4871edd4f900be52d6c9b1c72df1ce8df7235

memory/2716-400-0x0000000006CC0000-0x0000000006CCA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 4c6c11197bbcbdf3a66c9dc1fd7b542f
SHA1 78912bac8af6ed28ba23e58d5e63614444ef64e1
SHA256 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63
SHA512 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948

memory/4632-394-0x0000000000400000-0x0000000002985000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\aafg31.exe

MD5 4c6c11197bbcbdf3a66c9dc1fd7b542f
SHA1 78912bac8af6ed28ba23e58d5e63614444ef64e1
SHA256 830b8d661d5e404c05d5b2b2f5361ab2da6fecc90a561de81354e7840bfc5b63
SHA512 5fd8e96127ec349585e7c925f2692cafa6b5a2bfbd963acea96aa03179e6ea641b4b0fd7e279f63c0102ae93518e90da74e644150cb92a36f7503b6ab9e74948

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 bb924d501954bee604c97534385ecbda
SHA1 05a480d2489f18329fb302171f1b077aa5da6fd2
SHA256 c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372
SHA512 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0

memory/5240-389-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/5240-395-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 bb924d501954bee604c97534385ecbda
SHA1 05a480d2489f18329fb302171f1b077aa5da6fd2
SHA256 c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372
SHA512 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0

memory/5240-416-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

MD5 bb924d501954bee604c97534385ecbda
SHA1 05a480d2489f18329fb302171f1b077aa5da6fd2
SHA256 c69c012e1a7a4bd10e44563b48329341f3172715ed3c18b40cb6d05a7f704372
SHA512 23a0464bace69318a013e9e4e9dc34dcf232897fb7a3cf8af33d9bc9e3bbb209e9b7198e9d43cb97a174a45ad82f9c7d52ddadf5b069281092fab0aa2d3d58e0

memory/5240-420-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/3132-430-0x00000000079C0000-0x00000000079D6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\31839b57a4f11171d6abc8bbc4451ee4.exe

MD5 21bdc4635e67b42af297b5d422b47cdc
SHA1 da08dd00ae5bc0da5ec6433569bcc68c4a8a9410
SHA256 f73bfbd1b920825c536bef691413cd8ae7ea01fb869172da38e4775660e96287
SHA512 626aa66348c62b9b7cdb63eb15be3b7cfc9f3d056ad6b05f183e11a5a2e5143448f5797686bbc8039ef6b01e86dd61c3d8639a20dd7298ec4fba9e140329c6a5

memory/5900-446-0x0000000010000000-0x0000000010581000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\781F.exe

MD5 c082d1ba8c66d2c5adee770992c8c249
SHA1 b32b610c10181cd4dad3c40e7a86c709f6127fc2
SHA256 dc22f70898991db18ea5974191e1509bdb7a10bfc3b02333a4965af6374a0375
SHA512 ceb59c18fff468974b2c4f35922459d8be91d760368fbda9e1e6d9e485e53848a6745db0a9375e7be13d16f7362cf21f87e256be1d9cae31233c88726199e194

memory/3324-467-0x0000000000400000-0x0000000000409000-memory.dmp

memory/6124-435-0x0000000000400000-0x000000000259F000-memory.dmp

memory/3324-462-0x0000000000400000-0x0000000000409000-memory.dmp

memory/4632-431-0x0000000000400000-0x0000000002985000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\kos1.exe

MD5 85b698363e74ba3c08fc16297ddc284e
SHA1 171cfea4a82a7365b241f16aebdb2aad29f4f7c0
SHA256 78efcbb0c6eb6a4c76c036adc65154b8ff028849f79d508e45babfb527cb7cfe
SHA512 7e4816c43e0addba088709948e8aedc9e39d6802c74a75cfbc2a0e739b44c5b5eef2bb2453b7032c758b0bdb38e4e7a598aa29be015796361b81d7f9e8027796

C:\Users\Admin\AppData\Local\Temp\781F.exe

MD5 c082d1ba8c66d2c5adee770992c8c249
SHA1 b32b610c10181cd4dad3c40e7a86c709f6127fc2
SHA256 dc22f70898991db18ea5974191e1509bdb7a10bfc3b02333a4965af6374a0375
SHA512 ceb59c18fff468974b2c4f35922459d8be91d760368fbda9e1e6d9e485e53848a6745db0a9375e7be13d16f7362cf21f87e256be1d9cae31233c88726199e194

C:\Windows\System32\GroupPolicy\gpt.ini

MD5 8ef9853d1881c5fe4d681bfb31282a01
SHA1 a05609065520e4b4e553784c566430ad9736f19f
SHA256 9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA512 5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

memory/6124-476-0x000000000286D000-0x0000000002880000-memory.dmp

memory/6124-490-0x00000000026B0000-0x00000000026B9000-memory.dmp

memory/3684-493-0x0000000073D00000-0x00000000744B0000-memory.dmp

memory/5512-494-0x0000000004180000-0x0000000004212000-memory.dmp

memory/1648-496-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2212-498-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5512-495-0x0000000004320000-0x000000000443B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\set16.exe

MD5 22d5269955f256a444bd902847b04a3b
SHA1 41a83de3273270c3bd5b2bd6528bdc95766aa268
SHA256 ab16986253bd187e3134f27495ef0db4b648f769721bc8c84b708c7ba69156fd
SHA512 d85ada5d8c2c02932a79241a484b088ba70bda0497fd8ad638300935a16841d7cbc8258be93055907cb533bc534fdd48c7c91109fa22f87e65a6b374cd51055c

memory/5532-503-0x00000000008F0000-0x00000000008F1000-memory.dmp

memory/3044-530-0x00000000050D0000-0x0000000005336000-memory.dmp

C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build2.exe

MD5 b298c49f1808cc5d93dcc3dfc088b10f
SHA1 c0b8e909d0ef573e0f5a4e25870a63f3f6ee1306
SHA256 ffaed8dcf0282df833b74faf419729dc20951ee7edbb58103fa5c582e93d5f3a
SHA512 1b75aeaa793b5aa92769f68bb0f677206394f5b28e7ac1a23f6be923af812a5a9033920af0c2de1e6805e46a5c9ec283ddecd879b1264d75d7b4190266028895

memory/2636-559-0x0000000073D00000-0x00000000744B0000-memory.dmp

memory/2188-535-0x00000000005B0000-0x00000000005B8000-memory.dmp

C:\Users\Admin\AppData\Local\7e1d9782-40d5-4d8b-af75-b122326e863a\build3.exe

MD5 9ead10c08e72ae41921191f8db39bc16
SHA1 abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA256 8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512 aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

C:\Users\Admin\AppData\Local\Temp\kos.exe

MD5 076ab7d1cc5150a5e9f8745cc5f5fb6c
SHA1 7b40783a27a38106e2cc91414f2bc4d8b484c578
SHA256 d1b71081d7ba414b589338329f278ba51c6ccf542d74f131f96c2337ee0a4c90
SHA512 75e274a654e88feb0d66156f387bc5e420811f4f62939396a7455d12e835d7e134b2579ab59976c591b416d1ec1acdf05e9eb290c8f01383c6a50bf43854420b

memory/3044-518-0x0000000005340000-0x00000000055A6000-memory.dmp

memory/5240-491-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/1648-492-0x0000000000400000-0x0000000000537000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dzzl20az.ger.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1648-478-0x0000000000400000-0x0000000000537000-memory.dmp

memory/5272-475-0x0000000002700000-0x0000000002709000-memory.dmp

memory/5200-488-0x000002867AFA0000-0x000002867AFC2000-memory.dmp

memory/5272-470-0x000000000273C000-0x000000000274F000-memory.dmp

memory/2636-473-0x00000000005E0000-0x0000000000754000-memory.dmp

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

MD5 93ee86cc086263a367933d1811ac66aa
SHA1 73c2d6ce5dd23501cc6f7bb64b08304f930d443d
SHA256 4de2f896ff1ff1c64d813cad08b92c633be586141d2d5c24099ae2ae4194bece
SHA512 d980e01e3f6a262016f3335a2d127f6efa6a73fe166f4f36355e439cbb2098d624e63ecd0ee8be8575b3aeefb0b1e9bc8e0552d65c4e611bff9f7f119c186c5a

C:\ProgramData\ContentDVSvc\ContentDVSvc.exe

MD5 27b85a95804a760da4dbee7ca800c9b4
SHA1 f03136226bf3dd38ba0aa3aad1127ccab380197c
SHA256 f98b98404ecf3871a10a290ade21ad77d0b2633f47247debc53d094b9bdff245
SHA512 e760a15370272aa9541f1afceaaf4f5a8068dad21c6a8d50ebd01514e16bbc8f867c8af349080f3d1fa7a19eafe7cde74921d01716dea69ef801da1b74eae4a7

memory/6588-655-0x0000000000400000-0x00000000005F1000-memory.dmp

memory/1648-654-0x0000000000400000-0x0000000000537000-memory.dmp

memory/2872-706-0x0000000000400000-0x00000000025B1000-memory.dmp

memory/5240-766-0x00007FF7BF130000-0x00007FF7C02C7000-memory.dmp

memory/5240-769-0x00007FFF3F3F0000-0x00007FFF3F6B9000-memory.dmp

memory/5240-772-0x00007FFF41A90000-0x00007FFF41C85000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\opera_package

MD5 657a8874e110d0d9772f5a6c318ef973
SHA1 00f06ae9255ba3478adbc56b4209be9d8f07cd8e
SHA256 4941df1f75b93efe03b96fb44454c2b5fee948e1ff37a4d54107310ba5d1ddb3
SHA512 28537d2d568c46be5fb897cc424b06ee09d34cc37c8940d65ac4893922f1e7d6faae886a058d4f743f82ab7e854c2f1cb4f1b2cce653b99772db1398016c4710

C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe

MD5 ec6aae2bb7d8781226ea61adca8f0586
SHA1 d82b3bad240f263c1b887c7c0cc4c2ff0e86dfe3
SHA256 b02fffaba9e664ff7840c82b102d6851ec0bb148cec462cef40999545309e599
SHA512 aa62a8cd02a03e4f462f76ae6ff2e43849052ce77cca3a2ccf593f6669425830d0910afac3cf2c46dd385454a6fb3b4bd604ae13b9586087d6f22de644f9dfc7

C:\Users\Admin\AppData\Local\Temp\ci.exe

MD5 e9bbf60a02ceb5cbb6b712c1f0d18f2b
SHA1 d632e47f4ae4d75c22871ae6bffa50bd1f740373
SHA256 7e950b8809c9c3b7fe396a0010c6ecf22a11d373f967cc070ba36bb579bd43ad
SHA512 534341f2e1f52dce2a4c8a30aa7824283e8af6cb558aa1e7b1da3e5b8d7a1b2e9668bf040ad4ed100c8a61b4b57ca9daa0a53d35242c1a4d59d5fbc60c272bb0

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202309150702581\additional_file0.tmp

MD5 79ef7e63ffe3005c8edacaa49e997bdc
SHA1 9a236cb584c86c0d047ce55cdda4576dd40b027e
SHA256 388a4c959063e7edf133058e2cf797574bed808776a7c9a0307aaeb718ff7bd1
SHA512 59ee17f0f452617bcd1a4e42947310c52c21e88d31f1d6a09ebdb6ab400fcb1f997627a0f97fa185e58683d65a45425f8a7ec698f63a84d91c838e0f7e899094

C:\Users\Admin\Pictures\360TS_Setup.exe

MD5 0fb362b0941e742ce35d660959714457
SHA1 34de5279db7bab1229a76fbeaabacaa3d21ccf3e
SHA256 cf994b446f47ba217d1ea420436b6a7b3d2082647422273c93bf50972deceebc
SHA512 369286b60d899e3eaf12be8600b667289fc7e56f4bc7e25dad05fc75032b84863bf6132eb26f28cfe01c9951cc04ded0f3e25ba2efe2db018c55f7f6ab0de4f1

C:\Users\Admin\AppData\Local\Temp\1694761469_00000000_base\360base.dll

MD5 8c42fc725106cf8276e625b4f97861bc
SHA1 9c4140730cb031c29fc63e17e1504693d0f21c13
SHA256 d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22
SHA512 f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

C:\Users\Admin\AppData\Local\Temp\{E87EF2AD-1F96-4ff3-ADED-18FD89957C2B}.tmp\360P2SP.dll

MD5 fc1796add9491ee757e74e65cedd6ae7
SHA1 603e87ab8cb45f62ecc7a9ef52d5dedd261ea812
SHA256 bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60
SHA512 8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\it\safemon\wd.ini

MD5 bbcd2bd46f45a882a56d4ea27e6aca88
SHA1 69ec4e9df7648feff4905af2651abff6f6f9cc00
SHA256 dfe29bbd5fa9d1a9aac3efbef341ef02a44fcdf5b826cfa1fdd646bf27fa6655
SHA512 0619a5e55e479da2085602a91d7077ada2892e345a080adcb759fbcf9c51e1d1d07f362c02218ce880ad7858c9c262432b13979a2ff0ba4122a492479c748dd3

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\360netd.dat

MD5 d89ff5c92b29c77500f96b9490ea8367
SHA1 08dd1a3231f2d6396ba73c2c4438390d748ac098
SHA256 3b5837689b4339077ed90cfeb937d3765dda9bc8a6371d25c640dfcee296090a
SHA512 88206a195cd3098b46eec2c8368ddc1f90c86998d7f6a8d8ec1e57ae201bc5939b6fe6551b205647e20e9a2d144abd68f64b75edd721342861acb3e12450060d

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\360ipc.dat

MD5 ea5fdb65ac0c5623205da135de97bc2a
SHA1 9ca553ad347c29b6bf909256046dd7ee0ecdfe37
SHA256 0ba4355035fb69665598886cb35359ab4b07260032ba6651a9c1fcea2285726d
SHA512 bb9123069670ac10d478ba3aed6b6587af0f077d38ca1e2f341742eaf642a6605862d3d4dbf687eb7cb261643cf8c95be3fba1bfa0ee691e8e1ed17cc487b11e

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\appmon.dat

MD5 9a6ba86a05fa29b2060add92e29f74c2
SHA1 eb0f407816d001283ce8e35a46702506232e4659
SHA256 1acdbe9ac338df8714ad24110c651932a29a6c1fdf8bda40d8351aa025694f8b
SHA512 fb3aea6ce2cbc624bb2f8952eed26c263a99a6fbe1b7ed6bea6581984728918655bf1643d2f4fe77a4e7e472b97cf68bbe73d20220a01e27f91e6d48e029a2d3

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\360netr.dat

MD5 db5227079d3ca5b34f11649805faae4f
SHA1 de042c40919e4ae3ac905db6f105e1c3f352fb92
SHA256 912102c07fcabe6d8a018de20b2ad97ea5f775dcb383cd3376168b7ebf8f9238
SHA512 519ab81d0c3391f88050e5d7a2e839913c45c68f26dabad34c06c461ddb84c781bf7224e4d093462c475700e706eef562d1210cee3dba00a985d8dadbf165c5c

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\it\safemon\bp.dat

MD5 1b5647c53eadf0a73580d8a74d2c0cb7
SHA1 92fb45ae87f0c0965125bf124a5564e3c54e7adb
SHA256 d81e7765dacef70a07c2d77e3ab1c953abd4c8b0c74f53df04c3ee4adf192106
SHA512 439738f2cdd0024e4d4f0da9668714fd369fb939424e865a29fc78725459b98c3f8ac746c65e7d338073374ab695c58d52b86aea72865496cd4b20fcd1aa9295

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\fr\deepscan\art.dat

MD5 0297d7f82403de0bb5cef53c35a1eba1
SHA1 e94e31dcd5c4b1ff78df86dbef7cd4e992b5d8a8
SHA256 81adb709eec2dfb3e7b261e3e279adf33de00e4d9729f217662142f591657374
SHA512 ce8983e3af798f336e34343168a14dc04e4be933542254ce14ff755d5eb2bcb6e745eda488bc24be2b323119006cf0bdb392c7b48558ca30f7f2e170a061a75e

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\hi\deepscan\dsconz.dat

MD5 f76cd5b5dbcccd3a21df516e6eb814ed
SHA1 5d62c1c3caea405a4ddd0b891d06e41deabcb8ae
SHA256 75f44e910966a657f96eceb5ca734d4cf919f76aae3f862cac2674c533e40c3b
SHA512 edd26a0202b3bb46177d09c322693d67efec8cedd6c285645191cdfbc92299ea3b193fab3de5e39107a5d57e98e144c9c728d544c24020ad43729b72d38a394c

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\safemon\drvmon.dat

MD5 c2a0ebc24b6df35aed305f680e48021f
SHA1 7542a9d0d47908636d893788f1e592e23bb23f47
SHA256 5ee31b5ada283f63ac19f79b3c3efc9f9e351182fcabf47ffccdd96060bfa2cf
SHA512 ea83e770ad03b8f9925654770c5fd7baf2592d6d0dd5b22970f38b0a690dfd7cb135988548547e62cca5f09cb737224bbb8f2c15fe3b9b02b996c319f6e271ed

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\deepscan\dsurls.dat

MD5 69d457234e76bc479f8cc854ccadc21e
SHA1 7f129438445bb1bde6b5489ec518cc8f6c80281b
SHA256 b0355da8317155646eba806991c248185cb830fe5817562c50af71d297f269ee
SHA512 200de0ffce7294266491811c6c29c870a5bc21cdf29aa626fc7a41d24faf1bfe054920bd8862784feaba75ba866b8ab5fd65df4df1e3968f78795ab1f4ad0d23

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\fr\deepscan\dsr.dat

MD5 504461531300efd4f029c41a83f8df1d
SHA1 2466e76730121d154c913f76941b7f42ee73c7ae
SHA256 4649eedc3bafd98c562d4d1710f44de19e8e93e3638bc1566e1da63d90cb04ad
SHA512 f7dd16173120dbfe2dabeab0c171d7d5868fd3107f13c2967183582fd23fd96c7eeca8107463a4084ad9f8560cd6447c35dc18b331fd3f748521518ac8e46632

C:\ProgramData\74434108505708048037057066

MD5 c9ff7748d8fcef4cf84a5501e996a641
SHA1 02867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA256 4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512 d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\filemon.dat

MD5 bfed06980072d6f12d4d1e848be0eb49
SHA1 bb5dd7aa1b6e4242b307ea7fabac7bc666a84e3d
SHA256 b065e3e3440e1c83d6a4704acddf33e69b111aad51f6d4194d6abc160eccfdc2
SHA512 62908dd2335303da5ab41054d3278fe613ed9031f955215f892f0c2bb520ce1d26543fa53c75ce5da4e4ecf07fd47d4795fafbdb6673fac767b37a4fa7412d08

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\libdefa.dat

MD5 aeb5fab98799915b7e8a7ff244545ac9
SHA1 49df429015a7086b3fb6bb4a16c72531b13db45f
SHA256 19fa3cbec353223c9e376b7e06f050cc27b3c12d255fdcb5c36342fa3febbec4
SHA512 2d98ed2e9c26a61eb2f1a7beb8bd005eb4d3d0dac297c93faaf61928a05fb1c6343bb7a6b2c073c6520c81befdb51c87383eab8e7ca49bb060b344f2cf08f4d9

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\es\ipc\regmon.dat

MD5 9f2a98bad74e4f53442910e45871fc60
SHA1 7bce8113bbe68f93ea477a166c6b0118dd572d11
SHA256 1c743d2e319cd63426f05a3c51dfea4c4f5b923c96f9ecce7fcf8d4d46a8c687
SHA512 a8267905058170ed42ba20fe9e0a6274b83dcda0dd8afa77cbff8801ed89b1f108cfe00a929f2e7bbae0fc079321a16304d69c16ec9552c80325db9d6d332d10

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\config\lang\de\SysSweeper.ui.dat

MD5 98a38dfe627050095890b8ed217aa0c5
SHA1 3da96a104940d0ef2862b38e65c64a739327e8f8
SHA256 794331c530f22c2390dd44d18e449c39bb7246868b07bdf4ff0be65732718b13
SHA512 fb417aa5de938aaf01bb9a07a3cd42c338292438f5a6b17ef1b8d800a5605c72df81d3bae582e17162f6b1c5008fd63035fa7a637e07e2697cb1b34f9197a0cd

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\360procmon.dll.locale

MD5 7bdac7623fb140e69d7a572859a06457
SHA1 e094b2fe3418d43179a475e948a4712b63dec75b
SHA256 51475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd
SHA512 fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\360SPTool.exe.locale

MD5 9259b466481a1ad9feed18f6564a210b
SHA1 ceaaa84daeab6b488aad65112e0c07b58ab21c4c
SHA256 15164d3600abd6b8f36ac9f686e965cfb2868025a01cded4f7707b1ae5008964
SHA512 b7b06367ba9aa0c52ac5cfc49d66e220232d5482b085287c43de2ef8131f5ee703ffeb4d7bef0e5d9a430c0146bb2ab69c36174982184a0c06e6beda14e808b5

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\appd.dll.locale

MD5 9cbd0875e7e9b8a752e5f38dad77e708
SHA1 815fdfa852515baf8132f68eafcaf58de3caecfc
SHA256 86506ad8b30fc115f19ea241299f000bce38626fe1332601c042ee6109031e89
SHA512 973801758415f10462445e9b284a3c5991ced2279674a6658d4b96c5f2d74aea31ce324ac0a3f20406df3594fbe8939483dce11b8d302e65db97f7bb513d1624

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\NetDefender.dll.locale

MD5 cd37f1dbeef509b8b716794a8381b4f3
SHA1 3c343b99ec5af396f3127d1c9d55fd5cfa099dcf
SHA256 4d1a978e09c6dafdcf8d1d315191a9fb8c0d2695e75c7b8650817d027008d1c1
SHA512 178b73ed00bfd8241cc9191dbdd631ae28b5c7e76661863b326efde2dc2cb438716c0b70896ee313436ccd90f61db5226a3484169176f5a4b79ead1fb4451419

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\filemgr.dll.locale

MD5 3917cbd4df68d929355884cf0b8eb486
SHA1 917a41b18fcab9fadda6666868907a543ebd545d
SHA256 463916c13812228c4fb990a765cbb5d0ee8bb7a1e27de9bdcea1a63cc5095a6a
SHA512 072939985caa724ee5d078c32d41e60543027e23cce67b6f51c95e65ac16abaf2a1d6dce1692395c206c404f077219d30e9551c6d7592be3a0738c44e0627417

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\webprotection_firefox\plugins\nptswp.dll.locale

MD5 5efd82b0e517230c5fcbbb4f02936ed0
SHA1 9f3ea7c0778fedf87a6ed5345e6f45fb1bd173fb
SHA256 09d58a2f0656a777a66288ac4068aa94a2d58d0534328862b8371709eab2003b
SHA512 12775c718f24daa20ec8e4f3bdede4199c478900b12addcb068ae7b20806850fdc903e01c82e6b54e94363725dcff343aeac39c3512f5ea58d1ba8d46712ad33

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\SelfProtectAPI2.dll.locale

MD5 9d8db959ff46a655a3cd9ccada611926
SHA1 99324fdc3e26e58e4f89c1c517bf3c3d3ec308e9
SHA256 a71e57cafb118f29740cd80527b094813798e880de682eca33bfe97aaa20b509
SHA512 9a2f2d88968470b49d9d13569263050b463570c3cce1b9821909e910a8a358e64ad428b86095a18f596d2b3ed77e0e21d40f9c24543e4a0872e6b35c5103bede

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\safemon.dll.locale

MD5 770107232cb5200df2cf58cf278aa424
SHA1 2340135eef24d2d1c88f8ac2d9a2c2f5519fcb86
SHA256 110914328d4bf85058efa99db13bfec2c73e3b175b91dfd6b41c6fa72ebaa103
SHA512 0f8b98ded900d9421eb90cffd527d8218b14354d90b172d592c4945c482191d5e512f2678217c6214addb38da0b9bb9287f84963a50447cf232962bd99b0c3e8

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\Safemon64.dll.locale

MD5 a891bba335ebd828ff40942007fef970
SHA1 39350b39b74e3884f5d1a64f1c747936ad053d57
SHA256 129a7ba4915d44a475ed953d62627726b9aa4048ffcc316c47f7f533b68af58b
SHA512 91d1b04d550eda698b92d64f222ec59c29b5842115b3c3f1159313b620975bc8475b27151c23f21a78f60abd6c7fa9ce5cb1ea45f9349942338f9bf0c8cfc99f

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\Sxin.dll.locale

MD5 3e88c42c6e9fa317102c1f875f73d549
SHA1 156820d9f3bf6b24c7d24330eb6ef73fe33c7f72
SHA256 7e885136a20c3ab48cdead810381dccb10761336a62908ce78fe7f7d397cde0e
SHA512 58341734fb0cf666dfe9032a52674a645306a93430ebb2c6e5ad987e66ce19c8a91f3feebf9bba54b981d62127613dec3c939ef4168054d124b855a511b6d59c

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\spsafe.dll.locale

MD5 22a6711f3196ae889c93bd3ba9ad25a9
SHA1 90c701d24f9426f551fd3e93988c4a55a1af92c4
SHA256 61c130d1436efba0a4975bc3f1c5f9fdf094a097d8182119193b44150344940e
SHA512 33db4f9474df53ce434f6e22f6883da100473d1b819984171356eeef523ba534c4abaf2536596b8758358e755e5d9f3793d85be12d2d8d5284fc7d13f6c005cd

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\Sxin64.dll.locale

MD5 dc4a1c5b62580028a908f63d712c4a99
SHA1 5856c971ad3febe92df52db7aadaad1438994671
SHA256 ee05002e64e561777ea43ac5b9857141dabb7c9eed007a0d57c30924f61af91e
SHA512 45da43ac5b0321ddc5ec599818287bd87b7b6822c8dd6d790b5bbf1232000092afa695774cd3d9c787919ad02ca9846f7200970e273a99bfbe2aa6bebfe7e8ed

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\safemon\spsafe64.dll.locale

MD5 5823e8466b97939f4e883a1c6bc7153a
SHA1 eb39e7c0134d4e58a3c5b437f493c70eae5ec284
SHA256 9327e539134100aa8f61947da7415750f131c4e03bbb7edb61b0fab53ea34075
SHA512 e4ea824314151115592b3b2ad8cd423dc2a7183292aa165f74f8e35da4f142d84d296d34506f503d448c7bd423be6bf04da2412b7daf474fbf4ef6a2af142bfc

C:\Users\Admin\AppData\Local\Temp\360_install_20230915070434_240748265\temp_files\i18n\pl\ipc\yhregd.dll.locale

MD5 8a6421b4e9773fb986daf675055ffa5a
SHA1 33e5c4c943df418b71ce1659e568f30b63450eec
SHA256 02e934cbf941d874ba0343587a1e674f21fd2edef8b4a0cc0354c068ec6fe58b
SHA512 1bb85909a5f00c4d2bf42c0cb7e325982c200babb815df888c913083aebd2c61020225beedda1e7861f7786a9f99179199ec6412d63dd1a3f1b8c8c9634e77ff