Malware Analysis Report

2025-01-02 08:40

Sample ID 231005-ke97kshf6x
Target file.exe
SHA256 7cd7bf6e8ec89fecb6efbad8f40556bd1e2433b58864cec67c216bbd0bacee74
Tags
evasion trojan amadey fabookie spyware stealer upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7cd7bf6e8ec89fecb6efbad8f40556bd1e2433b58864cec67c216bbd0bacee74

Threat Level: Known bad

The file file.exe was found to be: Known bad.

Malicious Activity Summary

evasion trojan amadey fabookie spyware stealer upx

Amadey

Windows security bypass

UAC bypass

Fabookie

Detect Fabookie payload

Stops running service(s)

Downloads MZ/PE file

Checks computer location settings

.NET Reactor proctector

Reads user/profile data of web browsers

Executes dropped EXE

Drops startup file

Loads dropped DLL

Windows security modification

UPX packed file

Legitimate hosting services abused for malware hosting/C2

Checks whether UAC is enabled

Enumerates connected drives

Suspicious use of SetThreadContext

Launches sc.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Modifies Internet Explorer settings

System policy modification

Suspicious use of SetWindowsHookEx

Creates scheduled task(s)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-05 08:32

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-05 08:32

Reported

2023-10-05 08:34

Platform

win7-20230831-en

Max time kernel

147s

Max time network

144s

Command Line

"C:\Users\Admin\AppData\Local\Temp\file.exe"

Signatures

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2724 set thread context of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

Enumerates physical storage devices

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d051628866f7d901 C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "402656607" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\InternetRegistry C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007832999c35766c4bae1b34334b3bf8120000000002000000000010660000000100002000000004e43073a9be8b2cb78fae29b438222ec8538e34e8fc64a394b4bb92f06d2891000000000e800000000200002000000079e1da16fe8fa73ecccc97e0719c80f47d65a9725acb85492887e1f84ca04f9f20000000dd02372f2f7e7c93351c26af8f77ce0f77169eccfae2c247f50248b93024e80d40000000cb3603db4d419df570030ef18cb754af554ab69b9069ffcbabd2f8c0d51bb27e890c13f41369accdcc0ceeb59f972714619f03973e7e9acec49d955e8d3910ec C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IntelliForms C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Zoom C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B2D1F741-6359-11EE-BC2E-661AB9D85156} = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007832999c35766c4bae1b34334b3bf812000000000200000000001066000000010000200000008acdbc6d073a1d45c1fdece77ba7f3aea1abf9a6a7c67132760e3bf79689f422000000000e80000000020000200000001d64c10db6d50560366561e2ff4f489227ac0ba0e68c327643c9908380816cf7900000009c450de2cd92647d63a0a9aef3118e7877898d5432a3257e495feff9f60184c587f32fb88701cf4ec7afb36dec9e987e1a10b5d1fd6c9b807ccd774ce1ee1c7833f460135e3f1a413bc9ba7a384420910bccea112213813dba6840bf6b43a09b2c0d90bba9bc246c8f361526bff54602384ed2c7beb8131bad5cbbe850c6c66caa3a4ce2988d1ec1b0dc30da1059d6bb40000000bab051ab76121483c6cb9049693b8db24fdba37b15b9883619078ebcd09e03fc315cab9fc6ce4379d464f13dd7554862e72efc3bf4a7721f564d83c243deec93 C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\PageSetup C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\IETld\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\SearchScopes C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Internet Explorer\iexplore.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2724 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2724 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2724 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2724 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2724 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
PID 2792 wrote to memory of 2580 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2792 wrote to memory of 2580 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2792 wrote to memory of 2580 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2792 wrote to memory of 2580 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe C:\Program Files\Internet Explorer\iexplore.exe
PID 2580 wrote to memory of 2900 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2900 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2900 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
PID 2580 wrote to memory of 2900 N/A C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\file.exe

"C:\Users\Admin\AppData\Local\Temp\file.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\file.exe" -Force

C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe"

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=mscorsvw.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0

C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 learn.microsoft.com udp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
NL 104.85.2.139:443 learn.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp
US 204.79.197.200:443 ieonline.microsoft.com tcp

Files

memory/2724-0-0x0000000074CE0000-0x00000000753CE000-memory.dmp

memory/2724-1-0x00000000009D0000-0x0000000000A18000-memory.dmp

memory/2724-2-0x0000000004B10000-0x0000000004B50000-memory.dmp

memory/2724-3-0x0000000000210000-0x0000000000238000-memory.dmp

memory/2724-4-0x00000000003F0000-0x000000000040A000-memory.dmp

memory/2792-7-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2792-9-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2792-11-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2724-12-0x0000000074CE0000-0x00000000753CE000-memory.dmp

memory/2572-13-0x000000006FCD0000-0x000000007027B000-memory.dmp

memory/2572-14-0x000000006FCD0000-0x000000007027B000-memory.dmp

memory/2572-15-0x0000000002560000-0x00000000025A0000-memory.dmp

memory/2572-16-0x0000000002560000-0x00000000025A0000-memory.dmp

memory/2572-17-0x0000000002560000-0x00000000025A0000-memory.dmp

memory/2572-18-0x000000006FCD0000-0x000000007027B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\CabD0C9.tmp

MD5 f3441b8572aae8801c04f3060b550443
SHA1 4ef0a35436125d6821831ef36c28ffaf196cda15
SHA256 6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA512 5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

C:\Users\Admin\AppData\Local\Temp\TarD11B.tmp

MD5 9441737383d21192400eca82fda910ec
SHA1 725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256 bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA512 7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 71417bb9bfbec2faed920ec4a6acde6e
SHA1 4f45a36a9162430414224bb65dafc0300816be1a
SHA256 445757339af556f0a6d4600fff04a5f80f9b0e0fec201bd0ce6c5865ccb72c8a
SHA512 1213ddc9081f31078e0b707752d9c402fdf4f132d9680fbd9e56241881879bb60461404b61869501d31346a579af7a04f2f9d2434afbbb5f052ac49e13e5581a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 76ab221d86104dee5b8f79bb91aeb999
SHA1 ae1919c85fdad6cc20f90aca8b7ce81c9abfcbc5
SHA256 7e4b76f018c90367fb1007cfb28cee994756653b068291f84901de042e908f97
SHA512 945f529d8b8be2ab308d25a032c9962d280032aa60d332270b18df0f019556a10515a24908fad32eb1a9e5f84f166b9117ce5439b0d95c3fe4a21820040138d1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fe5585171e15196753e5899cc34bc916
SHA1 175bdee8b9bef1bf41e9769125a35e32826feda2
SHA256 60f65a2e57aadf9f311ea79177c7304519292d6863b0127cf8c6a3fffc5e0a70
SHA512 bb9ad4b8da750e63b224e1fa3371fd0669f3bbfb24a779b8b9b74f62fedd88d05e5fb1f8f5aa0b220c1e90b7523bbd4d1ccc7133cacb291874c425a335c9af85

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 aee6d9b62d04e2659b45a50cec9ac54e
SHA1 07a376ed3e64f4b8bea5998ff8e060f630a571dc
SHA256 cec8afad928fb33d81a0a9b6602aa040c57f2a9c1ce0251e37088709fa7ea479
SHA512 5bf6f02b67dd3ecad84fba43514acc6746e191c465b6c3407b3be54c257eb4d8e95d9b8767b1ec3004ef34d192187c32d49e9d63661b9ae09d193dda8d75fcdf

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 cbe84612888defd3a0b4d0254e080a0d
SHA1 ac35fc131ee34d279abb7de7f8968d39a4670ff6
SHA256 b8a7e5639cafaa414838ed73943e7f19b7bf87f6686ca0d7107556fb7846d8f2
SHA512 166a3aa80a8fb8c17aa653d0d925c8bd59b55691a4ff14b40db2ecad907fe69fed4c41141793ce5c6f6a279db6fb54aa69e94cc5e4fe54595d9a41823efc64dd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 7cb8c080bf14da02e72db140f470e882
SHA1 35b1dddbe718f5720546de2838b04b098f3f259e
SHA256 3ee1baaced801856696dbad1ce735efdc0ff042282e1cf876e2d7c43958b0df6
SHA512 71b50699dbbafc0e31dac129920d65a09fb6c5755d62b3f2b1a31e56e31ec1eead0732de11beca33c075d1fdb4012ecf8cdcb55c768f0c2d045ecad85824de86

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 13e7a981e6ef1f98d5a4d0ff16d8b249
SHA1 af0b64e7b1a3214f0f157c7d39541bcda5ed10c2
SHA256 154724e725edc6e23f28b396f7a1a46d65af1bc0e292a82bbfb28c0e10681ca5
SHA512 aebc32cbbafd41caa5b4ad91ab8242ac0c21c0a699abf0f81d1195c69d61c1bf65c77c66817811674675173fb26d8125c5da08bc739f5f8afba269e90f7eff1a

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ba7159479086ed9360e6a326d40c0f1d
SHA1 148acbfb8cd3b7660799e70ebdf6e4ee8dab4a4b
SHA256 29f62dabece3d24aeae62a85bcd307284a5632463e54880f6a32d0800f6e86ab
SHA512 aef6a248a63f062c64ff95ddf3688b9e3bec99d719d57de507e2ad7a19bd3bcdee648779517bebfc917b1573c16194a908dc651905ffc1de09097cbd9566e1cd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 c8a52b8dfdfc05b142cba12087a03062
SHA1 4f7e4916c303acd478f33867e921a1b06a0c78a6
SHA256 3d652d4ff10f7401009f998673574f5662e8255cb5821c8f182a7f3bf70f0417
SHA512 1b331da708d6cdbe23362120f550f55983832a90d165d2b845621f50f682937d88115bda613fac74a55cce861d33540311d672ba4b14a696e4b004b3e21adf6d

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 8bbce431027b9a33e2b4c3d8e6f379c1
SHA1 29bee9651e5a63addd7c7f436a4b8b888c4bc12b
SHA256 05de740dd397a48c221f035915eedd639d76dd24d653525dfd670c14c4f3d099
SHA512 b108a989815ecce9eb65b300971659d4d1736d95ef610dc6852d776ae2214cdf6b6e990f29b2df345c98cacbf63353d40bf609f9609fec8e5bf3423d9d37a2aa

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b7474e5f46d037df16390979e016a7af
SHA1 a6ed92eed6f239c78b04292341d102cc2b97f2f1
SHA256 c7a611027e5784de90f2f770266077cff2b1d043f87e51f50cce86032035e22c
SHA512 3ee34cf2c6bf3afe71cde8d1a430716e9b51a7d1ee183c8e435653af27667e3dde021ceb53bc560b29ea2c3eab764a8ddc1176cd059c675c1b4875642e597d45

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 40fee5e1e9f9d7e9a813410d6f31218c
SHA1 2eff4234ecacbec1a1221c3252f0139a60c959a4
SHA256 d9999301bbe4d7601c035d8e32793c66da7d05c3467dd0da55c5ab0849d812a7
SHA512 4b5da4b866aed427a0c200d6d6654dff40b3e1186ec818b4c2e6afa26d27738f0292b5e1c897f0820d067bd95e846b77e1bd6818aef53b411ef3e0def4fba6ca

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 141b58dea1b591a012a11d98665bf9d2
SHA1 e8e4bda9584537c85917b68d2c9dd3fd682f6483
SHA256 cbd9c3b7858783d77af48c800b99e2458fd289b7078e890a108b37d8ed2d0fa7
SHA512 25c060757f521fc993b51dbec05a2d8477a1857508b68501be56d494e8a4300191447653a8053588e492e8769519542caf4f4be6b47926f4310488946d582ab5

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e110c4bd929aebdb9eb3808683f2bda3
SHA1 0ad9c820b0278092d7ad88beaaab31bf69627cfb
SHA256 7b5fb752586feb37e2c11377dd2c341d3940a1a5bcb92a91a1dcefd61cca91bf
SHA512 a8806568d19164d85d91287f6b9f7a6e2dd2b3fba39f58fd18bb6742b68de64ec49400c5c835c6a3ba5e29d3ef6b377ab0f2f45b745497df17765fa9e36e22ed

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 741335bd18aa51d652f1e001611100df
SHA1 2c206bd913abd8fa63ee47235e9ea97d46ac4de8
SHA256 96c3e5db5f80a7c3d72ca53a59b8a0592c8bc6dce4f105496be703b18fc8c3b2
SHA512 fc2f30e21166bb828714ace4b2edb62d9c84c2c1d153939919920c672a364af214cfb67e56ee2cab49de9d4a543f40048c7ce314eb96e2f3268a368d8856a8e0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b4f5feb35453bde369a4fa1741f8b824
SHA1 73fbaa524f127056cb6668477fc444cee9c000d9
SHA256 93546b16619d8edcae572bc946f384a02b633defedf047187ad160e9d9d6a38b
SHA512 abbd7e535939d34363a5ad73691bdbf58dcb4172cefc952180e77d1d75d322390c6c74ce08e8e4180ea9826ce4486167a1c34cad3668c7251d1bdc97203b45be

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 0997825958e242118234bd4a35609fd9
SHA1 e6553869e5ff1cf65ccc528ac3e9eb1d1868d2aa
SHA256 dc08fd5666ff6f04b87d1f17599df56fc446dc697fee164118e3e0299879c3df
SHA512 3cd4013f6c278651230d16aa3f632d9650ce20c5ed8d61ac60ec0e58b91e74303ea783a32e09f16f5d408296c2bb3a97f70de1f78f70f8620d2735e15fff1c7f

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 2f76921a5a6c058a50bff7b254373554
SHA1 ea031ae78e6281d23578b74ed107196fc9363afd
SHA256 9472c350167394ad783726833986bf1f17c4ad77bca6f35ea0c646ea593fb07b
SHA512 c3f237175d539c130a91b3370157368f5c1dc6c62cd1a667b7a32d7ac75ed704ad7225c117451d050562b10def764f86e90781b665e08c344280d883367e6cb0

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f4ca65c70e600febf0f9e3a253f035dc
SHA1 61bb028ab977b5ec20a3a9950ab65941011fda5a
SHA256 23866e39e19b0ef7214d3bee9e33a219deee31823712258bef708ae6a6d692b7
SHA512 1c8c962a670fe4442ab04637b8022f04fdb23f3a5aac7046e68dfa25573c0ddc539f7bca91526ed5cfa7bfc6843e5cb730e590a2d170a8bc764b6f27b54f1777

Analysis: behavioral2

Detonation Overview

Submitted

2023-10-05 08:32

Reported

2023-10-05 08:34

Platform

win10v2004-20230915-en

Max time kernel

13s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\file.exe"

Signatures

Amadey

trojan amadey

Detect Fabookie payload

Description Indicator Process Target
N/A N/A N/A N/A

Fabookie

spyware stealer fabookie

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Downloads MZ/PE file

Stops running service(s)

evasion

.NET Reactor proctector

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tNFd4zeuiEEEoPiljsjO55A8.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JexuKORGKIfRfqsl9ZeyyP0d.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\284KLuQhYDKSdsopFA3QjiN0.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BH4TAWZTuEKotEEBaKnwnNPh.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vvn701k709RO6xjpccIfrZhD.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AAu91bAZNIcV6ZkgZUDtcVXI.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\n3o88RjtCjb0lp3u5qh8BArg.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jBndJOyMJFeY0qUd4mKUOydi.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\D7bpze1MHiESZxHVu25dmajd.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuAFmIoDBxLr1w9fuAwT2QW7.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nGzhNeFVdr6ndpPgUaBaKfRa.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KVe2h2KrgqSdIiOwdWeEBz1w.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vDxGQdSc9VECrwTAwsfuW6U7.bat C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Windows security modification

evasion trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\file.exe = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Users\Admin\AppData\Local\Temp\file.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\D: C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe N/A

Legitimate hosting services abused for malware hosting/C2

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1372 set thread context of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A
N/A N/A C:\Windows\system32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1372 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1372 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1372 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1372 wrote to memory of 1976 N/A C:\Users\Admin\AppData\Local\Temp\file.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
PID 1976 wrote to memory of 3476 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe
PID 1976 wrote to memory of 3476 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe
PID 1976 wrote to memory of 3476 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe
PID 1976 wrote to memory of 4852 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe
PID 1976 wrote to memory of 4852 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe
PID 1976 wrote to memory of 4852 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe
PID 3476 wrote to memory of 3500 N/A C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
PID 3476 wrote to memory of 3500 N/A C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
PID 3476 wrote to memory of 3500 N/A C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe
PID 1976 wrote to memory of 3380 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe
PID 1976 wrote to memory of 3380 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe
PID 1976 wrote to memory of 4352 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe
PID 1976 wrote to memory of 4352 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe
PID 1976 wrote to memory of 4352 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe
PID 1976 wrote to memory of 1860 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe
PID 1976 wrote to memory of 1860 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe
PID 1976 wrote to memory of 1860 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe
PID 1976 wrote to memory of 4160 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe
PID 1976 wrote to memory of 4160 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe
PID 1976 wrote to memory of 4160 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe
PID 1976 wrote to memory of 3296 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 1976 wrote to memory of 3296 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 1976 wrote to memory of 3296 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 1976 wrote to memory of 1228 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe
PID 1976 wrote to memory of 1228 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe
PID 1976 wrote to memory of 1228 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe
PID 3500 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\schtasks.exe
PID 3500 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\schtasks.exe
PID 3500 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\schtasks.exe
PID 1976 wrote to memory of 3716 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe
PID 1976 wrote to memory of 3716 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe
PID 1976 wrote to memory of 3716 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe
PID 1976 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe
PID 1976 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe
PID 1976 wrote to memory of 1576 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe
PID 3500 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\cmd.exe
PID 3500 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\cmd.exe
PID 3500 wrote to memory of 440 N/A C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe C:\Windows\SysWOW64\cmd.exe
PID 3296 wrote to memory of 4600 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 3296 wrote to memory of 4600 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 3296 wrote to memory of 4600 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 1576 wrote to memory of 2952 N/A C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp
PID 1576 wrote to memory of 2952 N/A C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp
PID 1576 wrote to memory of 2952 N/A C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp
PID 1976 wrote to memory of 3504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe
PID 1976 wrote to memory of 3504 N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe
PID 3716 wrote to memory of 2336 N/A C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp
PID 3716 wrote to memory of 2336 N/A C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp
PID 3716 wrote to memory of 2336 N/A C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp
PID 3296 wrote to memory of 2796 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 3296 wrote to memory of 2796 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe
PID 3296 wrote to memory of 2796 N/A C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\file.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\file.exe

"C:\Users\Admin\AppData\Local\Temp\file.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\file.exe" -Force

C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"

C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe

"C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe"

C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe

"C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe"

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

"C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe"

C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe

"C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe"

C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe

"C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe"

C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe

"C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe"

C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe

"C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe"

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

"C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe" --silent --allusers=0

C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe

"C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe"

C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe

"C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=5333

C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe

"C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe"

C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe

"C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe"

C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp

"C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp" /SL5="$1D0022,491750,408064,C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe"

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.16 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2ec,0x6ed88538,0x6ed88548,0x6ed88554

C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp

"C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp" /SL5="$801E0,5025136,832512,C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe" /SP- /VERYSILENT /SUPPRESSMSGBOXES /PID=5333

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nhdues.exe" /P "Admin:N"&&CACLS "nhdues.exe" /P "Admin:R" /E&&echo Y|CACLS "..\1ff8bec27e" /P "Admin:N"&&CACLS "..\1ff8bec27e" /P "Admin:R" /E&&Exit

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nhdues.exe /TR "C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe" /F

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe" --version

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

"C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3296 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231005083225" --session-guid=142eea42-95d5-4897-8bce-aeea89d86af8 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=5805000000000000

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.16 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2bc,0x2f8,0x6d4c8538,0x6d4c8548,0x6d4c8554

C:\Users\Admin\AppData\Local\Temp\is-ANDBI.tmp\_isetup\_setup64.tmp

helper 105 0x440

C:\Windows\SysWOW64\cacls.exe

CACLS "nhdues.exe" /P "Admin:N"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "nhdues.exe" /P "Admin:R" /E

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\system32\schtasks.exe

"schtasks" /Query /TN "DigitalPulseUpdateTask"

C:\Users\Admin\AppData\Local\Temp\is-LLKNH.tmp\8758677____.exe

"C:\Users\Admin\AppData\Local\Temp\is-LLKNH.tmp\8758677____.exe" /S /UID=lylal220

C:\Windows\system32\schtasks.exe

"schtasks" /Create /TN "DigitalPulseUpdateTask" /SC HOURLY /TR "C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseUpdate.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /S /D /c" echo Y"

C:\Windows\SysWOW64\cacls.exe

CACLS "..\1ff8bec27e" /P "Admin:N"

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

"C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe" 5333:::clickId=:::srcId=

C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe

"C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe"

C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe

"C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe" /VERYSILENT

C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe

dw20.exe -x -s 812

C:\Users\Admin\AppData\Local\Temp\is-OM35R.tmp\lightcleaner.tmp

"C:\Users\Admin\AppData\Local\Temp\is-OM35R.tmp\lightcleaner.tmp" /SL5="$A01E0,833775,56832,C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe" /VERYSILENT

C:\Windows\SysWOW64\cacls.exe

CACLS "..\1ff8bec27e" /P "Admin:R" /E

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\xyvvnnvseiqa.xml"

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main

C:\Windows\system32\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll, Main

C:\Windows\SysWOW64\rundll32.exe

"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll, Main

C:\Program Files\Google\Chrome\updater.exe

"C:\Program Files\Google\Chrome\updater.exe"

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\Assistant_100.0.4815.21_Setup.exe_sfx.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\Assistant_100.0.4815.21_Setup.exe_sfx.exe"

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\assistant_installer.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\assistant_installer.exe" --version

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\assistant_installer.exe

"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=100.0.4815.21 --initial-client-data=0x26c,0x270,0x274,0x248,0x278,0x62e8a0,0x62e8b0,0x62e8bc

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc

C:\Windows\System32\sc.exe

sc stop UsoSvc

C:\Windows\System32\sc.exe

sc stop WaaSMedicSvc

C:\Windows\System32\sc.exe

sc stop wuauserv

C:\Windows\System32\sc.exe

sc stop bits

C:\Windows\System32\sc.exe

sc stop dosvc

C:\Windows\System32\cmd.exe

C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-ac 0

C:\Windows\System32\powercfg.exe

powercfg /x -hibernate-timeout-dc 0

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-ac 0

C:\Windows\System32\schtasks.exe

C:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Windows\TEMP\xyvvnnvseiqa.xml"

C:\Windows\System32\powercfg.exe

powercfg /x -standby-timeout-dc 0

C:\Windows\System32\conhost.exe

C:\Windows\System32\conhost.exe

C:\Windows\explorer.exe

C:\Windows\explorer.exe

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 yip.su udp
US 8.8.8.8:53 pastebin.com udp
DE 148.251.234.93:443 yip.su tcp
US 172.67.34.170:443 pastebin.com tcp
US 8.8.8.8:53 flyawayaero.net udp
US 8.8.8.8:53 d062.userscloud.net udp
US 8.8.8.8:53 downloads.digitalpulsedata.com udp
US 8.8.8.8:53 ji.fhauiehgha.com udp
RU 5.42.64.10:80 5.42.64.10 tcp
DE 168.119.140.62:443 d062.userscloud.net tcp
US 8.8.8.8:53 jetpackdelivery.net udp
US 8.8.8.8:53 bolidare.beget.tech udp
HK 103.100.211.218:80 ji.fhauiehgha.com tcp
US 104.21.93.225:443 flyawayaero.net tcp
US 85.217.144.143:80 85.217.144.143 tcp
US 8.8.8.8:53 lycheepanel.info udp
NL 13.227.219.83:443 downloads.digitalpulsedata.com tcp
US 8.8.8.8:53 goboh2b.top udp
US 188.114.96.0:443 jetpackdelivery.net tcp
US 104.21.32.208:443 lycheepanel.info tcp
US 8.8.8.8:53 potatogoose.com udp
RU 212.193.49.228:80 goboh2b.top tcp
US 8.8.8.8:53 net.geo.opera.com udp
RU 91.106.207.50:80 bolidare.beget.tech tcp
NL 185.26.182.112:80 net.geo.opera.com tcp
US 85.217.144.143:80 85.217.144.143 tcp
US 172.67.180.173:443 potatogoose.com tcp
US 8.8.8.8:53 link.storjshare.io udp
NL 185.26.182.112:443 net.geo.opera.com tcp
US 136.0.77.2:443 link.storjshare.io tcp
US 8.8.8.8:53 justsafepay.com udp
US 8.8.8.8:53 170.34.67.172.in-addr.arpa udp
US 8.8.8.8:53 93.234.251.148.in-addr.arpa udp
US 8.8.8.8:53 10.64.42.5.in-addr.arpa udp
US 8.8.8.8:53 225.93.21.104.in-addr.arpa udp
US 8.8.8.8:53 143.144.217.85.in-addr.arpa udp
US 8.8.8.8:53 62.140.119.168.in-addr.arpa udp
US 8.8.8.8:53 83.219.227.13.in-addr.arpa udp
US 8.8.8.8:53 0.96.114.188.in-addr.arpa udp
US 8.8.8.8:53 208.32.21.104.in-addr.arpa udp
US 8.8.8.8:53 228.49.193.212.in-addr.arpa udp
US 8.8.8.8:53 50.207.106.91.in-addr.arpa udp
US 8.8.8.8:53 112.182.26.185.in-addr.arpa udp
US 8.8.8.8:53 173.180.67.172.in-addr.arpa udp
US 8.8.8.8:53 218.211.100.103.in-addr.arpa udp
US 8.8.8.8:53 2.77.0.136.in-addr.arpa udp
US 188.114.96.1:443 justsafepay.com tcp
US 8.8.8.8:53 1.96.114.188.in-addr.arpa udp
US 136.0.77.2:80 link.storjshare.io tcp
US 8.8.8.8:53 z.nnnaajjjgc.com udp
US 136.0.77.2:443 link.storjshare.io tcp
BG 193.42.32.29:80 193.42.32.29 tcp
BG 193.42.32.29:80 193.42.32.29 tcp
MU 156.236.72.121:443 z.nnnaajjjgc.com tcp
US 8.8.8.8:53 29.32.42.193.in-addr.arpa udp
US 8.8.8.8:53 autoupdate.geo.opera.com udp
US 8.8.8.8:53 desktop-netinstaller-sub.osp.opera.software udp
US 8.8.8.8:53 121.72.236.156.in-addr.arpa udp
NL 82.145.216.19:443 autoupdate.geo.opera.com tcp
NL 82.145.216.19:443 autoupdate.geo.opera.com tcp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 19.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 121.217.145.82.in-addr.arpa udp
US 8.8.8.8:53 35.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 147.174.42.23.in-addr.arpa udp
US 136.0.77.2:443 link.storjshare.io tcp
US 8.8.8.8:53 download.opera.com udp
US 8.8.8.8:53 features.opera-api2.com udp
NL 82.145.216.16:443 features.opera-api2.com tcp
NL 82.145.216.23:443 download.opera.com tcp
US 8.8.8.8:53 176.25.221.88.in-addr.arpa udp
US 8.8.8.8:53 16.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 23.216.145.82.in-addr.arpa udp
US 8.8.8.8:53 download3.operacdn.com udp
GB 95.101.143.243:443 download3.operacdn.com tcp
US 8.8.8.8:53 243.143.101.95.in-addr.arpa udp
US 8.8.8.8:53 demo.seafile.com udp
DE 168.119.152.22:80 demo.seafile.com tcp
DE 168.119.152.22:443 demo.seafile.com tcp
US 8.8.8.8:53 m7val1dat0r.info udp
US 8.8.8.8:53 22.152.119.168.in-addr.arpa udp
US 188.114.97.0:443 m7val1dat0r.info tcp
US 8.8.8.8:53 0.97.114.188.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 app.nnnaajjjgc.com udp
HK 154.221.26.108:80 app.nnnaajjjgc.com tcp
US 8.8.8.8:53 108.26.221.154.in-addr.arpa udp
US 8.8.8.8:53 connectini.net udp
GB 91.109.116.11:443 connectini.net tcp
US 8.8.8.8:53 11.116.109.91.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 vibrator.s3.pl-waw.scw.cloud udp
PL 151.115.10.1:443 vibrator.s3.pl-waw.scw.cloud tcp
US 8.8.8.8:53 link.storjshare.io udp
US 8.8.8.8:53 wewewe.s3.eu-central-1.amazonaws.com udp
US 136.0.77.2:443 link.storjshare.io tcp
US 136.0.77.2:443 link.storjshare.io tcp
DE 52.219.169.178:443 wewewe.s3.eu-central-1.amazonaws.com tcp
US 8.8.8.8:53 1.10.115.151.in-addr.arpa udp
US 8.8.8.8:53 178.169.219.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 360devtracking.com udp
GB 91.109.116.11:80 360devtracking.com tcp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 126.177.238.8.in-addr.arpa udp
US 8.8.8.8:53 bapp.digitalpulsedata.com udp
CA 3.98.219.138:443 bapp.digitalpulsedata.com tcp
US 8.8.8.8:53 138.219.98.3.in-addr.arpa udp
US 8.8.8.8:53 208.194.73.20.in-addr.arpa udp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 126.178.238.8.in-addr.arpa udp
NL 82.145.217.121:443 desktop-netinstaller-sub.osp.opera.software tcp
US 8.8.8.8:53 xmr.2miners.com udp
DE 162.19.139.184:12222 xmr.2miners.com tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 184.139.19.162.in-addr.arpa udp
CA 129.153.49.67:7001 tcp
US 8.8.8.8:53 www.cyclemania1.com udp
US 8.8.8.8:53 67.49.153.129.in-addr.arpa udp
US 8.8.8.8:53 233.17.178.52.in-addr.arpa udp

Files

memory/1372-0-0x00000000005C0000-0x0000000000608000-memory.dmp

memory/1372-1-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/1372-2-0x0000000004FC0000-0x000000000505C000-memory.dmp

memory/1372-3-0x0000000005710000-0x0000000005CB4000-memory.dmp

memory/1372-4-0x0000000005260000-0x00000000052F2000-memory.dmp

memory/1372-5-0x00000000028B0000-0x00000000028C0000-memory.dmp

memory/1372-6-0x00000000028F0000-0x00000000028FA000-memory.dmp

memory/1372-7-0x0000000004F60000-0x0000000004F88000-memory.dmp

memory/1372-8-0x0000000005060000-0x000000000507A000-memory.dmp

memory/1976-9-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4436-10-0x0000000002BC0000-0x0000000002BF6000-memory.dmp

memory/4436-12-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/1372-13-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/1976-14-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/4436-16-0x0000000002E30000-0x0000000002E40000-memory.dmp

memory/1976-17-0x0000000004F70000-0x0000000004F80000-memory.dmp

memory/4436-15-0x00000000057E0000-0x0000000005E08000-memory.dmp

memory/4436-18-0x0000000002E30000-0x0000000002E40000-memory.dmp

memory/4436-19-0x0000000005520000-0x0000000005542000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j3fpgnhq.coq.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4436-26-0x0000000005EF0000-0x0000000005F56000-memory.dmp

memory/4436-20-0x0000000005E80000-0x0000000005EE6000-memory.dmp

memory/4436-31-0x00000000060B0000-0x0000000006404000-memory.dmp

C:\Users\Admin\Pictures\NTrW1mmxNG6QcC0VkG0naHIi.exe

MD5 24fe48030f7d3097d5882535b04c3fa8
SHA1 a689a999a5e62055bda8c21b1dbe92c119308def
SHA256 424a2551d356754c882d04ac16c63e6b50b80b159549d23231001f629455756e
SHA512 45a842447d5e9c10822f7d5db1192a0e8e7917e6546dab6aebe2542b5a82bedc26aa8d96e3e99de82e2d0b662fcac70d6914248371af034b763f5dd85dab0c51

C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

C:\Users\Admin\Pictures\gnWc4Me7OAzacB29H90Y1A1s.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

C:\Users\Admin\Pictures\ANPY4vcODBwkyWWhWIaWlyGr.exe

MD5 dde72ae232dc63298465861482d7bb93
SHA1 557c5dbebc35bc82280e2a744a03ce5e78b3e6fb
SHA256 0032588b8d93a807cf0f48a806ccf125677503a6fabe4105a6dc69e81ace6091
SHA512 389eb8f7b18fcdd1a6f275ff8acad211a10445ff412221796cd645c9a6458719cced553561e2b4d438783459d02e494d5140c0d85f2b3df617b7b2e031d234b2

C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe

MD5 48d0057e8cf7a96380dafd471618851b
SHA1 a0f357c1de69c52f31f0b13db4c4d9b82bba00e7
SHA256 54e325a72006f941def72ec6c2b3187c324dd4a9d65863e9264b83af340140df
SHA512 ac2822a21a3f52d091366f0ae8fe9087e7c19c3e200ff6717f6216587031fe2aa2a7ed7395bed9372d327a7d3982b6583e79e6d29a8832f702f00ae2827f7734

C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe

MD5 48d0057e8cf7a96380dafd471618851b
SHA1 a0f357c1de69c52f31f0b13db4c4d9b82bba00e7
SHA256 54e325a72006f941def72ec6c2b3187c324dd4a9d65863e9264b83af340140df
SHA512 ac2822a21a3f52d091366f0ae8fe9087e7c19c3e200ff6717f6216587031fe2aa2a7ed7395bed9372d327a7d3982b6583e79e6d29a8832f702f00ae2827f7734

memory/4436-78-0x0000000006510000-0x000000000652E000-memory.dmp

memory/4436-85-0x00000000065A0000-0x00000000065EC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

C:\Users\Admin\Pictures\6BqUkmxMyumJRlEKdhyay392.exe

MD5 48d0057e8cf7a96380dafd471618851b
SHA1 a0f357c1de69c52f31f0b13db4c4d9b82bba00e7
SHA256 54e325a72006f941def72ec6c2b3187c324dd4a9d65863e9264b83af340140df
SHA512 ac2822a21a3f52d091366f0ae8fe9087e7c19c3e200ff6717f6216587031fe2aa2a7ed7395bed9372d327a7d3982b6583e79e6d29a8832f702f00ae2827f7734

C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe

MD5 d88f367b41afa18635f0bfb34183116d
SHA1 9c5ed052125574db17b29db79e1288a2fb4cf645
SHA256 d8795171f1813169491e289f5997f267081a9df66145301f4c75b3d0c01dce3f
SHA512 8187c5f350eb23727544ed9f25f56dcf748f0a97c54b738226e88fdc86f38808768a436b1e3950e8a9774029c0ee1ac5945697488cd9cc9ec6e8a291cb81fa4b

C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe

MD5 ffb1cc96c04308e8cf27d8c8251ee01a
SHA1 2b33aa254e10f473040b8d65b53862b2bea289c4
SHA256 a8dc0238b6272da428b85bba473b20ff20346d759204b8c689b1a8af3a24a9be
SHA512 fb0df2d1c3ba98b8ff681c00a22debfc2445f39d7acd6c532681f7ef2c21d8bdc7f30306d3486182f95697d671fae601c5eb4561056d930f851d4b69c816abc0

C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe

MD5 b68feec717f5a72bbb97c92d76ba8ae2
SHA1 2a7f758345bb7029f711cc239ab11c9d97c5ce2e
SHA256 27d70a3460277e9b288d645f3b986bb9bb5da4ef171e8b5e0f673376d0e7a6be
SHA512 128b80c8e840f2ad0b375bb4de948a0325c3f0edc8bf3056d8b748667ae8dc91d8a7aeff7d8656edffc66ac81389ffcc952124e874470be22e9e473c0f6565fe

C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe

MD5 ffb1cc96c04308e8cf27d8c8251ee01a
SHA1 2b33aa254e10f473040b8d65b53862b2bea289c4
SHA256 a8dc0238b6272da428b85bba473b20ff20346d759204b8c689b1a8af3a24a9be
SHA512 fb0df2d1c3ba98b8ff681c00a22debfc2445f39d7acd6c532681f7ef2c21d8bdc7f30306d3486182f95697d671fae601c5eb4561056d930f851d4b69c816abc0

C:\Users\Admin\Pictures\AZpHYlJyszNWyfO6nnQxvDjp.exe

MD5 ffb1cc96c04308e8cf27d8c8251ee01a
SHA1 2b33aa254e10f473040b8d65b53862b2bea289c4
SHA256 a8dc0238b6272da428b85bba473b20ff20346d759204b8c689b1a8af3a24a9be
SHA512 fb0df2d1c3ba98b8ff681c00a22debfc2445f39d7acd6c532681f7ef2c21d8bdc7f30306d3486182f95697d671fae601c5eb4561056d930f851d4b69c816abc0

C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe

MD5 d88f367b41afa18635f0bfb34183116d
SHA1 9c5ed052125574db17b29db79e1288a2fb4cf645
SHA256 d8795171f1813169491e289f5997f267081a9df66145301f4c75b3d0c01dce3f
SHA512 8187c5f350eb23727544ed9f25f56dcf748f0a97c54b738226e88fdc86f38808768a436b1e3950e8a9774029c0ee1ac5945697488cd9cc9ec6e8a291cb81fa4b

C:\Users\Admin\Pictures\Ff1aKHjmOB0VKyp7mDPxHnfg.exe

MD5 d88f367b41afa18635f0bfb34183116d
SHA1 9c5ed052125574db17b29db79e1288a2fb4cf645
SHA256 d8795171f1813169491e289f5997f267081a9df66145301f4c75b3d0c01dce3f
SHA512 8187c5f350eb23727544ed9f25f56dcf748f0a97c54b738226e88fdc86f38808768a436b1e3950e8a9774029c0ee1ac5945697488cd9cc9ec6e8a291cb81fa4b

C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe

MD5 fe469d9ce18f3bd33de41b8fd8701c4d
SHA1 99411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256 b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA512 5b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9

C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe

MD5 fe469d9ce18f3bd33de41b8fd8701c4d
SHA1 99411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256 b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA512 5b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9

C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

memory/3716-190-0x0000000000400000-0x00000000004D8000-memory.dmp

memory/1576-194-0x0000000000400000-0x000000000046A000-memory.dmp

C:\Users\Admin\Pictures\o1IaXB3WNkXvyDb2M7m3NGQD.exe

MD5 fe469d9ce18f3bd33de41b8fd8701c4d
SHA1 99411eab81e0d7e8607e8fe0f715f635e541e52a
SHA256 b253f2cc3cafc35941d978a4d14b65610e641cb461e862fb0c155f3c30ce127a
SHA512 5b40c5259d01944e718bb14b8e6b994f2ea5bd391058aa8d086033cd609cb54231c7e07b4ab307ecfd5be28936e1c5576d3448504b99d9ac05c5442e5e1e85d9

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310050832188303296.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe

MD5 6172d07e0711bc23642c3b6b86e4fec7
SHA1 c49a6bb96d15baa7d58ff9808c3311454959157b
SHA256 5bd34cee3edff3bedc453b25875218a4903a26c464159630514fb464c41ec4d6
SHA512 4374911d24f78fa501c7a015eb95c57f52192e47c5b9b9eeb6b972eb3e11c59e471d69aa97af619409fd5aa6e809c6c5310aa967b6aab69eeb40dc90131f076b

C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe

MD5 6e45986a505bed78232a8867b5860ea6
SHA1 51b142a7e60eecd73c3eaa143eadda4b7e64ac4c
SHA256 c957aa07aa1dd6d58aff2431b56b2139a0c2d5d6b34d20a978767e0daab58829
SHA512 d2d8bc6179795c1c255ec5ac16817f83ff97fcd90481dbe2325a351b448c48a83af03f22ff6dda0cb6ad2401c20b81d2871068aa9e32d2747cc2f5669b440fde

C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe

MD5 6e45986a505bed78232a8867b5860ea6
SHA1 51b142a7e60eecd73c3eaa143eadda4b7e64ac4c
SHA256 c957aa07aa1dd6d58aff2431b56b2139a0c2d5d6b34d20a978767e0daab58829
SHA512 d2d8bc6179795c1c255ec5ac16817f83ff97fcd90481dbe2325a351b448c48a83af03f22ff6dda0cb6ad2401c20b81d2871068aa9e32d2747cc2f5669b440fde

memory/1228-219-0x00000000055C0000-0x0000000005782000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310050832210334600.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

C:\Users\Admin\AppData\Local\Temp\is-LNKF4.tmp\TK9bO1emDUVKksrJFdXFijIZ.tmp

MD5 83827c13d95750c766e5bd293469a7f8
SHA1 d21b45e9c672d0f85b8b451ee0e824567bb23f91
SHA256 8bd7e6b4a6be9f3887ac6439e97d3d3c8aaa27211d02ecbd925ab1df39afe7ae
SHA512 cdbdd93fc637772b12bdedb59c4fb72a291da61e8c6b0061ad2f9448e8c949543f003646b1f5ce3e1e3aebc12de27409ddd76d3874b8f4f098163a1ff328b6f0

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

C:\Users\Admin\Pictures\SBbrRfVkcjLznZqVC6o2HUu8.exe

MD5 6e45986a505bed78232a8867b5860ea6
SHA1 51b142a7e60eecd73c3eaa143eadda4b7e64ac4c
SHA256 c957aa07aa1dd6d58aff2431b56b2139a0c2d5d6b34d20a978767e0daab58829
SHA512 d2d8bc6179795c1c255ec5ac16817f83ff97fcd90481dbe2325a351b448c48a83af03f22ff6dda0cb6ad2401c20b81d2871068aa9e32d2747cc2f5669b440fde

memory/1576-205-0x0000000000400000-0x000000000046A000-memory.dmp

memory/1228-200-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/1228-196-0x0000000000720000-0x0000000000A3C000-memory.dmp

C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe

MD5 6172d07e0711bc23642c3b6b86e4fec7
SHA1 c49a6bb96d15baa7d58ff9808c3311454959157b
SHA256 5bd34cee3edff3bedc453b25875218a4903a26c464159630514fb464c41ec4d6
SHA512 4374911d24f78fa501c7a015eb95c57f52192e47c5b9b9eeb6b972eb3e11c59e471d69aa97af619409fd5aa6e809c6c5310aa967b6aab69eeb40dc90131f076b

memory/3296-187-0x0000000000F20000-0x000000000146D000-memory.dmp

C:\Users\Admin\Pictures\TK9bO1emDUVKksrJFdXFijIZ.exe

MD5 6172d07e0711bc23642c3b6b86e4fec7
SHA1 c49a6bb96d15baa7d58ff9808c3311454959157b
SHA256 5bd34cee3edff3bedc453b25875218a4903a26c464159630514fb464c41ec4d6
SHA512 4374911d24f78fa501c7a015eb95c57f52192e47c5b9b9eeb6b972eb3e11c59e471d69aa97af619409fd5aa6e809c6c5310aa967b6aab69eeb40dc90131f076b

C:\Users\Admin\Pictures\hwx1bIuw1H2ozV6lJOPyCIio.exe

MD5 823b5fcdef282c5318b670008b9e6922
SHA1 d20cd5321d8a3d423af4c6dabc0ac905796bdc6d
SHA256 712f5bb403ca4ade2d3fa47b050aac51a9f573142fd8ba8bf18f5f8144214d8d
SHA512 4377d06a71291be3e52c28a2ada0b89ff185a8887c4a75972cdc5e85d95da6538d1776bc49fb190c67b8e6497225f1d63b86793f4095c8fb990a5f6659216472

C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe

MD5 b68feec717f5a72bbb97c92d76ba8ae2
SHA1 2a7f758345bb7029f711cc239ab11c9d97c5ce2e
SHA256 27d70a3460277e9b288d645f3b986bb9bb5da4ef171e8b5e0f673376d0e7a6be
SHA512 128b80c8e840f2ad0b375bb4de948a0325c3f0edc8bf3056d8b748667ae8dc91d8a7aeff7d8656edffc66ac81389ffcc952124e874470be22e9e473c0f6565fe

C:\Users\Admin\Pictures\33oxNDrbw3BPaH2VGAsRkHpV.exe

MD5 b68feec717f5a72bbb97c92d76ba8ae2
SHA1 2a7f758345bb7029f711cc239ab11c9d97c5ce2e
SHA256 27d70a3460277e9b288d645f3b986bb9bb5da4ef171e8b5e0f673376d0e7a6be
SHA512 128b80c8e840f2ad0b375bb4de948a0325c3f0edc8bf3056d8b748667ae8dc91d8a7aeff7d8656edffc66ac81389ffcc952124e874470be22e9e473c0f6565fe

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

memory/4600-227-0x0000000000F20000-0x000000000146D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-LLKNH.tmp\idp.dll

MD5 8f995688085bced38ba7795f60a5e1d3
SHA1 5b1ad67a149c05c50d6e388527af5c8a0af4343a
SHA256 203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006
SHA512 043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

memory/1228-244-0x00000000055B0000-0x00000000055C0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310050832224552796.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310050832224552796.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

memory/2796-251-0x00000000006B0000-0x0000000000BFD000-memory.dmp

memory/2952-247-0x0000000000680000-0x0000000000681000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp

MD5 ebec033f87337532b23d9398f649eec9
SHA1 c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA256 82fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA512 3875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

memory/3504-229-0x00007FF68DF20000-0x00007FF68E00C000-memory.dmp

memory/1976-252-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/4436-254-0x0000000002E30000-0x0000000002E40000-memory.dmp

memory/2796-255-0x00000000006B0000-0x0000000000BFD000-memory.dmp

memory/4436-257-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/2336-258-0x00000000008B0000-0x00000000008B1000-memory.dmp

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

memory/4968-262-0x0000000000F20000-0x000000000146D000-memory.dmp

memory/4436-265-0x0000000002E30000-0x0000000002E40000-memory.dmp

memory/3380-269-0x00007FF7D2960000-0x00007FF7D2EA3000-memory.dmp

memory/4436-272-0x0000000002E30000-0x0000000002E40000-memory.dmp

C:\Users\Admin\Pictures\kFDhg7wUmCkcZZ4Ws08ZSyO5.exe

MD5 46fb0790771c2d3c96eaee62892491f1
SHA1 5edfcef7994e053b74348df1d2fa1c3af8fcfb07
SHA256 a9f70ab4238df57858dcfe2f5a8c8ee45395c9ded3084bc1bd0ce806934257b9
SHA512 3a52d9004030063ed20569ce8594a798d5d2d683670be4905cf33833f54df271bbf75faa8353ca93f2d4b1837398f6db3eb2d46af3f2eab5ec05fbf562c9f031

memory/4436-282-0x00000000074A0000-0x00000000074D2000-memory.dmp

memory/4436-284-0x000000006F090000-0x000000006F0DC000-memory.dmp

memory/4436-295-0x0000000007480000-0x000000000749E000-memory.dmp

memory/212-296-0x0000000000F20000-0x000000000146D000-memory.dmp

memory/4436-301-0x00000000076E0000-0x0000000007783000-memory.dmp

memory/4436-302-0x000000007F670000-0x000000007F680000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-ANDBI.tmp\_isetup\_setup64.tmp

MD5 e4211d6d009757c078a9fac7ff4f03d4
SHA1 019cd56ba687d39d12d4b13991c9a42ea6ba03da
SHA256 388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95
SHA512 17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 2901b829a2422bbcfda6ae5c95c2d247
SHA1 2b8504ea634a7e1d33e80875c28c716410dbbc8a
SHA256 fe522fcfb2065cec789c2b8ac27da250e77a16f11515aecccfcbdaed16953d8a
SHA512 baf6aa9afcbfd5aabbe590f76d6d53de23fe434717a2fa04ed00ff5619615bec2423de2c8433aec5be01fcb9808e3b09833438544a99049387f8e9ca6daf1833

C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

MD5 2901b829a2422bbcfda6ae5c95c2d247
SHA1 2b8504ea634a7e1d33e80875c28c716410dbbc8a
SHA256 fe522fcfb2065cec789c2b8ac27da250e77a16f11515aecccfcbdaed16953d8a
SHA512 baf6aa9afcbfd5aabbe590f76d6d53de23fe434717a2fa04ed00ff5619615bec2423de2c8433aec5be01fcb9808e3b09833438544a99049387f8e9ca6daf1833

memory/4436-310-0x0000000007E80000-0x00000000084FA000-memory.dmp

memory/4436-311-0x0000000007830000-0x000000000784A000-memory.dmp

memory/1576-285-0x0000000000400000-0x000000000046A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\141987721394

MD5 3b58eb2f7aa018f31155454a57287dd7
SHA1 b6d0405d4839802350aefc165a7dba7eace7d083
SHA256 4919b8b3d8d5dfda5a41c02f94e41e312eab1686bd7c97cc296700c1b01a7e07
SHA512 1b9dbca2a78b6753450fb1313ed921dc81f62b2650adf1fe1367d5207d382029f9e0109a9d82ea5a3ac7a0ff00c85437e0f6761c251960f4b6f4e6a199b84ba7

memory/3716-283-0x0000000000400000-0x00000000004D8000-memory.dmp

memory/3296-273-0x0000000000F20000-0x000000000146D000-memory.dmp

memory/4436-321-0x00000000078A0000-0x00000000078AA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_231005083228220212.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

memory/1976-268-0x0000000004F70000-0x0000000004F80000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Opera_installer_2310050832267204968.dll

MD5 e23e7fc90656694198494310a901921a
SHA1 341540eaf106932d51a3ac56cb07eeb6924f5ebd
SHA256 bf1aa65c0b76c41f6c27c89a527720958505e5568a63a7530494fb89e8fdcf75
SHA512 d0a437dac1af3587bc85a075d2ec3cf6e6cc23cdb6f4adfe8e87502c39c91807e7833b42aca63a85c0d329de89e348f71700b0ba9fca37fdf167f8b8ec25cf2d

C:\Users\Admin\AppData\Local\Temp\is-IC11C.tmp\o1IaXB3WNkXvyDb2M7m3NGQD.tmp

MD5 ebec033f87337532b23d9398f649eec9
SHA1 c4335168ec2f70621f11f614fe24ccd16d15c9fb
SHA256 82fdd2282cf61cfa6155c51a82c4db79487ffeb377d0245d513edeb44d731c16
SHA512 3875c2dd9bbeb5be00c2ccf8391bcb92d328a3294ce5c2d31fd09f20d80e12bd610d5473dfc2e13962578e4bb75336615cdf16251489a31ecbe4873d09cf1b11

memory/2952-323-0x0000000000400000-0x0000000000513000-memory.dmp

memory/4436-327-0x0000000007AB0000-0x0000000007B46000-memory.dmp

memory/1228-336-0x0000000006840000-0x0000000006D6C000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

MD5 60fe01df86be2e5331b0cdbe86165686
SHA1 2a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256 c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512 ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

MD5 351af01b8431a98a22fc760c2e5c54e4
SHA1 c0e2a0602eb5b769c84e59fa472bbaa324b34088
SHA256 e043728eb7edde2501ff89d62ed2712b83aa1d6034a4f2ed495a4744d4ad2193
SHA512 46d0c888748beb0ce6650b6093f9f99a9757ce9bc1df8f560dda63660a7318361f5c5a768ed250eff94ba6fec9533bff66cd0f105e9057e08db67029860b29dc

memory/2336-342-0x0000000000400000-0x000000000071C000-memory.dmp

memory/4436-348-0x0000000007A30000-0x0000000007A41000-memory.dmp

memory/4968-355-0x0000000000F20000-0x000000000146D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-LLKNH.tmp\8758677____.exe

MD5 65e5ccda7c002e24eb090ad1c9602b0f
SHA1 2daf02ebb81660eb07cff159d9bdfd7f544c2c13
SHA256 a29e50e997346fe1b47d0c93aafc4d9e08642c199d8ec1ef79f6d09e1618c439
SHA512 c46f1eb108b79011f63ca7907e8536e78034d1be26510b9cf0ffd4b69d46adcd084467bfb1419e7e069cda27d5e61b65092d58bec7c44c4939058ab75482525e

memory/3380-361-0x00007FF7D2960000-0x00007FF7D2EA3000-memory.dmp

memory/3512-362-0x0000021AA11C0000-0x0000021AA1244000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-LLKNH.tmp\8758677____.exe

MD5 65e5ccda7c002e24eb090ad1c9602b0f
SHA1 2daf02ebb81660eb07cff159d9bdfd7f544c2c13
SHA256 a29e50e997346fe1b47d0c93aafc4d9e08642c199d8ec1ef79f6d09e1618c439
SHA512 c46f1eb108b79011f63ca7907e8536e78034d1be26510b9cf0ffd4b69d46adcd084467bfb1419e7e069cda27d5e61b65092d58bec7c44c4939058ab75482525e

memory/3512-367-0x0000021AA15E0000-0x0000021AA1642000-memory.dmp

memory/2336-372-0x0000000000400000-0x000000000071C000-memory.dmp

memory/2952-369-0x0000000000400000-0x0000000000513000-memory.dmp

memory/3512-374-0x0000021ABB700000-0x0000021ABB75E000-memory.dmp

memory/1228-376-0x00000000055B0000-0x00000000055C0000-memory.dmp

memory/3504-377-0x00000000034B0000-0x0000000003621000-memory.dmp

memory/1228-375-0x0000000074610000-0x0000000074DC0000-memory.dmp

memory/3504-378-0x0000000003630000-0x0000000003761000-memory.dmp

memory/1228-390-0x00000000055B0000-0x00000000055C0000-memory.dmp

memory/3512-389-0x00007FFD7E200000-0x00007FFD7ECC1000-memory.dmp

memory/2544-388-0x00000230BE5E0000-0x00000230BE602000-memory.dmp

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

MD5 3945df42a2cbe47502705ecde2ff2a87
SHA1 1545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256 c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA512 0850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

MD5 3945df42a2cbe47502705ecde2ff2a87
SHA1 1545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256 c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA512 0850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead

C:\Users\Admin\AppData\Roaming\DigitalPulse\DigitalPulseService.exe

MD5 3945df42a2cbe47502705ecde2ff2a87
SHA1 1545a5a72ffaf6c6c8e9df0ca6aa8d2aff5cc5b5
SHA256 c767ecc88396047716862b881480450b517715bfc7bdd12c878cf2d54262f1f8
SHA512 0850ac896ae1d8e766d34746294d212fe071c45e0f740085d37236e0caa05d823ad4ddfeba2baf1bcc71b20612058f08dbafd62fb3deb1a8ed1074d2eae71ead

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

MD5 5b11fd821061ff07a306800cf42a45f8
SHA1 ba659be366bb3827061eee6a21df3c00f1265371
SHA256 5802fe2f0af337fe409e3f9e9dc034dcf79289de9f95dce161132820b1f6de4f
SHA512 98b0349261ed2400c11880b0f4054bab14bc5ed704be0c81d18dfbf3b0e0bddd7d93ae45fb5d35a5c20a2f13a6780402d45b5fc6367ed5f654fd1dcb1a3c9cb9

memory/2336-413-0x0000000000400000-0x000000000071C000-memory.dmp

C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe

MD5 f8c7c7d63fe2d74fa007ace2598ff9cb
SHA1 23412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256 fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA512 0dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258

memory/3716-443-0x0000000000400000-0x00000000004D8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe

MD5 12b9ea8a702a9737e186f8057c5b4a3a
SHA1 4184e9decf6bbc584a822098249e905644c4def2
SHA256 0ede12df938accd1be25420696db2969815ca0a2cd22d0c68a3352faa88f1001
SHA512 f62f17cddde83b96e416a198abde4ece29f6e26bc95ee72f151ab05594859a1cf69afb918f4f1a0ef5d6a660b2d2cead419f9b396698512a8d32bb877ce50713

C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe

MD5 f8c7c7d63fe2d74fa007ace2598ff9cb
SHA1 23412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256 fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA512 0dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258

C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe.config

MD5 98d2687aec923f98c37f7cda8de0eb19
SHA1 f6dcfcdcfe570340ecdbbd9e2a61f3cb4f281ba7
SHA256 8a94163256a722ef8cc140bcd115a5b8f8725c04fe158b129d47be81cb693465
SHA512 95c7290d59749df8df495e04789c1793265e0f34e0d091df5c0d4aefe1af4c8ac1f5460f1f198fc28c4c8c900827b8f22e2851957bbaea5914ea962b3a1d0590

C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe

MD5 12b9ea8a702a9737e186f8057c5b4a3a
SHA1 4184e9decf6bbc584a822098249e905644c4def2
SHA256 0ede12df938accd1be25420696db2969815ca0a2cd22d0c68a3352faa88f1001
SHA512 f62f17cddde83b96e416a198abde4ece29f6e26bc95ee72f151ab05594859a1cf69afb918f4f1a0ef5d6a660b2d2cead419f9b396698512a8d32bb877ce50713

C:\Program Files\Microsoft Office 15\NEHMFAXFDT\lightcleaner.exe

MD5 f8c7c7d63fe2d74fa007ace2598ff9cb
SHA1 23412ed810c3830ca9bab8cd25c61cf7d70d0b5a
SHA256 fd02825ce17effb7d70ca2e9907647128241610bb1dce11a70f6f1a19d052047
SHA512 0dfb9bcd6dd8ce3f561b885989ae4c2e78c33f110aa1bf48c4c42c467db672af422ebdbf2ef66fe6f2e21307c036fbfa885e58fc3c4fa1f9677139e818855258

C:\Users\Admin\AppData\Local\Temp\1e-8ffde-728-38bac-11be3125ba9e9\Tybyjocinae.exe

MD5 12b9ea8a702a9737e186f8057c5b4a3a
SHA1 4184e9decf6bbc584a822098249e905644c4def2
SHA256 0ede12df938accd1be25420696db2969815ca0a2cd22d0c68a3352faa88f1001
SHA512 f62f17cddde83b96e416a198abde4ece29f6e26bc95ee72f151ab05594859a1cf69afb918f4f1a0ef5d6a660b2d2cead419f9b396698512a8d32bb877ce50713

C:\Users\Admin\AppData\Local\Temp\is-OM35R.tmp\lightcleaner.tmp

MD5 7bf46cc89fa0ea81ece9fc0eb9d38807
SHA1 803040acb0d2dda44091c23416586aaeeed04e4a
SHA256 31793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649
SHA512 371c053ae2e4a0ab530b597c5cb9e07a35b9b391b79afa06b9c7bc3b4c172e8ffbd83aefd931c5eb39c9a4e8c991f74dfff94eb9014be5cb9af3edef7a335d41

memory/2952-484-0x0000000000400000-0x0000000000513000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-NT56T.tmp\_isetup\_shfoldr.dll

MD5 92dc6ef532fbb4a5c3201469a5b5eb63
SHA1 3e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA256 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA512 9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

memory/1576-495-0x0000000000400000-0x000000000046A000-memory.dmp

memory/4052-501-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\is-OM35R.tmp\lightcleaner.tmp

MD5 7bf46cc89fa0ea81ece9fc0eb9d38807
SHA1 803040acb0d2dda44091c23416586aaeeed04e4a
SHA256 31793ff8cdff66c5eb829ff1637d12b7afebd5fc95794946baccb6e96bf54649
SHA512 371c053ae2e4a0ab530b597c5cb9e07a35b9b391b79afa06b9c7bc3b4c172e8ffbd83aefd931c5eb39c9a4e8c991f74dfff94eb9014be5cb9af3edef7a335d41

memory/5396-523-0x0000000000400000-0x00000000004BD000-memory.dmp

memory/4052-531-0x0000000000400000-0x0000000000414000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1ff8bec27e\nhdues.exe

MD5 aebaf57299cd368f842cfa98f3b1658c
SHA1 cb4642f3425e8827e54a95c99a4b7aa1ae91d9b7
SHA256 d9131553ec5337523055e425db82038f4250fa60ea581bcc6921716477c652ce
SHA512 989ffc32678ae1505c3fb5befa9c281bfc87e33330bb5a23010a57766c4ce6dadbde86bd2a097ed8ac23195645abc50577dfe69191bb4bccdc77861488f6572e

memory/3380-535-0x00007FF7D2960000-0x00007FF7D2EA3000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

MD5 3a2eac0a8e1ac96ca5535c4e0759e5bb
SHA1 2f2bc3ec9a129665c3ce3a7d1a52270cb78b7c91
SHA256 4e3959b2c8b9007f57258ac9ab1d9a86b5d5d08f68081c8d40ad05c6ee879b43
SHA512 91f7e5dd3c1c86269bc708a38d22e4bb41123017b0f6149641422372751b6b1393a442d026dab4a586f79c66c3b4a5f7e7881e829365e351aa24bfdbe2ec22c8

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d8b126d24a5915ef8f69e3a6280cbc6d
SHA1 9389010987c3b38877750a00dafda2f112204ad4
SHA256 072117d37780a1093eef1019b48013a675cfb381cb45110c4dd326a588691409
SHA512 1e9d85b79794547e83ce40a2374c6a06161aa865fb6161f72e127aa45c1abbcd213bb23490bbb59e44e8ea9b9da97667b83611ed675f7e43c845706b1d7b4706

C:\Users\Admin\AppData\Local\Temp\xyvvnnvseiqa.xml

MD5 546d67a48ff2bf7682cea9fac07b942e
SHA1 a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256 eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA512 10d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\opera_package

MD5 1b4af0087d5df808f26f57534a532aa9
SHA1 d32d1fcecbef0e361d41943477a1df25114ce7af
SHA256 22c21ff3d0f5af1c2191318ea12921cfd5434afc32c0641d58fd3f3a218ea111
SHA512 e5a32022fd08464a24c89819703fd9f05c75bd5b47392aae186b96a8e1146fb0c98cda14bfec9a1393c0cdde706db77d32e7a9a86e4611c72103265982d31e07

C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll

MD5 4bd56443d35c388dbeabd8357c73c67d
SHA1 26248ce8165b788e2964b89d54d1f1125facf8f9
SHA256 021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512 100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192

C:\Users\Admin\Pictures\Bz63f7HSvaKWbT9SRuqWWUTP.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

memory/3380-569-0x00007FF7D2960000-0x00007FF7D2EA3000-memory.dmp

C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll

MD5 4bd56443d35c388dbeabd8357c73c67d
SHA1 26248ce8165b788e2964b89d54d1f1125facf8f9
SHA256 021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512 100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192

C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll

MD5 4bd56443d35c388dbeabd8357c73c67d
SHA1 26248ce8165b788e2964b89d54d1f1125facf8f9
SHA256 021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512 100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192

C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll

MD5 49b3faf5b84f179885b1520ffa3ef3da
SHA1 c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256 b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512 018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742

C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll

MD5 49b3faf5b84f179885b1520ffa3ef3da
SHA1 c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256 b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512 018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742

C:\Users\Admin\AppData\Roaming\a967e0f403b652\clip64.dll

MD5 49b3faf5b84f179885b1520ffa3ef3da
SHA1 c1ac12aeca413ec45a4f09aa66f0721b4f80413e
SHA256 b89189d3fca0a41aee9d4582a8efbe820d49e87224c325b4a0f4806d96bf86a5
SHA512 018d531b3328267ecaebcb9f523c386c8aa36bf29e7b2e0f61bd96a0f7f2d03c7f25f878c373fbce7e44c8d5512e969b816ed9c72edb44afa302670c652de742

C:\Users\Admin\AppData\Roaming\a967e0f403b652\cred64.dll

MD5 4bd56443d35c388dbeabd8357c73c67d
SHA1 26248ce8165b788e2964b89d54d1f1125facf8f9
SHA256 021882d0f0cdc7275247b2ef6cc02a28cf0f02971de5b9afa947ffe7b63fb867
SHA512 100dc81a0d74725d74ed3801d7828c53c36315179427e88404cb482f83afc0e8766fd86642b4396b37dd7e3262d66d7138c8b4a175354af98254869fbdd43192

C:\Program Files\Google\Chrome\updater.exe

MD5 7af78ecfa55e8aeb8b699076266f7bcf
SHA1 432c9deb88d92ae86c55de81af26527d7d1af673
SHA256 f7284ade2ca0aeb432cf1fdae5ab0c724f81d10b914f6d4c2c15ef0f60ff316e
SHA512 3c0ae6b6e4a896da52faff4fb2e958abb2856330cbba6ff4b7a59e7512475e1739cccf2cfda7dde492f381d3225263bc77e3154983e86933fa074696e92a059e

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\additional_file0.tmp

MD5 79ef7e63ffe3005c8edacaa49e997bdc
SHA1 9a236cb584c86c0d047ce55cdda4576dd40b027e
SHA256 388a4c959063e7edf133058e2cf797574bed808776a7c9a0307aaeb718ff7bd1
SHA512 59ee17f0f452617bcd1a4e42947310c52c21e88d31f1d6a09ebdb6ab400fcb1f997627a0f97fa185e58683d65a45425f8a7ec698f63a84d91c838e0f7e899094

C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202310050832251\assistant\Assistant_100.0.4815.21_Setup.exe_sfx.exe

MD5 79ef7e63ffe3005c8edacaa49e997bdc
SHA1 9a236cb584c86c0d047ce55cdda4576dd40b027e
SHA256 388a4c959063e7edf133058e2cf797574bed808776a7c9a0307aaeb718ff7bd1
SHA512 59ee17f0f452617bcd1a4e42947310c52c21e88d31f1d6a09ebdb6ab400fcb1f997627a0f97fa185e58683d65a45425f8a7ec698f63a84d91c838e0f7e899094

memory/2888-626-0x00007FF75FDC0000-0x00007FF760303000-memory.dmp

memory/2888-655-0x00007FF75FDC0000-0x00007FF760303000-memory.dmp

memory/5712-661-0x00000194B8250000-0x00000194B83BA000-memory.dmp

memory/2192-667-0x00000000011E0000-0x0000000001200000-memory.dmp

memory/2888-668-0x00007FF75FDC0000-0x00007FF760303000-memory.dmp