Analysis

  • max time kernel
    302s
  • max time network
    306s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-11-2023 22:17

General

  • Target

    02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe

  • Size

    14.8MB

  • MD5

    11c31a8b40db0bac16f603ca47e5b0cf

  • SHA1

    f1160754ef8dea27aae887e426bd3b5c0f90722e

  • SHA256

    02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0

  • SHA512

    cfaf78e625d5ed6254d3fb45bd786a937eea9b95645f58bfd37904bfe4991e2599de82266583ce7b367abd20cf87b1b52166918e02264bd5bae0d337d4fa6a7a

  • SSDEEP

    393216:rexbl6e6TvVmR/i+W7F/+8HVi5vcPF07zvrRl:rexZp0mRa+W7F/p1i5KF0PrR

Malware Config

Extracted

Family

smokeloader

Botnet

up3

Extracted

Family

smokeloader

Version

2020

C2

http://host-file-host6.com/

http://host-host-file8.com/

rc4.i32
rc4.i32

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 11 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 11 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Stops running service(s) 3 TTPs
  • Drops startup file 7 IoCs
  • Executes dropped EXE 31 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 21 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 8 IoCs
  • Launches sc.exe 11 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3264
    • C:\Users\Admin\AppData\Local\Temp\02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe
      "C:\Users\Admin\AppData\Local\Temp\02c6afc6297dce33b1a7b9db1be1002387d0744222471657c224b763b06e03c0.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4344
      • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe
        "C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\Broom.exe
          C:\Users\Admin\AppData\Local\Temp\Broom.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4436
      • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
        "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
        3⤵
        • Executes dropped EXE
        PID:3920
        • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe
          "C:\Users\Admin\AppData\Local\Temp\toolspub2.exe"
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          PID:2256
      • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
        "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3296
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -nologo -noprofile
          4⤵
            PID:3748
          • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe
            "C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe"
            4⤵
            • Windows security bypass
            • Executes dropped EXE
            • Windows security modification
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            PID:4468
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              5⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              PID:3248
            • C:\Windows\System32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              5⤵
                PID:1060
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  6⤵
                  • Modifies Windows Firewall
                  PID:5028
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Drops file in System32 directory
                PID:3756
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                  PID:1816
            • C:\Users\Admin\AppData\Local\Temp\Random.exe
              "C:\Users\Admin\AppData\Local\Temp\Random.exe"
              3⤵
              • UAC bypass
              • Windows security bypass
              • Executes dropped EXE
              • Windows security modification
              • Checks whether UAC is enabled
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4544
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Random.exe" -Force
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1112
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                4⤵
                • Drops startup file
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4712
                • C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe
                  "C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4540
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4992
                  • C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe
                    "C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe"
                    6⤵
                    • Windows security bypass
                    • Executes dropped EXE
                    • Windows security modification
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:4016
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      7⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:2972
                    • C:\Windows\System32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      7⤵
                        PID:4112
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          8⤵
                          • Modifies Windows Firewall
                          PID:2496
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        7⤵
                          PID:3836
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          7⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:3860
                        • C:\Windows\rss\csrss.exe
                          C:\Windows\rss\csrss.exe
                          7⤵
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Manipulates WinMonFS driver.
                          • Drops file in Windows directory
                          PID:3280
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            8⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            PID:1304
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                            8⤵
                            • Creates scheduled task(s)
                            • Modifies data under HKEY_USERS
                            PID:2496
                            • C:\Windows\System32\Conhost.exe
                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              9⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:1816
                          • C:\Windows\SYSTEM32\schtasks.exe
                            schtasks /delete /tn ScheduledUpdate /f
                            8⤵
                              PID:4952
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              8⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              PID:2836
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              8⤵
                              • Drops file in System32 directory
                              PID:2604
                            • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                              C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                              8⤵
                              • Executes dropped EXE
                              PID:1300
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              8⤵
                              • Creates scheduled task(s)
                              PID:1744
                            • C:\Windows\windefender.exe
                              "C:\Windows\windefender.exe"
                              8⤵
                              • Executes dropped EXE
                              PID:368
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                9⤵
                                  PID:3364
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                    10⤵
                                    • Launches sc.exe
                                    PID:4456
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                powershell -nologo -noprofile
                                8⤵
                                • Drops file in System32 directory
                                • Modifies data under HKEY_USERS
                                PID:2236
                              • C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                C:\Users\Admin\AppData\Local\Temp\csrss\f801950a962ddba14caaa44bf084b55c.exe
                                8⤵
                                • Executes dropped EXE
                                PID:1796
                                • C:\Windows\SYSTEM32\schtasks.exe
                                  schtasks /delete /tn "csrss" /f
                                  9⤵
                                    PID:1112
                                  • C:\Windows\SYSTEM32\schtasks.exe
                                    schtasks /delete /tn "ScheduledUpdate" /f
                                    9⤵
                                      PID:1320
                            • C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe
                              "C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe"
                              5⤵
                              • Executes dropped EXE
                              • Checks processor information in registry
                              PID:4440
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe" & del "C:\ProgramData\*.dll"" & exit
                                6⤵
                                  PID:1476
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 5
                                    7⤵
                                    • Delays execution with timeout.exe
                                    PID:4600
                              • C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe
                                "C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:3796
                                • C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp" /SL5="$5022E,2617171,76288,C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in Program Files directory
                                  PID:4008
                              • C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe
                                "C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:488
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -nologo -noprofile
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2596
                                • C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe
                                  "C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe"
                                  6⤵
                                  • Windows security bypass
                                  • Executes dropped EXE
                                  • Windows security modification
                                  • Adds Run key to start application
                                  • Checks for VirtualBox DLLs, possible anti-VM trick
                                  • Drops file in Windows directory
                                  • Modifies data under HKEY_USERS
                                  PID:2896
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -nologo -noprofile
                                    7⤵
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    PID:1892
                                  • C:\Windows\System32\cmd.exe
                                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                    7⤵
                                      PID:4996
                                      • C:\Windows\system32\netsh.exe
                                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                        8⤵
                                        • Modifies Windows Firewall
                                        PID:404
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      7⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:1624
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -nologo -noprofile
                                      7⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:4824
                                • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe
                                  "C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --silent --allusers=0
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Enumerates connected drives
                                  • Modifies system certificate store
                                  • Suspicious use of WriteProcessMemory
                                  PID:4480
                                  • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe
                                    C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6e4474f0,0x6e447500,0x6e44750c
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2708
                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\a3AqhnOM26HOLUbeJBrM7Cj8.exe
                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --version
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:2136
                                  • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe
                                    "C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4480 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231126221806" --session-guid=df08768b-df62-401f-8184-11ff20f8b010 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=5404000000000000
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Enumerates connected drives
                                    • Suspicious use of WriteProcessMemory
                                    PID:2352
                                    • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe
                                      C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.21 --initial-client-data=0x2c4,0x2c8,0x2cc,0x294,0x2d0,0x6d5f74f0,0x6d5f7500,0x6d5f750c
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1808
                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4100
                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe
                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe" --version
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:3752
                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe
                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x248,0x24c,0x250,0x238,0x254,0x1391588,0x1391598,0x13915a4
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:5108
                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe
                              "C:\Users\Admin\AppData\Local\Temp\latestX.exe"
                              3⤵
                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              PID:348
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3716
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                            2⤵
                              PID:3188
                              • C:\Windows\System32\sc.exe
                                sc stop UsoSvc
                                3⤵
                                • Launches sc.exe
                                PID:2704
                              • C:\Windows\System32\sc.exe
                                sc stop WaaSMedicSvc
                                3⤵
                                • Launches sc.exe
                                PID:2372
                              • C:\Windows\System32\sc.exe
                                sc stop wuauserv
                                3⤵
                                • Launches sc.exe
                                PID:4112
                              • C:\Windows\System32\sc.exe
                                sc stop bits
                                3⤵
                                • Launches sc.exe
                                PID:4520
                              • C:\Windows\System32\sc.exe
                                sc stop dosvc
                                3⤵
                                • Launches sc.exe
                                PID:1760
                            • C:\Windows\System32\cmd.exe
                              C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                              2⤵
                                PID:4304
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -hibernate-timeout-ac 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1476
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4520
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -standby-timeout-ac 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4612
                                • C:\Windows\System32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3940
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2988
                              • C:\Windows\System32\schtasks.exe
                                C:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"
                                2⤵
                                  PID:1496
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  2⤵
                                  • Drops file in System32 directory
                                  • Modifies data under HKEY_USERS
                                  PID:4584
                                • C:\Windows\System32\cmd.exe
                                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  2⤵
                                    PID:4648
                                    • C:\Windows\System32\sc.exe
                                      sc stop UsoSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:2144
                                    • C:\Windows\System32\sc.exe
                                      sc stop WaaSMedicSvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:2100
                                    • C:\Windows\System32\sc.exe
                                      sc stop wuauserv
                                      3⤵
                                      • Launches sc.exe
                                      PID:4500
                                    • C:\Windows\System32\sc.exe
                                      sc stop bits
                                      3⤵
                                      • Launches sc.exe
                                      PID:1300
                                    • C:\Windows\System32\sc.exe
                                      sc stop dosvc
                                      3⤵
                                      • Launches sc.exe
                                      PID:3456
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#nvjdnn#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                    2⤵
                                    • Drops file in System32 directory
                                    • Modifies data under HKEY_USERS
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3748
                                    • C:\Windows\System32\Conhost.exe
                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      3⤵
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:3836
                                  • C:\Windows\System32\cmd.exe
                                    C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                    2⤵
                                      PID:2416
                                      • C:\Windows\System32\powercfg.exe
                                        powercfg /x -hibernate-timeout-ac 0
                                        3⤵
                                          PID:424
                                        • C:\Windows\System32\powercfg.exe
                                          powercfg /x -hibernate-timeout-dc 0
                                          3⤵
                                            PID:4056
                                          • C:\Windows\System32\powercfg.exe
                                            powercfg /x -standby-timeout-ac 0
                                            3⤵
                                              PID:1192
                                            • C:\Windows\System32\powercfg.exe
                                              powercfg /x -standby-timeout-dc 0
                                              3⤵
                                                PID:896
                                            • C:\Windows\System32\conhost.exe
                                              C:\Windows\System32\conhost.exe
                                              2⤵
                                                PID:4324
                                              • C:\Windows\explorer.exe
                                                C:\Windows\explorer.exe
                                                2⤵
                                                • Modifies data under HKEY_USERS
                                                PID:3568
                                            • C:\Program Files\Google\Chrome\updater.exe
                                              "C:\Program Files\Google\Chrome\updater.exe"
                                              1⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Drops file in Drivers directory
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Drops file in Program Files directory
                                              PID:4420
                                            • C:\Users\Admin\AppData\Roaming\ifsubgf
                                              C:\Users\Admin\AppData\Roaming\ifsubgf
                                              1⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              PID:2304
                                              • C:\Users\Admin\AppData\Roaming\ifsubgf
                                                C:\Users\Admin\AppData\Roaming\ifsubgf
                                                2⤵
                                                • Executes dropped EXE
                                                • Checks SCSI registry key(s)
                                                • Suspicious behavior: MapViewOfSection
                                                PID:1636
                                            • C:\Windows\windefender.exe
                                              C:\Windows\windefender.exe
                                              1⤵
                                              • Executes dropped EXE
                                              • Modifies data under HKEY_USERS
                                              PID:3468

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Google\Chrome\updater.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                              Filesize

                                              3KB

                                              MD5

                                              8592ba100a78835a6b94d5949e13dfc1

                                              SHA1

                                              63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                              SHA256

                                              fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                              SHA512

                                              87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              1c19c16e21c97ed42d5beabc93391fc5

                                              SHA1

                                              8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                              SHA256

                                              1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                              SHA512

                                              7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                              Filesize

                                              45KB

                                              MD5

                                              0b5d94d20be9eecbaed3dddd04143f07

                                              SHA1

                                              c677d0355f4cc7301075a554adc889bce502e15a

                                              SHA256

                                              3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

                                              SHA512

                                              395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              16e723c2c2ab1bc4a17752bf53bd0926

                                              SHA1

                                              41e2c76be50cdcd25465705ac117ba1571885499

                                              SHA256

                                              86e573464c96c03ba2d43834b4c8f221a5e234fabe11373bf946c5ef62507fec

                                              SHA512

                                              d49de3977c40fa19369d444a12ca385d4152b845e6ceb33b1fe851e74b244dcaab20b31c1211d52cc57ba9ddfc48166291442643f8ef07a78bcfc653e5844599

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              449266f209ce9b22193537d0595776f0

                                              SHA1

                                              6bfb370e407e5dd3bf610b6bb1500ac41aeb92ae

                                              SHA256

                                              3d088ba546df4fb80a82b4506dcaaaa4955fbe96b217290316768260edd0aa61

                                              SHA512

                                              6ef70dedecc09be5f6a2ad87a8a08f6755bfac2d067d00a235271d3208b173dbe76224c6831387accbe7f1a08846e87fb2098e735f8ba67cd021939302ec7e1f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              168704212dbb5d60b17c0aea74afca7b

                                              SHA1

                                              eb6d0d0c44577f2067e94af8bbcfef1a459cfc1d

                                              SHA256

                                              97315b3f1a0373160a695e6efd8f92f9302d74d3b1aae919b3137e98e3f97f0f

                                              SHA512

                                              66777eb47487f4a1ecbc20d31d227be10ae791d96430b729b76eaebeef652e757ad1ebedb67f1465871ac918b22692088e8d717f08c1dad1d4b2b27d0819f48e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              168704212dbb5d60b17c0aea74afca7b

                                              SHA1

                                              eb6d0d0c44577f2067e94af8bbcfef1a459cfc1d

                                              SHA256

                                              97315b3f1a0373160a695e6efd8f92f9302d74d3b1aae919b3137e98e3f97f0f

                                              SHA512

                                              66777eb47487f4a1ecbc20d31d227be10ae791d96430b729b76eaebeef652e757ad1ebedb67f1465871ac918b22692088e8d717f08c1dad1d4b2b27d0819f48e

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\additional_file0.tmp

                                              Filesize

                                              1.9MB

                                              MD5

                                              b0f128c3579e6921cfff620179fb9864

                                              SHA1

                                              60e19c987a96182206994ffd509d2849fdb427e3

                                              SHA256

                                              1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                              SHA512

                                              17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              b0f128c3579e6921cfff620179fb9864

                                              SHA1

                                              60e19c987a96182206994ffd509d2849fdb427e3

                                              SHA256

                                              1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                              SHA512

                                              17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              b0f128c3579e6921cfff620179fb9864

                                              SHA1

                                              60e19c987a96182206994ffd509d2849fdb427e3

                                              SHA256

                                              1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                                              SHA512

                                              17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe

                                              Filesize

                                              2.1MB

                                              MD5

                                              34afbc4605531efdbe6f6ce57f567c0a

                                              SHA1

                                              6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                                              SHA256

                                              0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                                              SHA512

                                              577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\assistant_installer.exe

                                              Filesize

                                              2.1MB

                                              MD5

                                              34afbc4605531efdbe6f6ce57f567c0a

                                              SHA1

                                              6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                                              SHA256

                                              0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                                              SHA512

                                              577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbgcore.DLL

                                              Filesize

                                              166KB

                                              MD5

                                              5a6cd2117967ec78e7195b6ee10fc4da

                                              SHA1

                                              72d929eeb50dd58861a1d4cf13902c0b89fadc34

                                              SHA256

                                              a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                                              SHA512

                                              07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbghelp.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              861a07bcf2a5cb0dda1aaf6dfcb57b26

                                              SHA1

                                              a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                              SHA256

                                              7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                              SHA512

                                              062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\opera_package

                                              Filesize

                                              103.2MB

                                              MD5

                                              cd9f0e806df2940eb154570ca58a807c

                                              SHA1

                                              d2bdb70ad13344f3813f467c229a50fd8e17632a

                                              SHA256

                                              71250e7a474c08ea862cf870a07a9e98fad75acc15a2b1cf34775da27650fc51

                                              SHA512

                                              2e132053cc6238aaa9cd05fa8520b89412d27ab85b71bcb00b8d71ed207cd34115f8bcb272b617824dc9907297d034d736042a3a55be566101d4fd3fbf80ac91

                                            • C:\Users\Admin\AppData\Local\Temp\Broom.exe

                                              Filesize

                                              5.3MB

                                              MD5

                                              00e93456aa5bcf9f60f84b0c0760a212

                                              SHA1

                                              6096890893116e75bd46fea0b8c3921ceb33f57d

                                              SHA256

                                              ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

                                              SHA512

                                              abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                              Filesize

                                              2.3MB

                                              MD5

                                              cba9c1d1fcbf999d9ccb04050c5c5154

                                              SHA1

                                              554e436c9c3f1f16c9a9b7ab74dd4cd191118481

                                              SHA256

                                              c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842

                                              SHA512

                                              c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b

                                            • C:\Users\Admin\AppData\Local\Temp\InstallSetup5.exe

                                              Filesize

                                              2.3MB

                                              MD5

                                              cba9c1d1fcbf999d9ccb04050c5c5154

                                              SHA1

                                              554e436c9c3f1f16c9a9b7ab74dd4cd191118481

                                              SHA256

                                              c3ab7948969593528e883956dc2cb0a754a4832076bc2e9b6c4f1c7ce2002842

                                              SHA512

                                              c7d8be36705e08fcd8a7ed8a319aac2aa1d26397081a75511408d51871daa05e21c89be7428eda8a5f7f757ba0c0e74e710e8515b26c89c19b8d7f480a1c0a0b

                                            • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2311262218054942136.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • C:\Users\Admin\AppData\Local\Temp\Random.exe

                                              Filesize

                                              2.5MB

                                              MD5

                                              af49996cdbe1e9d9ca66458a06725a94

                                              SHA1

                                              a6bd1c6a78483ba1b7ee3cb9670568684039501d

                                              SHA256

                                              a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73

                                              SHA512

                                              c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b

                                            • C:\Users\Admin\AppData\Local\Temp\Random.exe

                                              Filesize

                                              2.5MB

                                              MD5

                                              af49996cdbe1e9d9ca66458a06725a94

                                              SHA1

                                              a6bd1c6a78483ba1b7ee3cb9670568684039501d

                                              SHA256

                                              a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73

                                              SHA512

                                              c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_r2kkztkn.rfa.ps1

                                              Filesize

                                              1B

                                              MD5

                                              c4ca4238a0b923820dcc509a6f75849b

                                              SHA1

                                              356a192b7913b04c54574d18c28d46e6395428ab

                                              SHA256

                                              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                              SHA512

                                              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              949ec0b69598677e2a1413d267e96c29

                                              SHA1

                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                              SHA256

                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                              SHA512

                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              949ec0b69598677e2a1413d267e96c29

                                              SHA1

                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                              SHA256

                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                              SHA512

                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                            • C:\Users\Admin\AppData\Local\Temp\d21cbe21e38b385a41a68c5e6dd32f4c.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              949ec0b69598677e2a1413d267e96c29

                                              SHA1

                                              bf67d63774bb568441bdd3357d9af1c8a36c8912

                                              SHA256

                                              e3782310fc1c0bf50b836e4bee87785564b4d0b05c87d363651164fc9dc64d67

                                              SHA512

                                              4e5c53d4e57890543665fa7e083de2159ebd9a3a1433d1e10a65f37f887c09f01ddcb3a69223a45514f7f0285882924da97dbf41ff1939df79278d18c1a7ca7e

                                            • C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp

                                              Filesize

                                              683KB

                                              MD5

                                              f507ce43ea08d1721816ad4b0e090f50

                                              SHA1

                                              e4f02bcd410bddabea4c741838d9a88386547629

                                              SHA256

                                              d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

                                              SHA512

                                              37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

                                            • C:\Users\Admin\AppData\Local\Temp\is-L5P77.tmp\h29nA186woMosEfeurfG9Ftj.tmp

                                              Filesize

                                              683KB

                                              MD5

                                              f507ce43ea08d1721816ad4b0e090f50

                                              SHA1

                                              e4f02bcd410bddabea4c741838d9a88386547629

                                              SHA256

                                              d2218bde27d66f28e3caf15e899653a9357ebdc7adf9a763b687f6c03c93e5e1

                                              SHA512

                                              37b2f92df632f75447572df840a236ef01021e8291536bf2e8156179333f770afdd8bcbf50cb05bbdbdaa53c00ace46119290800b115823ea035a2389a3f6693

                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Temp\latestX.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              bae29e49e8190bfbbf0d77ffab8de59d

                                              SHA1

                                              4a6352bb47c7e1666a60c76f9b17ca4707872bd9

                                              SHA256

                                              f91e4ff7811a5848561463d970c51870c9299a80117a89fb86a698b9f727de87

                                              SHA512

                                              9e6cf6519e21143f9b570a878a5ca1bba376256217c34ab676e8d632611d468f277a0d6f946ab8705121002d96a89274f38458affe3df3a3a1c75e336d7d66e2

                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                              Filesize

                                              282KB

                                              MD5

                                              8ef35a51d9b58606554128b7556ceac2

                                              SHA1

                                              7db9caaa38f1d8bbf36c200e8f721e8e2569cf30

                                              SHA256

                                              b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e

                                              SHA512

                                              92be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24

                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                              Filesize

                                              282KB

                                              MD5

                                              8ef35a51d9b58606554128b7556ceac2

                                              SHA1

                                              7db9caaa38f1d8bbf36c200e8f721e8e2569cf30

                                              SHA256

                                              b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e

                                              SHA512

                                              92be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24

                                            • C:\Users\Admin\AppData\Local\Temp\toolspub2.exe

                                              Filesize

                                              282KB

                                              MD5

                                              8ef35a51d9b58606554128b7556ceac2

                                              SHA1

                                              7db9caaa38f1d8bbf36c200e8f721e8e2569cf30

                                              SHA256

                                              b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e

                                              SHA512

                                              92be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24

                                            • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                              Filesize

                                              40B

                                              MD5

                                              d25f8480ada2fc81e48d59b71bf8e7de

                                              SHA1

                                              a6eaac9324e9dce81256de68b8b61b5586064153

                                              SHA256

                                              e997fd937032a0b3257b109c7bebbed108937c27acf1765eb1ee1f3ff0be02ba

                                              SHA512

                                              8a0f2076f551a5869b5c5d4b8bd1f1947f23f33afc438d1d8ee7f808aedf85ea3179a9a47335e50bc7a73c8a55b9263adbbe988133ae590d4d35ae4b183cd7b4

                                            • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                              Filesize

                                              40B

                                              MD5

                                              d25f8480ada2fc81e48d59b71bf8e7de

                                              SHA1

                                              a6eaac9324e9dce81256de68b8b61b5586064153

                                              SHA256

                                              e997fd937032a0b3257b109c7bebbed108937c27acf1765eb1ee1f3ff0be02ba

                                              SHA512

                                              8a0f2076f551a5869b5c5d4b8bd1f1947f23f33afc438d1d8ee7f808aedf85ea3179a9a47335e50bc7a73c8a55b9263adbbe988133ae590d4d35ae4b183cd7b4

                                            • C:\Users\Admin\AppData\Roaming\ifsubgf

                                              Filesize

                                              282KB

                                              MD5

                                              8ef35a51d9b58606554128b7556ceac2

                                              SHA1

                                              7db9caaa38f1d8bbf36c200e8f721e8e2569cf30

                                              SHA256

                                              b193ce6afc9a17e3e56c5a6944db038c0c88fb25e551acc551dd2a019786590e

                                              SHA512

                                              92be8d6f87d89d762ee25a8546eedc1e0fdce6f25685b59070555b2587e3f011712ebe725326b57cbaeb041dcc2551672342d1830d6b2df05c8183696d21df24

                                            • C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe

                                              Filesize

                                              290KB

                                              MD5

                                              5ef1c4d78151913e0cc7d4db32fdef12

                                              SHA1

                                              7f22e2efdfa01f627338cf3c6b670a9394de92c9

                                              SHA256

                                              dc5f3430011d616ed9ea604d20ced24bedde9e07ed3922cafe80010100e2950a

                                              SHA512

                                              8464d95da53d085b5d51e01c036627d4ad082b7b183531481425754a6f13ee1515cdd7e223bdf3ca78b31dcc2d49fee63105b55db5997f58c8896b46ddd7eda8

                                            • C:\Users\Admin\Pictures\6vO7kiaovr3bKEveLKwqVWkW.exe

                                              Filesize

                                              290KB

                                              MD5

                                              5ef1c4d78151913e0cc7d4db32fdef12

                                              SHA1

                                              7f22e2efdfa01f627338cf3c6b670a9394de92c9

                                              SHA256

                                              dc5f3430011d616ed9ea604d20ced24bedde9e07ed3922cafe80010100e2950a

                                              SHA512

                                              8464d95da53d085b5d51e01c036627d4ad082b7b183531481425754a6f13ee1515cdd7e223bdf3ca78b31dcc2d49fee63105b55db5997f58c8896b46ddd7eda8

                                            • C:\Users\Admin\Pictures\EF6oyaahNELZ4mzY4Qu8qo9W.exe

                                              Filesize

                                              212B

                                              MD5

                                              963da09532e9758adedf9745c76ec700

                                              SHA1

                                              bc976476358cffdbc3f22b6e491f94ccbf15308d

                                              SHA256

                                              8720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2

                                              SHA512

                                              2da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6

                                            • C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              d373ff7cb6ac28b844d9c90fc8f1ab3f

                                              SHA1

                                              8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                              SHA256

                                              92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                              SHA512

                                              f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                            • C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              d373ff7cb6ac28b844d9c90fc8f1ab3f

                                              SHA1

                                              8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                              SHA256

                                              92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                              SHA512

                                              f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                            • C:\Users\Admin\Pictures\RRePNPVOIf5J4S3T5KoTi5nD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              d373ff7cb6ac28b844d9c90fc8f1ab3f

                                              SHA1

                                              8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                              SHA256

                                              92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                              SHA512

                                              f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                            • C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              3029e2e226e0e0310a14943d2e8f0f8a

                                              SHA1

                                              2ed83097fe1ea84d5ff91a924d6b8a7df2a111d6

                                              SHA256

                                              c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253

                                              SHA512

                                              6a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a

                                            • C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              3029e2e226e0e0310a14943d2e8f0f8a

                                              SHA1

                                              2ed83097fe1ea84d5ff91a924d6b8a7df2a111d6

                                              SHA256

                                              c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253

                                              SHA512

                                              6a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a

                                            • C:\Users\Admin\Pictures\YrpWQ8hS3zHC70jtCtFVHNbD.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              3029e2e226e0e0310a14943d2e8f0f8a

                                              SHA1

                                              2ed83097fe1ea84d5ff91a924d6b8a7df2a111d6

                                              SHA256

                                              c4a263f9b0d851926cdf4042017610fcfccb721b66967f2999ddfa33f89d9253

                                              SHA512

                                              6a0d62e194dfb8b80f883c68495c95a95064cf43e4d77cae7569e3fa51b808fbb297aac6d3398dfac8a70416eaf2acee4b0abcdcc25fba183bf693a299ed741a

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\a3AqhnOM26HOLUbeJBrM7Cj8.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              809c1dfaec2149a559cc83b3d8d1b74e

                                              SHA1

                                              5520ba8358fb2ad7c2629ee600733a15e02a3300

                                              SHA256

                                              779365e1b8fa14bfa1ca2e65dcf7e8b518225c7144de3842db39d30d502a240f

                                              SHA512

                                              76428665cf58f87ca0bd5684d1cf99935f76fff8d77083f86ae1736e316824e4f1bc0ffe82c9259cc375bdc57b61a397757de3763639620cc93e6762c0771a9e

                                            • C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe

                                              Filesize

                                              2.7MB

                                              MD5

                                              e81ee4792eee2ea85554722b63381302

                                              SHA1

                                              43313d0be3cad4657bb0ae3d7c707974f1226a8f

                                              SHA256

                                              f20b85b7199ae6ab6b628cdca3d2cf7ed229cef691dae18be2569a5cbb182f4f

                                              SHA512

                                              bd0c86976ddde3c9e101e083cd9a0a326e868ad3dac133ab0d88baccb4505346b3b8da5abd98fc69cdc505a8762b3f84a8c03404d0c76a206ec2a0beff83c063

                                            • C:\Users\Admin\Pictures\h29nA186woMosEfeurfG9Ftj.exe

                                              Filesize

                                              2.7MB

                                              MD5

                                              e81ee4792eee2ea85554722b63381302

                                              SHA1

                                              43313d0be3cad4657bb0ae3d7c707974f1226a8f

                                              SHA256

                                              f20b85b7199ae6ab6b628cdca3d2cf7ed229cef691dae18be2569a5cbb182f4f

                                              SHA512

                                              bd0c86976ddde3c9e101e083cd9a0a326e868ad3dac133ab0d88baccb4505346b3b8da5abd98fc69cdc505a8762b3f84a8c03404d0c76a206ec2a0beff83c063

                                            • C:\Users\Admin\Pictures\zQcec4ZvsDJFiOdG9kR3BR8D.exe

                                              Filesize

                                              7KB

                                              MD5

                                              5b423612b36cde7f2745455c5dd82577

                                              SHA1

                                              0187c7c80743b44e9e0c193e993294e3b969cc3d

                                              SHA256

                                              e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                              SHA512

                                              c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              1c19c16e21c97ed42d5beabc93391fc5

                                              SHA1

                                              8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                                              SHA256

                                              1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                                              SHA512

                                              7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                              Filesize

                                              38KB

                                              MD5

                                              eb437e79fad240e0bd8687a2436efffa

                                              SHA1

                                              e1bb1a1dfc2d71bed406290c45ae8f18d7bd184d

                                              SHA256

                                              2bc5b5261e9c87e26d6d571fd6e5766f406b7db30484cfc462591693072562cf

                                              SHA512

                                              8720d41012df133f6f93a9bab5ae4ee4023eaf81194b2de569213a1924a561c5d23816e921258101b7f70e9e61a8ad2a3959a179d4a6ef1f27a8ba1e6469b69f

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              6577e96059b4b4d765b35bf8999424a1

                                              SHA1

                                              e6524db7aa33baedaeb84a6d071aad9eac901bb7

                                              SHA256

                                              2c750f19c51e9af2db338ddaf365ad47f16d69462df3ab3153e8844d725921e2

                                              SHA512

                                              5d2742e479dd4b080dc9e8edeae5498232a6a8f6abcf423e8bdec04eed2330b1291b2846ce4f39c99b1c715895bdb75201aa313818230405cb9226faad2f9141

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              7600dc25724649eafbdeaafb26f8f7f5

                                              SHA1

                                              9b36c29da759eb022a8d3b660d537f258a83d42c

                                              SHA256

                                              87fac16d32435e1c7216f9bb11ec2f8fdcded8d2edc3d5671d0adf68f2be956e

                                              SHA512

                                              e70a87d6c4668403ab6f21ca6d1e5bc6e95bdc0c1027e708c3563dbf0c456e89808acaa79610602b9661fb78d27e341b030ad5b8910cbc14a61b4963a52ab8ce

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              7600dc25724649eafbdeaafb26f8f7f5

                                              SHA1

                                              9b36c29da759eb022a8d3b660d537f258a83d42c

                                              SHA256

                                              87fac16d32435e1c7216f9bb11ec2f8fdcded8d2edc3d5671d0adf68f2be956e

                                              SHA512

                                              e70a87d6c4668403ab6f21ca6d1e5bc6e95bdc0c1027e708c3563dbf0c456e89808acaa79610602b9661fb78d27e341b030ad5b8910cbc14a61b4963a52ab8ce

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              bb25563173f06945166c997d54aee570

                                              SHA1

                                              165110a8c3f2d2a14c0c091feb2b21117c8fa07d

                                              SHA256

                                              e64cac055fa884210390d6965504a9e994012605c1df50707dc964f12d8af047

                                              SHA512

                                              46d14d3a7d7d26ffbefb6b8e077ddd509a64e6ed9f55ba3d8e857716fabebf02339103888c0af92fb1ad223e583c85557812802098315500a3f8bea43a7403e1

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              b2e65781f8e5007a2b4f8be4c10a9753

                                              SHA1

                                              36bfa771768207e172f07b33f757394f5c1c2303

                                              SHA256

                                              98f3cdc826bef9f49ac3bdbb5278bd29bf7dc9c8bac2afcfa92c61b78b92393f

                                              SHA512

                                              5e9b13fd542bb62c6ce1a2213d9746c59f8170950f54fa5e61c13b87c4db207df1b95f102ac4d5ef1dab29d3095d3f3f76825ddc86213af24cac95fb6a2350bd

                                            • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                              Filesize

                                              18KB

                                              MD5

                                              b2e65781f8e5007a2b4f8be4c10a9753

                                              SHA1

                                              36bfa771768207e172f07b33f757394f5c1c2303

                                              SHA256

                                              98f3cdc826bef9f49ac3bdbb5278bd29bf7dc9c8bac2afcfa92c61b78b92393f

                                              SHA512

                                              5e9b13fd542bb62c6ce1a2213d9746c59f8170950f54fa5e61c13b87c4db207df1b95f102ac4d5ef1dab29d3095d3f3f76825ddc86213af24cac95fb6a2350bd

                                            • C:\Windows\rss\csrss.exe

                                              Filesize

                                              4.2MB

                                              MD5

                                              d373ff7cb6ac28b844d9c90fc8f1ab3f

                                              SHA1

                                              8bd2bd07e929d71f5c27ba7fab3777f29a4c48e3

                                              SHA256

                                              92a53acf35b82eaf96286b8a5dab6cef0513c48dff9e480fa3486033258c093b

                                              SHA512

                                              f89fce3365f1a9091b2523ea310089c53d67469e1d75b1e842eff2d59eb2a42fbbb49f03f3a45f9e56734895add9ac865e9adc1dbc0dfc4b34314b48bb0871a1

                                            • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbgcore.dll

                                              Filesize

                                              166KB

                                              MD5

                                              5a6cd2117967ec78e7195b6ee10fc4da

                                              SHA1

                                              72d929eeb50dd58861a1d4cf13902c0b89fadc34

                                              SHA256

                                              a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                                              SHA512

                                              07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                                            • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202311262218061\assistant\dbghelp.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              861a07bcf2a5cb0dda1aaf6dfcb57b26

                                              SHA1

                                              a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                                              SHA256

                                              7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                                              SHA512

                                              062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                                            • \Users\Admin\AppData\Local\Temp\Opera_installer_2311262218009014480.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • \Users\Admin\AppData\Local\Temp\Opera_installer_2311262218015262708.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • \Users\Admin\AppData\Local\Temp\Opera_installer_2311262218054942136.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • \Users\Admin\AppData\Local\Temp\Opera_installer_2311262218061972352.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • \Users\Admin\AppData\Local\Temp\Opera_installer_2311262218068851808.dll

                                              Filesize

                                              4.6MB

                                              MD5

                                              21b50971a7fddce167df551192f3f5bd

                                              SHA1

                                              83b5148b53da8965eb0292129c5f224cc6bd0261

                                              SHA256

                                              74e83a6ee9e464d296292681ab8f8d83a5d83f43b6b3aa084584046acd89996d

                                              SHA512

                                              f9e82df4c56c0f7fac8c2befb2715833b6c8d1d3e3d16ee17675912cdaf33e021ccb57ebc92873e7515cb36428175aee0cdb5f56e1eaf6308ee2a060b114d19b

                                            • \Users\Admin\AppData\Local\Temp\is-QKBGQ.tmp\_isetup\_iscrypt.dll

                                              Filesize

                                              2KB

                                              MD5

                                              a69559718ab506675e907fe49deb71e9

                                              SHA1

                                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                              SHA256

                                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                              SHA512

                                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                            • \Users\Admin\AppData\Local\Temp\is-QKBGQ.tmp\_isetup\_isdecmp.dll

                                              Filesize

                                              32KB

                                              MD5

                                              b6f11a0ab7715f570f45900a1fe84732

                                              SHA1

                                              77b1201e535445af5ea94c1b03c0a1c34d67a77b

                                              SHA256

                                              e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67

                                              SHA512

                                              78a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771

                                            • \Users\Admin\AppData\Local\Temp\is-QKBGQ.tmp\_isetup\_isdecmp.dll

                                              Filesize

                                              32KB

                                              MD5

                                              b6f11a0ab7715f570f45900a1fe84732

                                              SHA1

                                              77b1201e535445af5ea94c1b03c0a1c34d67a77b

                                              SHA256

                                              e47dd306a9854599f02bc1b07ca6dfbd5220f8a1352faa9616d1a327de0bbf67

                                              SHA512

                                              78a757e67d21eb7cc95954df15e3eeff56113d6b40fb73f0c5f53304265cc52c79125d6f1b3655b64f9a411711b5b70f746080d708d7c222f4e65bad64b1b771

                                            • memory/348-132-0x00007FF69E010000-0x00007FF69E5B1000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/348-460-0x00007FF69E010000-0x00007FF69E5B1000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/488-354-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/488-476-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/488-346-0x0000000002960000-0x0000000002D5F000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/488-566-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/1112-50-0x00000000049E0000-0x0000000004A16000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/1112-233-0x0000000009750000-0x00000000097F5000-memory.dmp

                                              Filesize

                                              660KB

                                            • memory/1112-53-0x0000000007540000-0x0000000007B68000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/1112-248-0x0000000006F00000-0x0000000006F10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1112-58-0x0000000007440000-0x0000000007462000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/1112-49-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/1112-247-0x000000007EE00000-0x000000007EE10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1112-243-0x0000000009920000-0x00000000099B4000-memory.dmp

                                              Filesize

                                              592KB

                                            • memory/1112-110-0x0000000008540000-0x00000000085B6000-memory.dmp

                                              Filesize

                                              472KB

                                            • memory/1112-207-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/1112-63-0x0000000007B70000-0x0000000007BD6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1112-64-0x0000000007BE0000-0x0000000007C46000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1112-65-0x0000000007DA0000-0x00000000080F0000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/1112-94-0x0000000008210000-0x000000000825B000-memory.dmp

                                              Filesize

                                              300KB

                                            • memory/1112-93-0x00000000081F0000-0x000000000820C000-memory.dmp

                                              Filesize

                                              112KB

                                            • memory/1112-226-0x000000006F300000-0x000000006F34B000-memory.dmp

                                              Filesize

                                              300KB

                                            • memory/1112-227-0x0000000008670000-0x000000000868E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/1112-225-0x0000000009620000-0x0000000009653000-memory.dmp

                                              Filesize

                                              204KB

                                            • memory/1112-52-0x0000000006F00000-0x0000000006F10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1112-51-0x0000000006F00000-0x0000000006F10000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/1112-510-0x0000000009820000-0x000000000983A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/1808-203-0x0000000000A10000-0x0000000000F38000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2136-184-0x0000000000BF0000-0x0000000001118000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2136-187-0x0000000000BF0000-0x0000000001118000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2256-154-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2256-56-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2256-59-0x0000000000400000-0x0000000000409000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/2352-195-0x0000000000A10000-0x0000000000F38000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/2708-159-0x0000000000A10000-0x0000000000F38000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/3264-152-0x0000000000C80000-0x0000000000C96000-memory.dmp

                                              Filesize

                                              88KB

                                            • memory/3296-208-0x0000000002930000-0x0000000002D2B000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/3296-498-0x0000000002930000-0x0000000002D2B000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/3296-453-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/3296-563-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/3296-210-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/3296-209-0x0000000002D30000-0x000000000361B000-memory.dmp

                                              Filesize

                                              8.9MB

                                            • memory/3296-235-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/3716-486-0x0000022DF10E0000-0x0000022DF1102000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/3716-491-0x00007FFCD0020000-0x00007FFCD0A0C000-memory.dmp

                                              Filesize

                                              9.9MB

                                            • memory/3716-493-0x0000022DF10D0000-0x0000022DF10E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3716-495-0x0000022DF10D0000-0x0000022DF10E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/3796-216-0x0000000000400000-0x000000000041A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3796-101-0x0000000000400000-0x000000000041A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3920-54-0x0000000000980000-0x0000000000A80000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/3920-55-0x0000000000800000-0x0000000000809000-memory.dmp

                                              Filesize

                                              36KB

                                            • memory/4008-167-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4008-232-0x0000000000400000-0x00000000004BA000-memory.dmp

                                              Filesize

                                              744KB

                                            • memory/4344-0-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/4344-1-0x0000000000800000-0x00000000016E0000-memory.dmp

                                              Filesize

                                              14.9MB

                                            • memory/4344-35-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/4436-457-0x0000000000400000-0x0000000000965000-memory.dmp

                                              Filesize

                                              5.4MB

                                            • memory/4436-34-0x0000000000B00000-0x0000000000B01000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4436-122-0x0000000000400000-0x0000000000965000-memory.dmp

                                              Filesize

                                              5.4MB

                                            • memory/4436-119-0x0000000000B00000-0x0000000000B01000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4440-242-0x0000000004700000-0x0000000004728000-memory.dmp

                                              Filesize

                                              160KB

                                            • memory/4440-223-0x0000000000400000-0x0000000002AC0000-memory.dmp

                                              Filesize

                                              38.8MB

                                            • memory/4440-483-0x0000000000400000-0x0000000002AC0000-memory.dmp

                                              Filesize

                                              38.8MB

                                            • memory/4440-396-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                              Filesize

                                              972KB

                                            • memory/4440-241-0x0000000002BF0000-0x0000000002CF0000-memory.dmp

                                              Filesize

                                              1024KB

                                            • memory/4440-465-0x0000000000400000-0x0000000002AC0000-memory.dmp

                                              Filesize

                                              38.8MB

                                            • memory/4480-153-0x0000000000A10000-0x0000000000F38000-memory.dmp

                                              Filesize

                                              5.2MB

                                            • memory/4540-473-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/4540-341-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/4540-540-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                              Filesize

                                              9.1MB

                                            • memory/4540-338-0x00000000029D0000-0x0000000002DD6000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/4544-36-0x00000000057F0000-0x000000000588C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/4544-45-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/4544-23-0x0000000000C00000-0x0000000000E90000-memory.dmp

                                              Filesize

                                              2.6MB

                                            • memory/4544-40-0x0000000005A00000-0x0000000005A1A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/4544-39-0x00000000061F0000-0x000000000647A000-memory.dmp

                                              Filesize

                                              2.5MB

                                            • memory/4544-38-0x00000000056E0000-0x00000000056EA000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/4544-37-0x0000000005980000-0x0000000005990000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4544-26-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/4544-29-0x0000000005CF0000-0x00000000061EE000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/4544-33-0x0000000005720000-0x00000000057B2000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/4712-198-0x00000000053D0000-0x00000000053E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4712-44-0x00000000053D0000-0x00000000053E0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/4712-43-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB

                                            • memory/4712-41-0x0000000000400000-0x0000000000408000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/4712-194-0x00000000736A0000-0x0000000073D8E000-memory.dmp

                                              Filesize

                                              6.9MB