Resubmissions

04-02-2024 20:50

240204-zmv5ysadh5 10

17-12-2023 22:34

231217-2hhp6sgbaq 10

Analysis

  • max time kernel
    300s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17-12-2023 22:34

General

  • Target

    ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe

  • Size

    735KB

  • MD5

    9f5cb3a9a4053a53063a9da9afbf6273

  • SHA1

    b1ad9fe9cd4e8ddf11909751a2e0334c86ff206e

  • SHA256

    ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1

  • SHA512

    aaa720bb50f26f0508f1a3403da7189e7915c5663f08b35dd35299bfb6815c3f20bfb143d35cb57a0a95f623505809434ec28ecb7b90374e674a40381c079b26

  • SSDEEP

    12288:xYRY4kQvFK/hSB8W5yWz2izHvqIknzbUtaD0Drt+/wQVbAV:/48SB8W5lzfqIknzCaoDWwWA

Malware Config

Signatures

  • Detects DLL dropped by Raspberry Robin. 2 IoCs

    Raspberry Robin.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 18 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Drops startup file 8 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers COM server for autorun 1 TTPs 11 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • NSIS installer 6 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • c:\windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2460
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4196
    • C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe
      "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe"
      1⤵
      • UAC bypass
      • Windows security bypass
      • Windows security modification
      • Checks whether UAC is enabled
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3872
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ec91ef3c4c02b6c8aff61058bf0b2bb013e2e6a2ee6c805c6d07ad0ae46fa9d1.exe" -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:212
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        2⤵
        • Drops startup file
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3492
        • C:\Users\Admin\Pictures\WmFp38YPcX5tvc4DkLNFyKGp.exe
          "C:\Users\Admin\Pictures\WmFp38YPcX5tvc4DkLNFyKGp.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            4⤵
              PID:2924
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              4⤵
                PID:4424
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                4⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Suspicious behavior: EnumeratesProcesses
                PID:652
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 516
                  5⤵
                  • Program crash
                  PID:32
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 536
                  5⤵
                  • Program crash
                  PID:3496
            • C:\Users\Admin\Pictures\ctIaE70t8pnRgjWhmgrFtFYt.exe
              "C:\Users\Admin\Pictures\ctIaE70t8pnRgjWhmgrFtFYt.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:64
              • C:\Users\Admin\AppData\Local\Temp\is-FUAC0.tmp\ctIaE70t8pnRgjWhmgrFtFYt.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-FUAC0.tmp\ctIaE70t8pnRgjWhmgrFtFYt.tmp" /SL5="$E01D8,6500912,54272,C:\Users\Admin\Pictures\ctIaE70t8pnRgjWhmgrFtFYt.exe"
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of FindShellTrayWindow
                PID:3604
            • C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe
              "C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:292
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4248
              • C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe
                "C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe"
                4⤵
                • Windows security bypass
                • Executes dropped EXE
                • Windows security modification
                • Adds Run key to start application
                • Checks for VirtualBox DLLs, possible anti-VM trick
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2328
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4932
                • C:\Windows\System32\cmd.exe
                  C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                  5⤵
                    PID:4712
                    • C:\Windows\system32\netsh.exe
                      netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4920
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3984
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4940
                    • C:\Windows\System32\Conhost.exe
                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      6⤵
                        PID:4920
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Manipulates WinMonFS driver.
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3104
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4108
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        6⤵
                        • Creates scheduled task(s)
                        PID:4900
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        6⤵
                          PID:2480
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:396
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4960
                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                          6⤵
                          • Executes dropped EXE
                          PID:1972
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          6⤵
                          • Creates scheduled task(s)
                          PID:4444
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            7⤵
                              PID:2476
                          • C:\Windows\windefender.exe
                            "C:\Windows\windefender.exe"
                            6⤵
                            • Executes dropped EXE
                            PID:4360
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              7⤵
                                PID:1928
                                • C:\Windows\SysWOW64\sc.exe
                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  8⤵
                                  • Launches sc.exe
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1924
                      • C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe
                        "C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2988
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2744
                        • C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe
                          "C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe"
                          4⤵
                          • Windows security bypass
                          • Executes dropped EXE
                          • Windows security modification
                          • Adds Run key to start application
                          • Checks for VirtualBox DLLs, possible anti-VM trick
                          • Drops file in Windows directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5116
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            5⤵
                            • Drops file in System32 directory
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4688
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                            5⤵
                              PID:4532
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                6⤵
                                • Modifies Windows Firewall
                                PID:2476
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4580
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              5⤵
                              • Drops file in System32 directory
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4916
                        • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe
                          "C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe" --silent --allusers=0
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Enumerates connected drives
                          • Modifies system certificate store
                          • Suspicious use of WriteProcessMemory
                          PID:4496
                          • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe
                            C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2b4,0x2b8,0x2bc,0x290,0x2c0,0x6f167518,0x6f167528,0x6f167534
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:1340
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\ZDFluDRoAV4KlNKsVlURP0h6.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\ZDFluDRoAV4KlNKsVlURP0h6.exe" --version
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:2440
                          • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe
                            "C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4496 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20231217223533" --session-guid=a4cc51ab-bbb5-45bf-92a0-755b4aa33dc0 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=6804000000000000
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Enumerates connected drives
                            • Suspicious use of WriteProcessMemory
                            PID:4548
                            • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe
                              C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=105.0.4970.48 --initial-client-data=0x2c0,0x2c4,0x2c8,0x290,0x2cc,0x6e0e7518,0x6e0e7528,0x6e0e7534
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:5096
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\Assistant_103.0.4928.25_Setup.exe_sfx.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:3012
                          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\assistant_installer.exe
                            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\assistant_installer.exe" --version
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:5056
                            • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\assistant_installer.exe
                              "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=103.0.4928.25 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x15a1588,0x15a1598,0x15a15a4
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:1164
                        • C:\Users\Admin\Pictures\1BUgzTM953AbTnyWhNNTg3zX.exe
                          "C:\Users\Admin\Pictures\1BUgzTM953AbTnyWhNNTg3zX.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Registers COM server for autorun
                          • Drops file in Program Files directory
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4376
                    • C:\Windows\windefender.exe
                      C:\Windows\windefender.exe
                      1⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:4256

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\ClocX\uninst.exe

                      Filesize

                      52KB

                      MD5

                      3387961372fe91c2cc69b53180cbfee4

                      SHA1

                      ede6fb0d2319536efca218d461425d2addffd88e

                      SHA256

                      dad57975be6833c50d32ee77212addf11a80195d82365ade6042234e492bd845

                      SHA512

                      f6551803b90934a5555587bc81b4758b21fc8bad1653f298846e2195c797932893d761249f9cf527e95809ffc0bfd785872f0b42f56e8adc64bdb06c63f09c5c

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      1c19c16e21c97ed42d5beabc93391fc5

                      SHA1

                      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

                      SHA256

                      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

                      SHA512

                      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      383158f272081d01863eeb734490b2ca

                      SHA1

                      d04f31f3a44273f64222b863a4bb89e59ba9ae5a

                      SHA256

                      f844b75a829cdc625b6810d275018380e8ceba892c888473b936d900f78eeca7

                      SHA512

                      6a84888a2f8b2b16080976892cb012b2242aafc0198b011fc6c4fe196703097a7a0b8f30fbce71eb1a46b6eb4e86e04876c78050ec070be057101f1d7288c15a

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.3MB

                      MD5

                      51c6c38389aff7498c39ffaa66a49ea1

                      SHA1

                      bd91ef2f6c5939216151a0f3c884073aca61afd4

                      SHA256

                      911fab8a446eed84542e4efadeb142473b3876f98549d8067d2344de25a12bc6

                      SHA512

                      8ce1eb56ef33a5de17acb23e3274b70fcbef08f43d1725a36d906f0fe2a44466856da926f74ef4a70dce4c3a433d849857bea16d595f91fcaa0b5775e092a48f

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\additional_file0.tmp

                      Filesize

                      1.9MB

                      MD5

                      b0f128c3579e6921cfff620179fb9864

                      SHA1

                      60e19c987a96182206994ffd509d2849fdb427e3

                      SHA256

                      1c3ddbdd3a8cc2e66a5f4c4db388dff028cd437d42f8982ddf7695cf38a1a9ee

                      SHA512

                      17977d85cbdbd4217098850d7eaff0a51e34d641648ec29e843fc299668d8127e367622c82b2a9ceab364099da8c707c8b4aa039e747102d7c950447a5d29212

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\assistant_installer.exe

                      Filesize

                      2.1MB

                      MD5

                      34afbc4605531efdbe6f6ce57f567c0a

                      SHA1

                      6cb65f3565e40e7d08f5a0ad37b1b9182b4fc81b

                      SHA256

                      0441668bc7daf97c16734a8a95eb29de9fd2f4bec368f4d009e5437862249019

                      SHA512

                      577fe412d9b20055cf2f67e029a6829301d6b010cc03d2cf8ce89b87c213530dc4d396a27b92f56ed8260afd59d6fbd8cf841e807460f0a0bad4ad1df5b7c25c

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\dbghelp.dll

                      Filesize

                      1.7MB

                      MD5

                      861a07bcf2a5cb0dda1aaf6dfcb57b26

                      SHA1

                      a0bdbbc398583a7cfdd88624c9ac2da1764e0826

                      SHA256

                      7878be3359a3ecfcf94f961bcdce3e6e8bc01a55eba640d45b867b94f30fcdbc

                      SHA512

                      062159168817968f1165cb06299217a556c4e6b00ef7c740f845fdcbbaca77da346ef5fd7403c6f9d81e173a2fcf40c63da57cb884158f8c037c0df0ce1cc5b9

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\opera_package

                      Filesize

                      10.0MB

                      MD5

                      e8b350f728bcdb74f830f41a16b40dc1

                      SHA1

                      100ecbaba3b63c28fec6a52ba9a5f2ca9434132e

                      SHA256

                      de1fa33c605ab1a839a7cae338a68676ca2844db66109bc81d741e4ae094ee0c

                      SHA512

                      e6d3efc5558b237a382bab6f59802f79b2c3db25e854dd7cdae9dc9503d0758f09ba9fdca47a9710cf2d1a3be6bf039d0011b8c14bb7efd24e590b5e8cb9354e

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2312172235331702440.dll

                      Filesize

                      1.4MB

                      MD5

                      632b74e4ef5c12cc64c43f7fe66adb56

                      SHA1

                      9f71cf67e01c48b48676168c87ed28f73e66f03b

                      SHA256

                      aa90a55ca9b671c9061ec2472a5192077c6b4901dafd6bb13c8a6ff483e8b59c

                      SHA512

                      fa24896f22a62b9ff825f27600788c9332b43dd4c7172aabb90f2798ab9f4bb0b0cc945974c8abc532b073f39ca4ee91db74658d227998193f1485c79fae039e

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v0nxmkkx.zda.ps1

                      Filesize

                      1B

                      MD5

                      c4ca4238a0b923820dcc509a6f75849b

                      SHA1

                      356a192b7913b04c54574d18c28d46e6395428ab

                      SHA256

                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                      SHA512

                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • C:\Users\Admin\AppData\Local\Temp\is-FUAC0.tmp\ctIaE70t8pnRgjWhmgrFtFYt.tmp

                      Filesize

                      687KB

                      MD5

                      dc768c91e97b42f218028efa028c41cc

                      SHA1

                      63e5b917e7eb1fe94707cde664875b71b247eeb5

                      SHA256

                      a0991507c9da2c3e21dda334920fc6c36a7fa1595d4c865c6c200c05128f2efe

                      SHA512

                      956d9b9b092b030d99ed6ff9673a0c132ff0565bd80c7ac63bfac1e3d80062bc641585776ba0d86e2f39df0d2cdd6ded403979e9caa65bbb42ec01a0d4106459

                    • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                      Filesize

                      40B

                      MD5

                      35b0f08893fe266f55ab75655343e59d

                      SHA1

                      afa91f887bf164605d722576317c46631d01b1bd

                      SHA256

                      09ffae1acb3f9ccd3a07905dcc7385504df64b8eea49ccf4ef75a7e6990ea73d

                      SHA512

                      ff757628af2301b23a9d68844f12660a3359ca60a38572990ddc556cef53161ef4d845d9f41889b31bfe80c2ec25032602fd8faeb59d06b65d07e16fa9375050

                    • C:\Users\Admin\Pictures\1BUgzTM953AbTnyWhNNTg3zX.exe

                      Filesize

                      1.4MB

                      MD5

                      da52fef8229ddbe79aba43e77e10a288

                      SHA1

                      753228cd5a03412810a3ab04d40757c04ac6759c

                      SHA256

                      0657f482097f8a10154d5adbbb6d7fd9a9e0bc07dfd0223d9da39abab840fb13

                      SHA512

                      0d25ab25db7871d704cf161a269e54f41bbc720ac3a55743fa7291e124e04b377ab63e04a08b277690b33a5cb6c7795f4fa2f328e85ea5794b307521bbff003b

                    • C:\Users\Admin\Pictures\1BUgzTM953AbTnyWhNNTg3zX.exe

                      Filesize

                      1.2MB

                      MD5

                      ca06ca2b5179f29fc3be189d4da95f60

                      SHA1

                      bb6aefa437a8830f6f3dcf3bccaa62ac6c6db2d9

                      SHA256

                      707595c961545725063ce8c6de8933991a8eb25be0b4d329ee275a2c83486af1

                      SHA512

                      4004d2b8d238be94c035146cb68574f8e7291e96bf6f299d8f3867099500e8090e22c0937387afd23127f4e14a4899e5d2e11cbcd4d680f5bb65aa464c403d2a

                    • C:\Users\Admin\Pictures\WmFp38YPcX5tvc4DkLNFyKGp.exe

                      Filesize

                      1.1MB

                      MD5

                      f140ab6a64d391cbec69d1147f7de11d

                      SHA1

                      b125c0b0088b404ded01604f367d6a2d7ce392cd

                      SHA256

                      17f0fbc5242a922a4ba00600a95e12a10b911d04c16bb15398f355bf4fe724b6

                      SHA512

                      6fea01e2dfbef3d921fd9dceca37d4198e9e18e2f4ac3a9cb67113caa0178dcd0a55a096f7582bec712cc138151c8d91529d7c70039956264e5bcaa0373b2f1b

                    • C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe

                      Filesize

                      4.2MB

                      MD5

                      21224dbf9dbfa2296c6865f6c76dc8ca

                      SHA1

                      d186683531a01787c54149d4eeb19e07cb3efea7

                      SHA256

                      ccd53d9f481ff8ea0c72f5b864fcdb053a5e1e678ee1e4eea52a42b965b8b541

                      SHA512

                      a4b6aa70eec762820aaee4a808392465243228fcc24713bbe70aec3306076e0528b2f5aba5b6569b0c6d458ef809c9d4f4b5b883f22642608fd3ae6080e0ecb0

                    • C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe

                      Filesize

                      3.8MB

                      MD5

                      9d84f7abee96c2d574d8227f806092be

                      SHA1

                      ba123e0f2bd5e964dfc1f63f2b941756befceca3

                      SHA256

                      e2a2d026ae59509cf3382e83a8794b6755ddb22c9fa5b8a15894430cea4b21cd

                      SHA512

                      a4d51a3b509055c013460b333834c37628464758b8b95c87c4053d26ba50ad6ffe55f971417ef9e71244e6e231574521a07817956ba4c248cf88ea3829acf929

                    • C:\Users\Admin\Pictures\YIg9ZAKEDKqQZR0KoqNSo1dR.exe

                      Filesize

                      3.5MB

                      MD5

                      5ca907f028d1f734d4833a02d7126901

                      SHA1

                      f9b24d15d555fa389f1a2030b4d735d63b56f9e0

                      SHA256

                      f284b1b85ab4141a920337c5996756cbc8c6c7cf28abaff8ad6a19c5b7ae9a90

                      SHA512

                      0e1b056d6feb3dd63a03d6fdb8ae226e3be137c8b9d127c5ee9481870e11041b24ea8f8a1660b89fe6aa0e908ce1216bee53e3f631d237bbf05ab5a0df917239

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      2.3MB

                      MD5

                      54fe912a3daabb977d6d6d1209e07cf1

                      SHA1

                      d89759b3b135c1a8e665dfe80b6ac335c751d1c2

                      SHA256

                      8877f1815b2a5c0ed276a84c9d51ef0bca330ff7ebd4c4a7452c2dc3b326a97b

                      SHA512

                      2393c37564af4cd4a0b49c76abbfe7358f2d1ca3870dfc222db83fb1a2f5e7108324421e70170415edfa21132b4e17f640f645140ab62e99cdb248ccaf47deb4

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.7MB

                      MD5

                      ce1c617c2fb4f5c86e6541c1dc3ee4bb

                      SHA1

                      e8ca93f9ea930f26f803f6def1d8a0969984f938

                      SHA256

                      9769fbd48faf3c2fbfcdd4080b1fc027e49356fa0e03a49454c457e1dcced701

                      SHA512

                      9d96dc7117648aff266e02b68a8e9fb1e5c2d535593eb9652799e780764b98becf236eab171f296bab579e1a48dd7de8b00bf5651888b7dabfe114b710d6454b

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.5MB

                      MD5

                      75035dfe611daa8efd2c9d6177957773

                      SHA1

                      8b73d73d6d16d2b39f471ea4c8bd0896e5e738ef

                      SHA256

                      bf9e045ab9e8c63d46988fa556a82ae8873d877d7a4d00adcbeef8a7fa5937ce

                      SHA512

                      a88c33a089eb5b5e2a301b44f3f6c9631059f7189d56546543b7a22b9582f6067eb31a33a7df91c3d7f39c6013182e4d62643100bd0524e8da76a31514052405

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.4MB

                      MD5

                      abcbc65b12e88d7f93fbe1e75319e6d2

                      SHA1

                      97e46343188d03b6b9ec9adfc14b51ebc6e86e60

                      SHA256

                      f6b2ceb738d0c2e50b6e63894325ad7a26f569e691453b57529c367b41c98c58

                      SHA512

                      25e501aa56ea06dc42c4fb59cb26fab0ccfb6a2d1bf5be337a0a5fcfc93832af099c5add1d4e4ff16577ce9da25b841984d720cb80ff38b28dee65e181260c1e

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.3MB

                      MD5

                      8bef04d36c706e02e768adecff182a42

                      SHA1

                      350ddaf6cfe4792a81984cdf492149710600b8df

                      SHA256

                      c4bb9fdd9a272e6776bc683099755477ecabfe1d0edd903123030d8a90debe2d

                      SHA512

                      e427f4f4d410b3d3230833bb3b401a748d68f460fba58886e03fef41ddf66e193b61c5b54e387b5bed6f01d981d2d9ed81479957adcc19c228cba34373bdbf4b

                    • C:\Users\Admin\Pictures\ZDFluDRoAV4KlNKsVlURP0h6.exe

                      Filesize

                      1.1MB

                      MD5

                      98d730acdc0d95cf5f655780a1767b96

                      SHA1

                      f8a9cca137691ca080d3712f701293ebf57c3149

                      SHA256

                      9bb03d2939773402af0e3dbcb9526de2fcd19fc2cfe7d4758a82cd6bcb6bc76e

                      SHA512

                      063932b44d790af47177f8b012109b2d61f62bafb4e45e1a11327c8ebdac7addc7b7f56326281e85b2dd34e699abf96ba0a6031cb4135b60f16cb24ea9861874

                    • C:\Users\Admin\Pictures\ctIaE70t8pnRgjWhmgrFtFYt.exe

                      Filesize

                      2.5MB

                      MD5

                      8f7f954732f8886c4d7d30724751ae0e

                      SHA1

                      6f15bbf366b05e22c56d29de87ae4463d1031085

                      SHA256

                      617f63084fc348b73f4de6b4721cbb320ed35ebf2f774325e75564ef184d41d8

                      SHA512

                      c5f092c3e5ea91653821c1fcebfe14ed3ab01da69912f699d3b1314195a828bab62637569e3e958cd32ca1f8cd41d539df28ae18a3d6b54342adfc4b4ae0a031

                    • C:\Users\Admin\Pictures\ctIaE70t8pnRgjWhmgrFtFYt.exe

                      Filesize

                      2.9MB

                      MD5

                      8c3f30ee35d529ba3d34ecc5dbe10628

                      SHA1

                      63894135b785edcae4d0cc1e8811458518aa466e

                      SHA256

                      faccbaf5c3d0dee679acf25c78585c26ceaf40b7f1e3c48d8f027db8cafb18bd

                      SHA512

                      2e86978d8e8b9aa56bb32e9853d51cfedbe8ce6764c1faf6fe547a122e7d5a33ee6a60f693b2676608cc7db617ac139008db4e9e5c913c56ecd9b1bedc36b013

                    • C:\Users\Admin\Pictures\mbhcy06DRZMzmZovjWaT7dIT.exe

                      Filesize

                      7KB

                      MD5

                      5b423612b36cde7f2745455c5dd82577

                      SHA1

                      0187c7c80743b44e9e0c193e993294e3b969cc3d

                      SHA256

                      e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                      SHA512

                      c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                    • C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe

                      Filesize

                      4.2MB

                      MD5

                      0088d8f2bb9d49b455aefcf0cb22ef44

                      SHA1

                      9cb548aacf994003e0a258194b7f3731ea412c6d

                      SHA256

                      a88d18d1ee03d6be113d4ff44455175fe0ba05d8c93eeb4b9a0117c8274b9fe2

                      SHA512

                      b18044e3bc96967446171a70fa812ffe88f997cd741203ee887e32251416fac1c7334678b359382c45dd0b2d3c74dd9c22b4d0b66f8e14db93476ccdc11ff454

                    • C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe

                      Filesize

                      2.0MB

                      MD5

                      de0c469f02344d02ef1d730b7a4cea3e

                      SHA1

                      1fd8821bfe3a90e29b066f0e508d854316e9c8ad

                      SHA256

                      38e962d94461eb20f0d2d69d01ce69a537c1053cc54defa91441f245565af105

                      SHA512

                      96ac7ab7ec940448a052750b3ce3f6da79b7c8c1c6a1c5643af859b0a86b5c5ac429788f383bf13a5ad1bf62183e90d8bb57f8df015bc85413556bd74a4178db

                    • C:\Users\Admin\Pictures\t3D3photLTzV4WeZ7RLqvQh0.exe

                      Filesize

                      2.7MB

                      MD5

                      167b34c301c0957e3f5d0a47d6ab8dae

                      SHA1

                      4026c2bd2a9007f589eca5461d750b47075f4fe4

                      SHA256

                      e4bf09515fa57c6bb47573da0e1d8ee4d0e834abf6f6d03f73fa2d5414fe5ebd

                      SHA512

                      0da95883b458be708d90eadd3945be2a048bd7fde58ab77385cb4236b5d112f9fcffb87f3f6e923d8ec248e642c77000d74aaeeb34188108bd8cf9a1a88a04e4

                    • C:\Users\Admin\Pictures\yAYibqzMCPN0seKVLEPdDMjC.exe

                      Filesize

                      212B

                      MD5

                      963da09532e9758adedf9745c76ec700

                      SHA1

                      bc976476358cffdbc3f22b6e491f94ccbf15308d

                      SHA256

                      8720b9487cee7dae6db3f8f73273bcbbc56377400b830ca0f089473ebc9603f2

                      SHA512

                      2da299bd10de6d425ee84fc2d17f514d003995f489946cdebafa0dcea4058419bcc38beabc2cbbd4546c2117fcf502292b97edffd57da555017762c4f05122f6

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      c79854de99960c331674912c556d4738

                      SHA1

                      6d90e0afd0d86151acfd16d0ee9e3241d8d99d26

                      SHA256

                      d58afc0ebfa917c6b6084245c0174dd5f38152e8d13d68609166295759801a93

                      SHA512

                      85d4c88a2b2dbb3516c0eed8910898f899f3b4742e16228ddfadf175f279060c74368bdb2ecdf28b4f6cf6519cbbcb7656fa0db225bdefee07df703b3ff7138e

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      1dc40ed46a36f75b5e17578773849329

                      SHA1

                      e592c7b5c6e1f7dc90b880a5e25228b4a0741290

                      SHA256

                      ac4e4ede6474ae89dc818be98fee2e360f0df2890afdfd117fd94040e6e6cff1

                      SHA512

                      498b0f6ed7fa86c3ee0f8f11925dcc27633c3d011449bc4fbd7de499cf9eae66d886d62db6dd5f64799748802dde0aa883fc89a1b1c1ab41bd058c85674691fb

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      f2f89fc93291738814a3dd3f63d925ff

                      SHA1

                      6945002ab0e3fa495f4f92f33f8362011de9752a

                      SHA256

                      788e0c987cbdd190cc13a7fe69a5accfa62b20e48fe3b0e25d88192604f529c1

                      SHA512

                      e89965c13cba9bda791fbf6fecd1e22e90f111fda3586a63d605f45c97cfe262cfae7709d2e0b403dca7503cc2d3eab53c333b3a183356c7841928932236eaa8

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      32611a1d28f8bc7d6d5970f32fe8fccb

                      SHA1

                      9fa13efcc9f4ae2ff566768234eaa6ffee9db389

                      SHA256

                      369a6638178bacafe2a1ce470a4a0998b8012b8604a688ca97ce14efc270da44

                      SHA512

                      5bbdc0908145db0dcd46364fd35b2ef6de04f7d0c5f40e9f4d10aba79e21184a46d61f6c256b1afa516e8e11fdc4f64c36ef49ff11b447682537b7f4a944a3fe

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      ac97dd31659b792c6c9aee526324bc25

                      SHA1

                      f30a1527da2bc49c9445270efdb9c8cdf3d88e6f

                      SHA256

                      3a9ee1291f8075ddf2cdb7e238a5bcd704aeca0c4123c5d09481244641d9d030

                      SHA512

                      29007a11fd2665335ee19ebc9e3ffc0bc6b725932783b36102f7867a3dab2e7603c0844bfebe5898b272d18c66e02d30a707089144468970b2acbec890dcba4d

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      18KB

                      MD5

                      344af5de994c6921d0df705c45e69b6c

                      SHA1

                      c63b222b2b2d36b1e4d9b5275771c53fa89938b2

                      SHA256

                      1533e7f39cf67a2a5c4758649802f5954b871916716109999418287b3c0d2e9f

                      SHA512

                      550dcd95ea80a981d33441616bf381d5a2a2ec08a0545d9fee1d07b8bda946fbfee33b0714aa98c219e647b3144bd8bf36c566c5c0e52ce4b303f0deca0fed0c

                    • C:\Windows\windefender.exe

                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • \Program Files\Windows Media Player\Media Renderer\CbsApi.dll

                      Filesize

                      14.7MB

                      MD5

                      3811c6a994ed7c8767ab4a7e873c9de1

                      SHA1

                      c1ff02fa4b45a06c8bf34780a4054cbc3a2a3478

                      SHA256

                      9974ecc22baf1cd9871f042f8e7ba5cf1274ebeac35053296dc78ca188fe892b

                      SHA512

                      d3e557060e032a2e699ae08ca6865738c62806dcf84b922ec598cf1c9c2225004a12cb2ef54730c2d365ad04604d59bf42fdc207c9e53bc12bfd8a50e0b376f5

                    • \Program Files\Windows Media Player\Media Renderer\CbsApi.dll

                      Filesize

                      224KB

                      MD5

                      8099cd420654a27dde245bdd0152e9e9

                      SHA1

                      a4a1e9b8ae59637bd8ccb1a8bbcb65d561decca6

                      SHA256

                      b73141771309539c02b5e2548dfea27395dd28926ee44c65043e041324ef9182

                      SHA512

                      beaac5b75b50bc893374d74b144c32cad2aae50182a87b578e1d20b657e0d788a7e17b4a524f28735a44aeea019077adad77cccf13e8b8044cc9a6c3d4d3b7c0

                    • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202312172235331\assistant\dbgcore.dll

                      Filesize

                      166KB

                      MD5

                      5a6cd2117967ec78e7195b6ee10fc4da

                      SHA1

                      72d929eeb50dd58861a1d4cf13902c0b89fadc34

                      SHA256

                      a013652c95eca80356040312390d09ed78458fca6a0aef5ce3203dfe9cbc5040

                      SHA512

                      07aa64e6c681360c6c6c504041bd97f54dbf0aad8e498281dc8f8bdec2de4fc1c1bed9d0c4d3b6f4a4be19c408f7d34ff1c4a13db36488f698e3ae11855b895c

                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2312172235317744496.dll

                      Filesize

                      1.9MB

                      MD5

                      378230c7d958fcb114973566a75862f9

                      SHA1

                      1b6c0828709b82b78cde7c224592b6e0e2656f9e

                      SHA256

                      83484b9200f5bd062e8446b7b75763a272cb07418745d1fcf304d69720581840

                      SHA512

                      b70f23122d3e0504926bd94d3e3867733230fec948b6ccfbfda2bb8c45a5e1d5ed1b8626a3a38cf0d579b9f29c78e1003fbfdb96c8cf40df03af502f400403a6

                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2312172235325821340.dll

                      Filesize

                      1.4MB

                      MD5

                      52b83d53a719927bdd51e77b46c7133d

                      SHA1

                      9d773f3c6091acdb9d339f2d992d4b29219894f8

                      SHA256

                      4be3c68cdd2381a58e5db0b841781a7c99dcdff49dd93d747316fbb41cefc354

                      SHA512

                      2afb5a5d0ba535fdc5b059cb6f3d9cc66f76fd684feb44e587cdd4fbd5f2cd9fd998c2673b856ed31b0d5e37edb110e48bac7f69ab6b2aa06307db6322834e31

                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2312172235331702440.dll

                      Filesize

                      1.1MB

                      MD5

                      16264a55b8bcc130aad580c9c9f4b20b

                      SHA1

                      8a5b5b7b29af8728104c00e8783c3dad79f166a1

                      SHA256

                      f83b57d976775ae741d3b3adf6e836c34c26080eefb387caaaa624b910e5483c

                      SHA512

                      48e85e746cd028090f780e8bf52d480abcf843c9fcfc09d89550c399f9a5ce6885e164c49bc43c7abb3d2a5cecc9cfb5bebf6ecb6964dc64d1e5d3cfd183768b

                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2312172235336714548.dll

                      Filesize

                      1005KB

                      MD5

                      ef771110b8207f73175c9b0e4f9dd5f4

                      SHA1

                      3ecb4d30578620a6d6f07fa3f6b2ac382e117843

                      SHA256

                      cd5dee65791ef7aba4d30ed35b7789526966967316b597776e80f25fbc62630d

                      SHA512

                      1d95ff648c7d653013c7ef1db0e83939be0314d92106c85fcd4b3eca6763abecefa99eeb127192106af64fedd6ab2777d1abc02ca8ee6f89082cfe953c960c46

                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2312172235342265096.dll

                      Filesize

                      1.1MB

                      MD5

                      57f8551176d1c970767cc4cf0d8accfd

                      SHA1

                      d49f25b570a13376ff8317a05a48b190eb8f8dde

                      SHA256

                      6a0a67903258604883c00e568b79b652e76c61e5c44f4134b460bf928d0b209d

                      SHA512

                      deb1363dc1c079ab54141e1cf85fccdd2f363b77df43f226537f94eec1d4e3fd9f871435b72d78c139fe409e4fe62f55113103f6b73f6c88c28da1ad7be52f39

                    • \Users\Admin\AppData\Local\Temp\is-VEK01.tmp\_isetup\_iscrypt.dll

                      Filesize

                      2KB

                      MD5

                      a69559718ab506675e907fe49deb71e9

                      SHA1

                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                      SHA256

                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                      SHA512

                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                    • \Users\Admin\AppData\Local\Temp\is-VEK01.tmp\_isetup\_isdecmp.dll

                      Filesize

                      19KB

                      MD5

                      3adaa386b671c2df3bae5b39dc093008

                      SHA1

                      067cf95fbdb922d81db58432c46930f86d23dded

                      SHA256

                      71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

                      SHA512

                      bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

                    • \Users\Admin\AppData\Local\Temp\nsz1DE4.tmp\Checker.dll

                      Filesize

                      41KB

                      MD5

                      edba22862c1f4356a90d898c929136e3

                      SHA1

                      3787fb3b063de117bb2db49676e7ee3f427abf12

                      SHA256

                      b6c7645e1fdcb4b532faaa154db6340b9593059404cb9bc0d520425905bf2556

                      SHA512

                      114098388791d0c1b8a08981be34b941fc778d052ac9ebed1099ab67154442d5ffbd5daa70590f06b9c568cce68f63177e9e34e990b21ac72ae9d4341979c744

                    • \Users\Admin\AppData\Local\Temp\nsz1DE4.tmp\Zip.dll

                      Filesize

                      76KB

                      MD5

                      fc1d046fca3c023617ca31b7713b4f13

                      SHA1

                      c6093e07ad6a193c69e317bc3489012e1603fe3f

                      SHA256

                      7529bf54ff2568df4a8c6ed9754d1e44a625403fb3b9d58abe223983b4e98ac8

                      SHA512

                      1fc29f0c23b1b6c5d37ab5aa32934c28014ca73130f0b82031d00ed6ea8959da78ef2ab917eb87b94c5391a823ede2a4101beee6806c374300f6b6a45faea35e

                    • memory/64-300-0x0000000000400000-0x0000000000414000-memory.dmp

                      Filesize

                      80KB

                    • memory/64-550-0x0000000000400000-0x0000000000414000-memory.dmp

                      Filesize

                      80KB

                    • memory/212-15-0x0000000000C50000-0x0000000000C86000-memory.dmp

                      Filesize

                      216KB

                    • memory/212-255-0x0000000008F30000-0x0000000008F38000-memory.dmp

                      Filesize

                      32KB

                    • memory/212-57-0x0000000008FA0000-0x0000000009034000-memory.dmp

                      Filesize

                      592KB

                    • memory/212-56-0x0000000000CF0000-0x0000000000D00000-memory.dmp

                      Filesize

                      64KB

                    • memory/212-250-0x0000000008F40000-0x0000000008F5A000-memory.dmp

                      Filesize

                      104KB

                    • memory/212-50-0x0000000008C60000-0x0000000008C7E000-memory.dmp

                      Filesize

                      120KB

                    • memory/212-55-0x0000000008DD0000-0x0000000008E75000-memory.dmp

                      Filesize

                      660KB

                    • memory/212-48-0x0000000008CA0000-0x0000000008CD3000-memory.dmp

                      Filesize

                      204KB

                    • memory/212-49-0x000000006FF70000-0x000000006FFBB000-memory.dmp

                      Filesize

                      300KB

                    • memory/212-47-0x000000007E870000-0x000000007E880000-memory.dmp

                      Filesize

                      64KB

                    • memory/212-16-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/212-30-0x0000000007BF0000-0x0000000007C66000-memory.dmp

                      Filesize

                      472KB

                    • memory/212-17-0x0000000006B90000-0x00000000071B8000-memory.dmp

                      Filesize

                      6.2MB

                    • memory/212-23-0x0000000007980000-0x00000000079CB000-memory.dmp

                      Filesize

                      300KB

                    • memory/212-22-0x00000000073E0000-0x00000000073FC000-memory.dmp

                      Filesize

                      112KB

                    • memory/212-271-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/212-21-0x00000000075E0000-0x0000000007930000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/212-20-0x0000000007570000-0x00000000075D6000-memory.dmp

                      Filesize

                      408KB

                    • memory/212-18-0x0000000006A10000-0x0000000006A32000-memory.dmp

                      Filesize

                      136KB

                    • memory/212-19-0x0000000007230000-0x0000000007296000-memory.dmp

                      Filesize

                      408KB

                    • memory/292-568-0x0000000002980000-0x0000000002D7C000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/292-1160-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/292-1171-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/292-564-0x0000000002E80000-0x000000000376B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/292-453-0x0000000002E80000-0x000000000376B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/292-454-0x0000000002980000-0x0000000002D7C000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/292-570-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/292-688-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/292-551-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/292-460-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/652-651-0x0000000000400000-0x0000000000488000-memory.dmp

                      Filesize

                      544KB

                    • memory/652-709-0x0000000007C40000-0x0000000008040000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/652-715-0x00007FFA52380000-0x00007FFA5255B000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/652-723-0x0000000077870000-0x0000000077A32000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/652-623-0x0000000000400000-0x0000000000488000-memory.dmp

                      Filesize

                      544KB

                    • memory/652-633-0x0000000000400000-0x0000000000488000-memory.dmp

                      Filesize

                      544KB

                    • memory/1340-476-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2328-1869-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2440-473-0x00000000000A0000-0x00000000005C8000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2744-557-0x00000000074B0000-0x00000000074C0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2744-560-0x0000000008C90000-0x0000000008CDB000-memory.dmp

                      Filesize

                      300KB

                    • memory/2744-559-0x0000000008370000-0x00000000086C0000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/2744-555-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/2744-607-0x0000000008CE0000-0x0000000008D1C000-memory.dmp

                      Filesize

                      240KB

                    • memory/2744-556-0x00000000074B0000-0x00000000074C0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2988-644-0x0000000002A60000-0x0000000002E5F000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2988-695-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2988-461-0x0000000002A60000-0x0000000002E5F000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2988-474-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2988-1174-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2988-469-0x0000000002E60000-0x000000000374B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/2988-1162-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2988-554-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/3492-272-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3492-273-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3492-13-0x0000000002DA0000-0x0000000002DB0000-memory.dmp

                      Filesize

                      64KB

                    • memory/3492-11-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3492-8-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/3604-553-0x0000000000400000-0x00000000004BC000-memory.dmp

                      Filesize

                      752KB

                    • memory/3604-332-0x00000000001F0000-0x00000000001F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3872-3-0x0000000005220000-0x00000000052B2000-memory.dmp

                      Filesize

                      584KB

                    • memory/3872-7-0x0000000005150000-0x000000000516A000-memory.dmp

                      Filesize

                      104KB

                    • memory/3872-6-0x0000000005450000-0x00000000054F4000-memory.dmp

                      Filesize

                      656KB

                    • memory/3872-5-0x0000000005550000-0x0000000005560000-memory.dmp

                      Filesize

                      64KB

                    • memory/3872-10-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/3872-4-0x00000000052C0000-0x000000000535C000-memory.dmp

                      Filesize

                      624KB

                    • memory/3872-2-0x0000000005680000-0x0000000005B7E000-memory.dmp

                      Filesize

                      5.0MB

                    • memory/3872-0-0x0000000000890000-0x000000000094C000-memory.dmp

                      Filesize

                      752KB

                    • memory/3872-1-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/4196-735-0x0000000004760000-0x0000000004B60000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/4196-748-0x0000000077870000-0x0000000077A32000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4196-726-0x0000000000A80000-0x0000000000A89000-memory.dmp

                      Filesize

                      36KB

                    • memory/4196-742-0x00007FFA52380000-0x00007FFA5255B000-memory.dmp

                      Filesize

                      1.9MB

                    • memory/4248-567-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4248-566-0x0000000073D20000-0x000000007440E000-memory.dmp

                      Filesize

                      6.9MB

                    • memory/4248-690-0x000000006D010000-0x000000006D360000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/4248-689-0x000000006CFC0000-0x000000006D00B000-memory.dmp

                      Filesize

                      300KB

                    • memory/4248-698-0x000000007E800000-0x000000007E810000-memory.dmp

                      Filesize

                      64KB

                    • memory/4248-569-0x0000000000D40000-0x0000000000D50000-memory.dmp

                      Filesize

                      64KB

                    • memory/4376-528-0x0000000000870000-0x0000000000871000-memory.dmp

                      Filesize

                      4KB

                    • memory/4376-527-0x0000000010000000-0x000000001001F000-memory.dmp

                      Filesize

                      124KB

                    • memory/4376-532-0x0000000004240000-0x0000000004E67000-memory.dmp

                      Filesize

                      12.2MB

                    • memory/4376-539-0x0000000003340000-0x000000000337A000-memory.dmp

                      Filesize

                      232KB

                    • memory/4496-558-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4496-452-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4548-481-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/5096-483-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/5096-640-0x00000000011F0000-0x0000000001718000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/5116-1874-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB