Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    299s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/02/2024, 06:00

General

  • Target

    Random.exe

  • Size

    2.5MB

  • MD5

    af49996cdbe1e9d9ca66458a06725a94

  • SHA1

    a6bd1c6a78483ba1b7ee3cb9670568684039501d

  • SHA256

    a3ca8a3d9ef3abbfdb9fbb3dc086e271f8174775066607c68fe9a07e74ba8b73

  • SHA512

    c8d2423c2df83d5d7cec894accde437f15204636d91a7c813eed7a2bcf3a8560ab5855e53a4e2038a340da7213c2489777678fde67fee9d54570f29c82b1115b

  • SSDEEP

    49152:ltNX6YES/M1lVuRk+W2gQS4v51nzzz9gt9dvZO:l3R5+o7XmvdvA

Malware Config

Signatures

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 9 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 6 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Random.exe
    "C:\Users\Admin\AppData\Local\Temp\Random.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    PID:1844
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe
        "C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe"
        3⤵
          PID:4336
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            4⤵
              PID:1204
            • C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe
              "C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe"
              4⤵
              • Executes dropped EXE
              • Checks for VirtualBox DLLs, possible anti-VM trick
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1180
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • UAC bypass
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1844
              • C:\Windows\System32\cmd.exe
                C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                5⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2960
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4744
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                5⤵
                  PID:3660
              • C:\Windows\system32\netsh.exe
                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                4⤵
                • Modifies Windows Firewall
                PID:1480
            • C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe
              "C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe"
              3⤵
                PID:2960
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3472
                • C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe
                  "C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe"
                  4⤵
                  • Executes dropped EXE
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2340
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4736
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4336
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2504
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                      PID:2348
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      5⤵
                        PID:1176
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          6⤵
                            PID:5116
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -nologo -noprofile
                            6⤵
                              PID:3756
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /delete /tn ScheduledUpdate /f
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1204
                            • C:\Windows\SYSTEM32\schtasks.exe
                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Creates scheduled task(s)
                              PID:1712
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -nologo -noprofile
                              6⤵
                                PID:3792
                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                6⤵
                                  PID:1536
                                • C:\Windows\SYSTEM32\schtasks.exe
                                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                  6⤵
                                  • Creates scheduled task(s)
                                  PID:2240
                                • C:\Windows\windefender.exe
                                  "C:\Windows\windefender.exe"
                                  6⤵
                                    PID:4668
                              • C:\Windows\system32\netsh.exe
                                netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                4⤵
                                • Modifies Windows Firewall
                                PID:2324
                            • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe
                              "C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe" --silent --allusers=0
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Enumerates connected drives
                              • Suspicious use of WriteProcessMemory
                              PID:3760
                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\q6kN4Ah16kuOpVYfSEDfpkCi.exe
                                "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\q6kN4Ah16kuOpVYfSEDfpkCi.exe" --version
                                4⤵
                                  PID:1712
                                • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe
                                  "C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3760 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240205060012" --session-guid=a7858da1-6f76-432a-b694-5e7f1ebd026d --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=AC04000000000000
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Enumerates connected drives
                                  • Suspicious use of WriteProcessMemory
                                  PID:4140
                                  • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe
                                    C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2b8,0x2bc,0x2cc,0x294,0x2d0,0x6e319558,0x6e319564,0x6e319570
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:220
                                • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe
                                  C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.70 --initial-client-data=0x2c0,0x2c4,0x2c8,0x29c,0x2cc,0x6f639558,0x6f639564,0x6f639570
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:4764
                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe
                                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe"
                                  4⤵
                                    PID:596
                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe
                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe" --version
                                    4⤵
                                      PID:424
                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe
                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=106.0.4998.16 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0xed2614,0xed2620,0xed262c
                                        5⤵
                                          PID:3832
                                    • C:\Users\Admin\Pictures\4VJpiYmKTRMwz53ibMrlFhMt.exe
                                      "C:\Users\Admin\Pictures\4VJpiYmKTRMwz53ibMrlFhMt.exe" /VERYSILENT
                                      3⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:2192
                                      • C:\Users\Admin\AppData\Local\Temp\is-8E9C8.tmp\4VJpiYmKTRMwz53ibMrlFhMt.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-8E9C8.tmp\4VJpiYmKTRMwz53ibMrlFhMt.tmp" /SL5="$302F2,831488,831488,C:\Users\Admin\Pictures\4VJpiYmKTRMwz53ibMrlFhMt.exe" /VERYSILENT
                                        4⤵
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • Suspicious use of FindShellTrayWindow
                                        PID:3076
                                    • C:\Users\Admin\Pictures\oMLaO9TqAUqisV03hQxA6GnJ.exe
                                      "C:\Users\Admin\Pictures\oMLaO9TqAUqisV03hQxA6GnJ.exe"
                                      3⤵
                                      • Executes dropped EXE
                                      PID:1288
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Random.exe" -Force
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1108
                                • C:\Windows\windefender.exe
                                  C:\Windows\windefender.exe
                                  1⤵
                                    PID:3088
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                    1⤵
                                    • Launches sc.exe
                                    PID:4784
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                    1⤵
                                      PID:3820

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      db01a2c1c7e70b2b038edf8ad5ad9826

                                      SHA1

                                      540217c647a73bad8d8a79e3a0f3998b5abd199b

                                      SHA256

                                      413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

                                      SHA512

                                      c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\additional_file0.tmp

                                      Filesize

                                      256KB

                                      MD5

                                      a7a81cbba522802577fedb513df3827f

                                      SHA1

                                      e4ec26b7b86a130fb14d6f79be712b28bcc9233a

                                      SHA256

                                      c23515803d015d281412a4b9ec6229a4629da1be2064df9dace0e6f4a77d9396

                                      SHA512

                                      f2b64933db081266bc601d4a71c161193665cf8660d1adbb52b4c02e5b11ac240077b7d428fee30b97d0d444e69f406afd3585f06bdd606700632519e583d5b8

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe

                                      Filesize

                                      126KB

                                      MD5

                                      02f688a626703abce11a995505dc687a

                                      SHA1

                                      58a0e919be89392d6afd5dda6c5093bf55374ad2

                                      SHA256

                                      b2e49b6450004cd20d7a048cde9761c39838500d7edb4b32342c1415a065209c

                                      SHA512

                                      cf9c07cffae8091ff6270e2abb1689c0aa2b59dce410e761ba41b870bfd37e8bfa43af492ce6e80ab4a38d37e1644edd8f68131bfc1d7f2e469d3f54f2f7ad28

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\Assistant_106.0.4998.16_Setup.exe_sfx.exe

                                      Filesize

                                      61KB

                                      MD5

                                      1454119fc68d4983c9554c1ef77bf844

                                      SHA1

                                      667d4db70e3c11fe737bfbdf3a6a3db0045d6b64

                                      SHA256

                                      5c74f125cdb27ff7895d2bf0fd04a3be5ded8c0beeef49e62fb1290109dc9d96

                                      SHA512

                                      db6e7811ab13ea8f4bce574ad9d210e14cad4a65982c1b907b90693b3a7dbcb1e60b9af5d74e0451a3733d9998ac209bee9b04e4faa14d0a9dc92773138aea79

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe

                                      Filesize

                                      41KB

                                      MD5

                                      c588fdb78b9588a791529c851f58a567

                                      SHA1

                                      52ee736a8463d9fdcd0d900125bea6f97a41b998

                                      SHA256

                                      453d84093c961631b381414e1c4f395b50ec7faeac18455a1bc7225130f426c3

                                      SHA512

                                      2971587039976b2c48036cc990e4e94773e6d520877843f9fca9b2195b63da66405044f4b2f82f822b8f02880c9602773396d5c6fccd6a0291daf3aef72c27d9

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\assistant_installer.exe

                                      Filesize

                                      45KB

                                      MD5

                                      dcd85a8cf9ff348f7a18e80d27c563d6

                                      SHA1

                                      ea05641355d4d48276254eb14c03b06cf03779ca

                                      SHA256

                                      800512551f4caa95afff56c0c957fc88cb860df6d88a401341a8fce9de8269f1

                                      SHA512

                                      1e997169eaedc83f84b8b34f8439958c411e5d70faa6b14e58aa9a435a98c17d4c7c706323a3a6f16c7d5ffa78511c615dcdc7318123e1079617beddc2c14f48

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbgcore.DLL

                                      Filesize

                                      6KB

                                      MD5

                                      38dc72a769274fe6aa896b4f8d5ab73c

                                      SHA1

                                      4abeefcad24e3c0ac4e4f86519a7936335c9fc0e

                                      SHA256

                                      edce1b0dc2af23cac0b5597e1131bfe213364ccd6a3b91b342f7701e5a028155

                                      SHA512

                                      9ab6486f8be811e2cb1a764d721e703aa799cf28572e0405023eee6682c12386b9d65c070ab5c6b505f93f7c890ddff3083c219b6dad64d26742317f6ef132ef

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbghelp.dll

                                      Filesize

                                      16KB

                                      MD5

                                      20245550d6766e8ed69ce05ac1987884

                                      SHA1

                                      c382721e86bba8269b3651846d3f6f03efc86b88

                                      SHA256

                                      7e828ccfcfe0d249d35023d41a429029647c0a848978731c53661036702320f1

                                      SHA512

                                      04b7007e907d64f27b494a7260cc0e61ce99caa07d32f43f0bcd337d80f9f62bb33415350b7a94e7a810869be6edfd3af67b9c1def19666e3e5506c9001617a5

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\opera_package

                                      Filesize

                                      128KB

                                      MD5

                                      a0e88f65bab1d4ea28dfb52e4e1e39a6

                                      SHA1

                                      7612798cb864b30b95a4d3e1a1b4e4a7f86164fd

                                      SHA256

                                      93882d7e1e05a9913ef98943dece25417591ed06b144666fae5e47a53661ed67

                                      SHA512

                                      b7a5870925298c126e4fb9f1078983710684136a80c9d9571394440c2c6986f5f4b14302bfe4228046697c27328666156a4e83e4f202fb1c21881cb17a49be1b

                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      169KB

                                      MD5

                                      d19e53a9179582ed8fd56063ad1a658f

                                      SHA1

                                      8586a715e3ed10d09833348a90cff50ec586c2e7

                                      SHA256

                                      1df123eaa8dcc1684a689ed8aadfebad7bf82ea5c0705cdc4c1805a5193ba3e4

                                      SHA512

                                      dded7af4684180337803c0df4e84ab7c98277a2f047fca4b6a8e3408e5c3aef2e2ab5c6f68717b884f9e579af24c8c3e0928355632ccba4b3f4c591a5c4de6eb

                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2402050600121891712.dll

                                      Filesize

                                      227KB

                                      MD5

                                      7aa50ea4a5f49de9f497d48be7271426

                                      SHA1

                                      e13bb6bcd2528f42cba105b32ef2b6f7f51e2e56

                                      SHA256

                                      71fc9badb62620ed5a0fdff8b92cf6162ad4a6b1654948daca1fb96599745ba2

                                      SHA512

                                      8d464a5847ea2a88afaaffcab31f60549294f4a6bacc5a6dba399fec810e61a725ff8a8e8b714f7a089ad1673362cb0c727ff7941e722bdcacfdc83382cc18c1

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_sfowmtn0.p1y.ps1

                                      Filesize

                                      1B

                                      MD5

                                      c4ca4238a0b923820dcc509a6f75849b

                                      SHA1

                                      356a192b7913b04c54574d18c28d46e6395428ab

                                      SHA256

                                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                      SHA512

                                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                      Filesize

                                      104KB

                                      MD5

                                      689cc860faa9771bc2b69032aa5efe80

                                      SHA1

                                      d45be151e1780ca1a75750c8fa40879cf6ed6a9b

                                      SHA256

                                      90ab9cea007a68a1178c1c8be312fe10986bdf9df254e5588706b4d5b6b8a419

                                      SHA512

                                      a185c29f7c103d59c354c142dd8fa3c695454187cfbdd0735bef1a8ef0a586ffa8b17d1f2cdf0aa1b9e0bab0a3cd0deddbce9ff17d2a80f0def589aac0dc998a

                                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                                      Filesize

                                      176KB

                                      MD5

                                      76e03c4f0e6cf6415887d4c0c0369f00

                                      SHA1

                                      dd51f9e390d193fad8b09c0134874815ff40a8e5

                                      SHA256

                                      f042f229fe6ca36dfea386bec7dd203f6f3fc04110734aa54f5f7b8a4819c7c2

                                      SHA512

                                      91e3a9d199d3ac392844171d72686a8b209e5a343bb23880d7b68b20a507f0f227207ea32b935196db330645ab00d712584f59a274d7d1a65e1ecbb9e8c90859

                                    • C:\Users\Admin\AppData\Local\Temp\is-8E9C8.tmp\4VJpiYmKTRMwz53ibMrlFhMt.tmp

                                      Filesize

                                      60KB

                                      MD5

                                      050e7d6270a73c13b85e6467e9f9456e

                                      SHA1

                                      4bedecd2b2d28a50a4920abc31740ccc897806fe

                                      SHA256

                                      a2c67b86208aa096451a53f6194a1587c4ed0c428fa5779b546a1195e8a12613

                                      SHA512

                                      c7eddfe2afa91e864fb42d7e9f93e31bf113a7e12952bf50002d2286f4897062dd07c58ced42090ef9a79cf369a9acd0baf9da861605478380aeafbdb2b89741

                                    • C:\Users\Admin\AppData\Local\Temp\is-8E9C8.tmp\4VJpiYmKTRMwz53ibMrlFhMt.tmp

                                      Filesize

                                      57KB

                                      MD5

                                      4156bb30aa6836030d80cd12b0360c78

                                      SHA1

                                      ecf540ab0f12130a9daacba1de3dfc9e446dd29c

                                      SHA256

                                      cfa57655d919d510fa67a693d367a0451cdaf96e484f00671c5e60c5a9f739ff

                                      SHA512

                                      7fb67bf1da1317a1c3f8a2781935f585ba38d484f4f0c83f95a29bbcbbbdf20b908ac8df3bff67e36d3cdb21333dbf0f03f44b24ce2b100e357b1ff510a6a673

                                    • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                      Filesize

                                      40B

                                      MD5

                                      7757cca1991fb22a7a8f17d7177425ac

                                      SHA1

                                      e1d02b1ff931ce04d136f88b32c2b0f8f6a3d225

                                      SHA256

                                      e4907625dcd9001c70f27b7139f3619eb9daaa104a862f285b0ac19a8ad364bb

                                      SHA512

                                      4d79ff2dff7b456f9a130cdff34cf80036a3d6ebca6b6c39f368f2a51d852a1327dbc7cb00f2efb088822267a2e341d409bb1c3046752bb0e43ca42b035790a6

                                    • C:\Users\Admin\Pictures\4VJpiYmKTRMwz53ibMrlFhMt.exe

                                      Filesize

                                      22KB

                                      MD5

                                      395b49a7aced8daa568f3c4c0de8d6df

                                      SHA1

                                      2b180113c43748d0372220d6d20f883a64d09d2e

                                      SHA256

                                      ce2581ca34ed6614ad5d0630098992d117b369fa90df4aaeeceff16058f96d02

                                      SHA512

                                      dbf81ba0eef0037215218fc5f8d8918e5ab5596b1d7533acec74130335c005d2e59dd76b0c9c5eca1e886e7957812a1aad8e1a2642720744c0b1949942bf700b

                                    • C:\Users\Admin\Pictures\4VJpiYmKTRMwz53ibMrlFhMt.exe

                                      Filesize

                                      123KB

                                      MD5

                                      d2bcb0c047fdafef254e05f1039b08e2

                                      SHA1

                                      dfdc7f92c6be97af85d2966bf2c84f55a0f0d896

                                      SHA256

                                      6eecfd634b1f65cce0b0f56b48480bff89e8f50e47e421cf379f85d06a0644fd

                                      SHA512

                                      fcbf8620023f7d9133f5904dd3b30d0c84f73a25ce14e09656c6afd8d732f0f428c60b026ce48e7e372c8b29b75ecede93c5692d8542ae3085ae9f14363e18d0

                                    • C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe

                                      Filesize

                                      175KB

                                      MD5

                                      a51ead54486b13db20b7093f9b861b25

                                      SHA1

                                      13e2d970070f86a8dd960b8a4929f35a1fc045e2

                                      SHA256

                                      27bb9b57b52575b1b5b71232a41b18eb7d8c455b11696c31683aaa09e1bc62fe

                                      SHA512

                                      b9ceae7a9e3b78020245193706697c3a17eb529bf5f1706d4d126763be23d0a3c7a4beb24ce18cfc4ceb6829fa5deb22b0c3eaf23109e3f9d6fbb340fa060bb7

                                    • C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe

                                      Filesize

                                      274KB

                                      MD5

                                      ef39af97a04915525ec239f6477bbbaa

                                      SHA1

                                      b259b8abc55d8892ccfbed0ba5fb394c573172e2

                                      SHA256

                                      ac12445f3fe0f562e846fe46207dd0be179edb202052b0087cd66462bc37a26c

                                      SHA512

                                      2e27d80722196c6514853f4f87c3aa0e850608818d1273086e4432484349b0e95ca29bf177d6b987fc43fa02b0aad6b6d00eaebfeaf25f826ef85fbcc5802d22

                                    • C:\Users\Admin\Pictures\7vcDZ564I4EQ3vFchPOyD2Ek.exe

                                      Filesize

                                      11KB

                                      MD5

                                      9fff6d44ebf3bc797344753bfa62b245

                                      SHA1

                                      113bcdef82c478d0121d758015de6ab341591423

                                      SHA256

                                      b73ab09bfce7542d60c526ed10044a7e5c7387218fdfec2f04bb2fd40b09b9f6

                                      SHA512

                                      312d29750c0430496ff3fee01cd84dbb05c5a635c800b2fc9f8e8d2e8e40ef1e819f1fa7a36eb5c3c5bc3995573dec23511f5d0d1f3bcbdc1124b2fca768a919

                                    • C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe

                                      Filesize

                                      276KB

                                      MD5

                                      d0723f8c119826e6dfc22b3b5a9b59f6

                                      SHA1

                                      4f4e4d275dca9756632e31f25fa74a4ea80f88d1

                                      SHA256

                                      eab1f240bcb4b08b45c10ff3083d4508093b015ae265787abfd83c339dca8baf

                                      SHA512

                                      4bfd0a91ab0f1c45bfa82cdeed8cffe8477fa7adaa0cb2e13c8bba3dca14ef23b2fc6543d660b0de4c544bca7a37f02b8743a42226d30ea071db84dfbded90ec

                                    • C:\Users\Admin\Pictures\NoBwGd5n4tN9ecNC96zK1Pcz.exe

                                      Filesize

                                      225KB

                                      MD5

                                      9bb8fc8474dfa0368a6896eac15fd9d5

                                      SHA1

                                      808a626e513a8b7b49ed238bc837024860d030cd

                                      SHA256

                                      3876736c298fad92da34c82eae7a3bb983250d120f45b1956767c739431c94db

                                      SHA512

                                      81f9d612941aff9bf91644137de242d1a5c2c76ea13760862be0b139f0fdce910eab57f09c478236ed45907177626fe206d66469d06f70c3d3952f78b4a922b1

                                    • C:\Users\Admin\Pictures\gjU6v5SaY7Q3KFsyuMX84aCq.exe

                                      Filesize

                                      7KB

                                      MD5

                                      5b423612b36cde7f2745455c5dd82577

                                      SHA1

                                      0187c7c80743b44e9e0c193e993294e3b969cc3d

                                      SHA256

                                      e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                                      SHA512

                                      c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                                    • C:\Users\Admin\Pictures\oMLaO9TqAUqisV03hQxA6GnJ.exe

                                      Filesize

                                      121KB

                                      MD5

                                      bddf429e7480e5919609e2d2b2d08320

                                      SHA1

                                      6a16843d0112972706b07383c80335dc45b22d83

                                      SHA256

                                      e6e90027319b3c92fa35564338d7eecd441ebfbd2cebca31641e765b31ba4f9b

                                      SHA512

                                      dcff05a61e917398494c0ea9dbfdbdaf34c1926be062699c8df3e133791b46af7bde3d8752f29d5ccf56f75489443f86489b0ebf03f3bfe2733d937e619c3e9b

                                    • C:\Users\Admin\Pictures\oMLaO9TqAUqisV03hQxA6GnJ.exe

                                      Filesize

                                      149KB

                                      MD5

                                      2f3be39ecd03dfac32d035ecec21021a

                                      SHA1

                                      5f83d125af3b46cdcd35cc0b0b33eb3a8d64c632

                                      SHA256

                                      00eaae970e254f4d9f798eb6805d6c5658144be89a5da1e51b654669b0ec256b

                                      SHA512

                                      bc7b640d63d1f263c6c5ca9b49b71f5f61883833de1092af06c6d3205034a8646e48d7e51e948eb8008e724c30ebf58ea255b56f05098530204e12406050f29a

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      64KB

                                      MD5

                                      f2ebda9fb346904d83c097fc2f74cb52

                                      SHA1

                                      dbdb1675856b7685baa3370d8fa53cce1421960f

                                      SHA256

                                      a6d6fc8e918f3e993b17ab9971166057801b9ceb1d7544d38ac5291b05b9bd70

                                      SHA512

                                      1f53d2575aaa7bc4e0018b2a4fb05d1671c71148003534db4f7848094bb3c8d2e04623849cc45210dc9b73e07cd45d45664a96a0b85bc39da76d8eaf5a65ee3f

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      97KB

                                      MD5

                                      f1d3b810cb451c5eecde90e6999ed0ca

                                      SHA1

                                      b59287b86b76a6b21fba11e92330bbc721b51736

                                      SHA256

                                      9acf4e445d4b73f0380467849b566c7df1cff2f56aa050be3bb20cee883f780d

                                      SHA512

                                      28bd6e6e766fe1d55c08137f2f866102a53055cc7dde67877af7ecfa2b0bf9ed1bc7f353af299ca36d0869cbc9658493ab45f12840df497d78ba99dbd302f46b

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      209KB

                                      MD5

                                      bfa3ecc353b8820d9e994c8d495048e9

                                      SHA1

                                      0a3f389d79d665c31ab91050bd849992518b000d

                                      SHA256

                                      c3741354d8582aee9dfe2761a5a4ea083dd30acabe8992e21bd6a97fde5a519f

                                      SHA512

                                      98a0d8bbaf92046a18daa0dba402707c8915848e8baa4f97c11ef665017bac320b7cd4a0f494ab24cf2d3ed79364d31e099d7cccc274f82ab775e073f79a361c

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      100KB

                                      MD5

                                      6348f098dde05611990c8ce80b15c615

                                      SHA1

                                      d5a7ba0a97d9941fda870aba362c4451d6e2fdd2

                                      SHA256

                                      d65e10425fc87f72f90699e27438d590e8137c0154d5796253f4e3294286e657

                                      SHA512

                                      992e7cbdaa96e4fe4298a3311389757fd6550940691fe266a83e9bfed58d2a6639393d02a794e3c014adc94b4a5e53bc26329fc14364696e78699b51540527a9

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      153KB

                                      MD5

                                      a0d0dc1e479a5a688675e63da4233948

                                      SHA1

                                      eb9be9245d69ecdbc3eb2db1161b14a9adc375a1

                                      SHA256

                                      20903a9c423ba765f4020237c099c2fe5a70a9e484d2dc0ecaede58bc129908f

                                      SHA512

                                      e20178ebb4acc11a3093e550eb5438473d1d162519581289bc57caab7b3c8bed505f6e5558a83d8dc06e1a9531969f0f181e2deb91f5ddc7e26d3896bc5a2043

                                    • C:\Users\Admin\Pictures\q6kN4Ah16kuOpVYfSEDfpkCi.exe

                                      Filesize

                                      181KB

                                      MD5

                                      7dfa96c2be466981ce882da97604957e

                                      SHA1

                                      a56af93c78def29d79408c9c8cd97d31a11b2868

                                      SHA256

                                      59f4afbf331450e8e208e4c39490e80b97bace17df15f33a197451c429027f38

                                      SHA512

                                      7f17155ca76e572277578a62ad44d9a4c33e86b6115c4229f3d47a4580800ea9f22fd0e92600ed2b48907008af96f4d2f4b0b97a97c09b75f786072bca9571d6

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      18KB

                                      MD5

                                      2eb15fbda52e2daebb011df84057b8c2

                                      SHA1

                                      9dbdbdb689d234ab198c5050cfdf1b4315036ecb

                                      SHA256

                                      f263f35aa0f8861d93ff0d7d8ae549012a524e687ef30b0e372c6f988feeb65d

                                      SHA512

                                      37b739042a98a589615f1055975aa93fe7121bfbfe4f244447a56846ba6b4cd10f55cb4ee7b771e85efb2cf130b301178b1b7fb23008865fed8c19892ac2aaa9

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      18KB

                                      MD5

                                      4e9b3573aa5e96f45834b34006eff3d3

                                      SHA1

                                      2050a815332f7694a774720b8a29ffb3368592c7

                                      SHA256

                                      674dcf0f157c2237ebcb388cd60e586cc41710215f72227e61107de8929cef8e

                                      SHA512

                                      37328de6dba6a0484179e317f78c91ed14f84435d8025c9c5de77c82ee57d96870a41a580b77a0229b95362c74a257a2ce8b73f6629ebb13f123eff6e3c5a60e

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      18KB

                                      MD5

                                      764262926415fe27439f9092cafae12e

                                      SHA1

                                      ef60d8b1c61d692d55b1e81def96427491bc6c49

                                      SHA256

                                      58b2081ba8b02d7548933f8649d8183c57330cdb10a10673613678a4965e8580

                                      SHA512

                                      84e2ef42f3bfdf94bc60b143a8506ad4819fdec238424314af8cf39152e528b3945258288552b3a2038eeee31315427892d209f2a2e71be5f1b418ede0ee6c3c

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      18KB

                                      MD5

                                      f0f4f2fd044e09071d73840f0c96fb2f

                                      SHA1

                                      15bafb2e4481ebed31965eb9be89f99482ed3044

                                      SHA256

                                      6b998bce865c86c0d8d11f04a8e7e6ef5f237e60f07edd45d9f5228e5f7966a3

                                      SHA512

                                      c4356577c23ad21bc4c04ecd5560b96e956d117fc6b0bf72a35441b1bbb9149282d1ee0c6ac771ea837777f8772e1126554377d2556790a13b64dea021c72e6a

                                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                      Filesize

                                      9KB

                                      MD5

                                      61939991e12d7078c05da874603d49d2

                                      SHA1

                                      eec4d0cbce04d77a4f6cdfe0726dab294ed19c41

                                      SHA256

                                      84ec35ecef33fadc0082934bc4fcb9211edaa3cc7e2a8c169d7d713036dcdd5d

                                      SHA512

                                      5eac50c7a920f534ac194463f427dcc986ac6cb3a9a5fa43478903cbdadd2f6b1bd32ba24131e2731c4fda900baedbf5cdf16a8638d456978f0585410b542a5f

                                    • C:\Windows\rss\csrss.exe

                                      Filesize

                                      46KB

                                      MD5

                                      744aebede80fa4a6c9cecf0b8ab53e8b

                                      SHA1

                                      358e2233caa37d0ee322a414328ab953abda2c62

                                      SHA256

                                      2471a161611cd3609c57c489121e52045b440e37948eff6a4a8d655fe67412ea

                                      SHA512

                                      2236f7f550d05f4374e37104b6ea0941bdf8f41e6f9331db15cb6e079b3238cd8829bd69eef1c00d6d9d26f3a0650c73dfbd85907ffcc3087fefdec18ad5d1bc

                                    • C:\Windows\rss\csrss.exe

                                      Filesize

                                      205KB

                                      MD5

                                      a456b02b1d4c825e2194c65e9d358134

                                      SHA1

                                      e0793f3101fc24666455dae971faec3ab3553169

                                      SHA256

                                      a4404f096b0d227c8d481ee59cba8abee844aea7673d9a04e92ed14ae075a0ca

                                      SHA512

                                      218ab4a81dcd29d8a53d596c8d6eed1cb2287543192edb2df4f00846ce5f63a78687cefaf8e1197a3dd60b2b16ca2a0041ee255f544ff5eb8aeb790c5199bb1a

                                    • C:\Windows\rss\csrss.exe

                                      Filesize

                                      180KB

                                      MD5

                                      a449a45140ee0de22b353a86a1688db7

                                      SHA1

                                      8d299da1ddbe62c57fb7a43d89892314e565e22f

                                      SHA256

                                      82c3b45c77c8e75c7961b03d5e503f7f7410afbbabcd20666bb224211c23a4b8

                                      SHA512

                                      e475cfa580890037356b7e0d3dbdef401d9300645e55ede27c5413450c3f5b3a40501f09858c32763841198477a4b66e36ac377258494f34ae381e21ee9b45dd

                                    • C:\Windows\windefender.exe

                                      Filesize

                                      470KB

                                      MD5

                                      9a2c05805e89fa2d06511dabcfebaaeb

                                      SHA1

                                      125f1c63b1a19fb527f19071a190ee3d84c4a2a8

                                      SHA256

                                      437d91d5c188e130a325cdcc7898de24b92897bc05e966310d6c0e876c7ab529

                                      SHA512

                                      14438d73653b9795fe548c814015c4fa7673a985e055703674ef1266a47ba75032d188622b6a228f4e06bcfcdef3fe93c29af2e5cf9971ac2f91faf3a030f2c9

                                    • C:\Windows\windefender.exe

                                      Filesize

                                      68KB

                                      MD5

                                      9dadd285cc6f03bdec80dd61a2c3c718

                                      SHA1

                                      31bdebb63285f11e4b65abe0d9d3e04ac1244944

                                      SHA256

                                      60353bf6310aacff219cd333137f31809c28d26ab344addb1004b27237c69a79

                                      SHA512

                                      dfa4aff514185d0d740e49202217219314accc78901933875bad2468b9f7d8af4e746efc7ff75c7ca4aa41f17b1af27df0778daa89ad56165daa1989a6f096aa

                                    • C:\Windows\windefender.exe

                                      Filesize

                                      76KB

                                      MD5

                                      170fff489317a3365b346d9ac45eb04f

                                      SHA1

                                      65c7df95c97d83fd57427849ae9d3eae3932e2e5

                                      SHA256

                                      564e84d8121edc4d0f1365dfcee61b82b3618a64f98aca36dc242570d473e048

                                      SHA512

                                      7109e5bf244aeef7045ef62315c2f797a791c371ea478a7c1bb71edf8f0ee25867316469260e788f51a7c7453ecf021433779dd869dc8034c94bb3a34843f5c1

                                    • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbgcore.dll

                                      Filesize

                                      44KB

                                      MD5

                                      3bc0293aba80daf71f9686e086a422b7

                                      SHA1

                                      03bcc2ff6a98194a5066769e3fe20d99351fa2f5

                                      SHA256

                                      5c897c12a0ff9701264f0471d421746d8c4de4a1f4ed70fd52bd641347db38b7

                                      SHA512

                                      31f8ed49eda0f5dfa936b6543d78c64aba6fc91be01a6b46869767ac6c7953b1a04101462a219a4a62d7093c8fc34f1af54338217dbd5a60f761085687af851e

                                    • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbgcore.dll

                                      Filesize

                                      28KB

                                      MD5

                                      e4b452c6c16049dc87984257cf5a8103

                                      SHA1

                                      f95eab889f8a59759af399f1cfd408b04290e87c

                                      SHA256

                                      56a395ef91111fbefdbb825759f8ab78459fd8ebe46dbff060741869bc9a0b3b

                                      SHA512

                                      4157ded0ef23094f9c43ef8141506f7e5e30a2a8a7ac7caf04114264f41592d4c48b460eaf0c48d069d4af34f4c80a64ebe19f33959869cc3fb02aec24ef7c25

                                    • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbghelp.dll

                                      Filesize

                                      42KB

                                      MD5

                                      51f96a72f536b197951d44b06837741c

                                      SHA1

                                      18f3e9ac9778a925f2474ef3f524bd4c2aa46811

                                      SHA256

                                      1621038f4f6cca551b212d635a03af3ac8d0a1ae6e17c5ec046189715bc45bdd

                                      SHA512

                                      114bfa20bf3217bc59f831ded3910e997713e04c2ca8bbf3a669c2cd739123a7612f1cd5bb19ea9f82ef9bdc0905bcb5fd0159c21a6f82afa99ce6583a20f38b

                                    • \Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202402050600121\assistant\dbghelp.dll

                                      Filesize

                                      252KB

                                      MD5

                                      d0016bf86c170cf120d4f6c2d918e9f2

                                      SHA1

                                      b6e4152aeca3d1bfd09ba661ca0dc5f656af9609

                                      SHA256

                                      fede7a9d45e5f5582a06e63704115094a5ce11f7d54a4cecaf738e8d78c438da

                                      SHA512

                                      0b3ced021590948b59ac282308df4157a85bf23d0fe23d1ed49943ab92093d1a47dc96f0105056f737ee52ebe214569f531d86c8af53aeff68b12a09fe78d308

                                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2402050600117823760.dll

                                      Filesize

                                      197KB

                                      MD5

                                      9fb66edd76207b220bd599b279282cfe

                                      SHA1

                                      e2920008424cbdda87263577d85e938337c9d92a

                                      SHA256

                                      4c63fdb674c2149c80e3d3a4f81ccbb346c5c6f19760163cd73f64773621ba5b

                                      SHA512

                                      8f388ccc3562729dcc728109ac1474d8f231ba4ae803239d13af5f2b00cfc238b277d314f0090552be02beef36f6366b8ff4dbae28ea7cc78219be216b5ae9ac

                                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2402050600119234764.dll

                                      Filesize

                                      212KB

                                      MD5

                                      894b17e70788459988875d7404aa5e53

                                      SHA1

                                      13a1b6ae2199047d8422fea581a512bab9f501f2

                                      SHA256

                                      4cf756611870861408f64716ea531184fbace143d7ae1cd5802e658313fe59ea

                                      SHA512

                                      4d0584cc87384efc0b7690d35a590980b24cef9ea22ea1fa672512739692a9130533fccda1a534dd01c12051a04958cab882d0c288894f34905a8b52659b877a

                                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2402050600121891712.dll

                                      Filesize

                                      86KB

                                      MD5

                                      6474d82f187119d556d3ff193355a20e

                                      SHA1

                                      6ee1b57d4c9dde73418e517bf4de910db78f427e

                                      SHA256

                                      8d363bf7a2b703fae20cda10fdccb6a113fd7991ac52e8401506160ee08fc41a

                                      SHA512

                                      8e48ff6c7f27f5a430966377cdd23bb2cf8bbf9a7976efbdec3c523e93227625a5b5f2db0ce8fd860e5ff312ae111b6505f59d1ea80e35abfd88060a4bbf9ee4

                                    • \Users\Admin\AppData\Local\Temp\Opera_installer_2402050600123764140.dll

                                      Filesize

                                      182KB

                                      MD5

                                      173778bc10ab87661a5cb907776ca9e3

                                      SHA1

                                      a65a60cd440f7817df68be13b374d5f73dcbb5c9

                                      SHA256

                                      29eb585c15e2b3b25b7c33516f9e6cc71832a399672cdde66361dacc3e5d7416

                                      SHA512

                                      70caf0d1c7d4b9d89481a8be1e805a594b1dcccff648bff5d8f9ce3311c94296b6fe52d4ae7bb56363fc8a7e3c869640f12b6761744826c8598b3198df348e36

                                    • \Users\Admin\AppData\Local\Temp\Opera_installer_240205060012861220.dll

                                      Filesize

                                      73KB

                                      MD5

                                      122f7554ae14c39022e517c403185d34

                                      SHA1

                                      1fb6fd9f569425a85cb54e3dbe01135ec5fdf7c1

                                      SHA256

                                      3911ad9f600af9990d434c8ac12bdba0eed7a168d2ebf761c1aa157c258dc722

                                      SHA512

                                      8bf5adaee35ff59172f983447d1d05676d27a06cc322c5fb50a9147569af3ce9f1ebc8b698ce2ae7591de62d7e72696953e3ad5a5970db08a3ac416e4f1da52b

                                    • memory/220-344-0x0000000000880000-0x0000000000D68000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/220-868-0x0000000000880000-0x0000000000D68000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/1108-33-0x0000000007B00000-0x0000000007B76000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/1108-19-0x00000000064D0000-0x00000000064E0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1108-16-0x0000000006410000-0x0000000006446000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/1108-18-0x00000000064D0000-0x00000000064E0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1108-21-0x0000000006AE0000-0x0000000006B02000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/1108-23-0x0000000007290000-0x00000000072F6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/1108-24-0x0000000007510000-0x0000000007860000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/1108-51-0x0000000008C60000-0x0000000008C93000-memory.dmp

                                      Filesize

                                      204KB

                                    • memory/1108-20-0x0000000006B10000-0x0000000007138000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/1108-25-0x0000000007880000-0x000000000789C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/1108-15-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/1108-26-0x0000000007E20000-0x0000000007E6B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/1108-22-0x00000000071B0000-0x0000000007216000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/1108-53-0x0000000008C40000-0x0000000008C5E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/1108-52-0x0000000070560000-0x00000000705AB000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/1108-253-0x0000000008F20000-0x0000000008F3A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1108-290-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/1108-58-0x0000000008DA0000-0x0000000008E45000-memory.dmp

                                      Filesize

                                      660KB

                                    • memory/1108-258-0x0000000008F10000-0x0000000008F18000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/1108-50-0x000000007EAB0000-0x000000007EAC0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1108-59-0x00000000064D0000-0x00000000064E0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1108-60-0x0000000008F70000-0x0000000009004000-memory.dmp

                                      Filesize

                                      592KB

                                    • memory/1176-3326-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-1498-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-2582-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-1994-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-2004-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-2409-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1180-2579-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/1204-321-0x0000000006610000-0x0000000006620000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1204-499-0x000000006E400000-0x000000006E750000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/1204-312-0x0000000006610000-0x0000000006620000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1204-505-0x000000007E5B0000-0x000000007E5C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1204-305-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/1204-497-0x000000006DF40000-0x000000006DF8B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/1204-510-0x0000000009850000-0x00000000098F5000-memory.dmp

                                      Filesize

                                      660KB

                                    • memory/1712-333-0x00000000009F0000-0x0000000000ED8000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/1844-1-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/1844-7-0x0000000005570000-0x00000000057FA000-memory.dmp

                                      Filesize

                                      2.5MB

                                    • memory/1844-8-0x0000000005010000-0x000000000502A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/1844-6-0x0000000004D00000-0x0000000004D0A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1844-5-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1844-11-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/1844-3-0x0000000004B70000-0x0000000004C02000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/1844-4-0x0000000004C10000-0x0000000004CAC000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/1844-0-0x0000000000010000-0x00000000002A0000-memory.dmp

                                      Filesize

                                      2.6MB

                                    • memory/1844-2-0x0000000005070000-0x000000000556E000-memory.dmp

                                      Filesize

                                      5.0MB

                                    • memory/2128-12-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2128-334-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/2128-338-0x0000000005150000-0x0000000005160000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2128-17-0x0000000005150000-0x0000000005160000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2128-9-0x0000000000400000-0x0000000000408000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/2192-418-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/2192-476-0x0000000000400000-0x00000000004D8000-memory.dmp

                                      Filesize

                                      864KB

                                    • memory/2340-2411-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2340-1499-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2340-2005-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2340-2572-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2340-1995-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2960-498-0x0000000002A10000-0x0000000002E09000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/2960-294-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2960-990-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2960-971-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2960-983-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/2960-292-0x0000000002F10000-0x00000000037FB000-memory.dmp

                                      Filesize

                                      8.9MB

                                    • memory/2960-291-0x0000000002A10000-0x0000000002E09000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/3076-441-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3076-472-0x0000000000400000-0x000000000071A000-memory.dmp

                                      Filesize

                                      3.1MB

                                    • memory/3472-508-0x000000006DF40000-0x000000006DF8B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/3472-509-0x000000007EBA0000-0x000000007EBB0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3472-309-0x0000000073B50000-0x000000007423E000-memory.dmp

                                      Filesize

                                      6.9MB

                                    • memory/3472-313-0x0000000007400000-0x0000000007410000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3472-342-0x0000000008C00000-0x0000000008C4B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/3472-314-0x0000000007400000-0x0000000007410000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3472-322-0x00000000081A0000-0x00000000084F0000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3472-385-0x0000000008C60000-0x0000000008C9C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/3472-511-0x000000006E400000-0x000000006E750000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3760-317-0x0000000000880000-0x0000000000D68000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/4140-341-0x0000000000880000-0x0000000000D68000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/4336-986-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/4336-293-0x0000000002960000-0x0000000002D68000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/4336-502-0x0000000002960000-0x0000000002D68000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/4336-974-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/4336-984-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/4336-295-0x0000000000400000-0x0000000000D1C000-memory.dmp

                                      Filesize

                                      9.1MB

                                    • memory/4668-3334-0x0000000000400000-0x00000000008DF000-memory.dmp

                                      Filesize

                                      4.9MB

                                    • memory/4764-323-0x0000000000880000-0x0000000000D68000-memory.dmp

                                      Filesize

                                      4.9MB