Analysis
-
max time kernel
67s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-03-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe
Resource
win11-20240221-en
General
-
Target
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe
-
Size
1.8MB
-
MD5
4568f01beecde7da90031897af161569
-
SHA1
0760f3477bea16b74b9821f0b788efccd0b3cfd9
-
SHA256
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f
-
SHA512
67f8eb8e1dcae4635b3655a107821c37c659a361adaf378c9b8784dfe0c3bece92696ee6020296a1f33237b9ed6bc8acf39274b8ef59675f6680a5e6e8e71d8a
-
SSDEEP
49152:vl9b0KkR2gLGPEJKs3TwnWoJuDbeNWPrWyv:vl9bPwlj2H8/eoP
Malware Config
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
amadey
4.18
http://193.233.132.56
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Extracted
smokeloader
pub1
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Extracted
smokeloader
2022
http://trad-einmyus.com/index.php
http://tradein-myus.com/index.php
http://trade-inmyus.com/index.php
Signatures
-
Detect ZGRat V1 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Pictures\VWeSVBkAkJCbmnr6EzqZl9pp.exe family_zgrat_v1 C:\Users\Admin\Pictures\VWeSVBkAkJCbmnr6EzqZl9pp.exe family_zgrat_v1 -
Glupteba payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/412-578-0x0000000000400000-0x0000000000ED5000-memory.dmp family_glupteba -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exeexplorha.exe87f58b9d28.exeexplorha.exeamadka.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87f58b9d28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorha.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ amadka.exe -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exeflow pid process 5 2848 rundll32.exe 6 5048 rundll32.exe 18 4692 rundll32.exe 29 4932 rundll32.exe -
Downloads MZ/PE file
-
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 4664 netsh.exe 5404 netsh.exe 5444 netsh.exe 5260 netsh.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorha.exeexplorha.exeamadka.exedc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe87f58b9d28.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorha.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion amadka.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87f58b9d28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87f58b9d28.exe -
Executes dropped EXE 14 IoCs
Processes:
explorha.exe87f58b9d28.exelumma21.exechrosha.exeexplorha.exeamadka.exelummalg.exeboom8.exeISetup8.exetoolspub1.exeu2h8.0.exeu2h8.1.exe4767d2e713f2021e8fe856e3ea638b58.exefile300un.exepid process 1328 explorha.exe 3776 87f58b9d28.exe 3796 lumma21.exe 5020 chrosha.exe 1696 explorha.exe 352 amadka.exe 4272 lummalg.exe 3864 boom8.exe 3212 ISetup8.exe 3424 toolspub1.exe 4696 u2h8.0.exe 2260 u2h8.1.exe 412 4767d2e713f2021e8fe856e3ea638b58.exe 4272 file300un.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exeexplorha.exe87f58b9d28.exeexplorha.exeamadka.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Wine dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Wine 87f58b9d28.exe Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Wine explorha.exe Key opened \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Wine amadka.exe -
Loads dropped DLL 8 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exeu2h8.0.exepid process 5108 rundll32.exe 2848 rundll32.exe 5048 rundll32.exe 2200 rundll32.exe 4692 rundll32.exe 4932 rundll32.exe 4696 u2h8.0.exe 4696 u2h8.0.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\Pictures\FWPtU52lFekFhmxo7MWBsqJx.exe themida behavioral2/memory/3804-743-0x00007FF72FD60000-0x00007FF730740000-memory.dmp themida behavioral2/memory/3804-757-0x00007FF72FD60000-0x00007FF730740000-memory.dmp themida behavioral2/memory/3804-765-0x00007FF72FD60000-0x00007FF730740000-memory.dmp themida -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\u2h8.1.exe upx C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe upx C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe upx C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe upx behavioral2/memory/236-693-0x0000000000110000-0x0000000000648000-memory.dmp upx -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
explorha.exechrosha.exefile300un.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\87f58b9d28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000022001\\87f58b9d28.exe" explorha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\amadka.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000053001\\amadka.exe" chrosha.exe Set value (str) \REGISTRY\USER\S-1-5-21-3084248216-1643706459-906455512-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\.BLRVzdv\\svchost.exe\"" file300un.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
Processes:
flow ioc 22 pastebin.com 30 pastebin.com 36 drive.google.com 104 drive.google.com -
Looks up external IP address via web service 6 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 36 api.2ip.ua 53 api.myip.com 55 ipinfo.io 74 api.myip.com 76 ipinfo.io 91 api.2ip.ua -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exeexplorha.exeexplorha.exeamadka.exepid process 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe 1328 explorha.exe 1696 explorha.exe 352 amadka.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
lummalg.exefile300un.exedescription pid process target process PID 4272 set thread context of 4672 4272 lummalg.exe RegAsm.exe PID 4272 set thread context of 2432 4272 file300un.exe jsc.exe -
Drops file in Windows directory 2 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exelumma21.exedescription ioc process File created C:\Windows\Tasks\explorha.job dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe File created C:\Windows\Tasks\chrosha.job lumma21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 15 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2976 4672 WerFault.exe RegAsm.exe 3116 3212 WerFault.exe ISetup8.exe 3220 244 WerFault.exe pKCSAcK5319N0JtChqMvcnTK.exe 1576 2832 WerFault.exe RegAsm.exe 432 2720 WerFault.exe 8I9aft4ragcKbDIfi5IbJmCC.exe 1436 2832 WerFault.exe RegAsm.exe 5860 3876 WerFault.exe hFVJ3WTGf1hrh4SvftorQexs.exe 5984 4696 WerFault.exe u2h8.0.exe 4784 4408 WerFault.exe u23k.0.exe 1636 4444 WerFault.exe u6s.0.exe 3624 3920 WerFault.exe BEA9.exe 232 4496 WerFault.exe 4232.exe 800 4904 WerFault.exe RegAsm.exe 5176 4904 WerFault.exe RegAsm.exe 3700 4904 WerFault.exe RegAsm.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
toolspub1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI toolspub1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
u2h8.0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u2h8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u2h8.0.exe -
Creates scheduled task(s) 1 TTPs 8 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4980 schtasks.exe 4336 schtasks.exe 2016 schtasks.exe 4648 schtasks.exe 5588 schtasks.exe 2312 schtasks.exe 5880 schtasks.exe 5640 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exeexplorha.exerundll32.exepowershell.exeexplorha.exeamadka.exerundll32.exetoolspub1.exeu2h8.0.exepowershell.exepid process 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe 1328 explorha.exe 1328 explorha.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 3616 powershell.exe 3616 powershell.exe 1696 explorha.exe 1696 explorha.exe 352 amadka.exe 352 amadka.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 3424 toolspub1.exe 3424 toolspub1.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4692 rundll32.exe 4696 u2h8.0.exe 4696 u2h8.0.exe 1220 powershell.exe 3276 3276 3276 3276 3276 3276 3276 3276 1220 powershell.exe 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
toolspub1.exepid process 3424 toolspub1.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exejsc.exedescription pid process Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 1220 powershell.exe Token: SeShutdownPrivilege 3276 Token: SeCreatePagefilePrivilege 3276 Token: SeShutdownPrivilege 3276 Token: SeCreatePagefilePrivilege 3276 Token: SeShutdownPrivilege 3276 Token: SeCreatePagefilePrivilege 3276 Token: SeShutdownPrivilege 3276 Token: SeCreatePagefilePrivilege 3276 Token: SeShutdownPrivilege 3276 Token: SeCreatePagefilePrivilege 3276 Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 3852 powershell.exe Token: SeDebugPrivilege 2432 jsc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exepid process 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
u2h8.1.exepid process 2260 u2h8.1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exeexplorha.exerundll32.exerundll32.exechrosha.exelummalg.exeboom8.exerundll32.exerundll32.exeISetup8.exedescription pid process target process PID 2440 wrote to memory of 1328 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe explorha.exe PID 2440 wrote to memory of 1328 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe explorha.exe PID 2440 wrote to memory of 1328 2440 dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe explorha.exe PID 1328 wrote to memory of 3776 1328 explorha.exe 87f58b9d28.exe PID 1328 wrote to memory of 3776 1328 explorha.exe 87f58b9d28.exe PID 1328 wrote to memory of 3776 1328 explorha.exe 87f58b9d28.exe PID 1328 wrote to memory of 2384 1328 explorha.exe explorha.exe PID 1328 wrote to memory of 2384 1328 explorha.exe explorha.exe PID 1328 wrote to memory of 2384 1328 explorha.exe explorha.exe PID 1328 wrote to memory of 3796 1328 explorha.exe lumma21.exe PID 1328 wrote to memory of 3796 1328 explorha.exe lumma21.exe PID 1328 wrote to memory of 3796 1328 explorha.exe lumma21.exe PID 1328 wrote to memory of 5108 1328 explorha.exe rundll32.exe PID 1328 wrote to memory of 5108 1328 explorha.exe rundll32.exe PID 1328 wrote to memory of 5108 1328 explorha.exe rundll32.exe PID 5108 wrote to memory of 2848 5108 rundll32.exe rundll32.exe PID 5108 wrote to memory of 2848 5108 rundll32.exe rundll32.exe PID 2848 wrote to memory of 780 2848 rundll32.exe netsh.exe PID 2848 wrote to memory of 780 2848 rundll32.exe netsh.exe PID 2848 wrote to memory of 3616 2848 rundll32.exe powershell.exe PID 2848 wrote to memory of 3616 2848 rundll32.exe powershell.exe PID 1328 wrote to memory of 5048 1328 explorha.exe rundll32.exe PID 1328 wrote to memory of 5048 1328 explorha.exe rundll32.exe PID 1328 wrote to memory of 5048 1328 explorha.exe rundll32.exe PID 5020 wrote to memory of 352 5020 chrosha.exe amadka.exe PID 5020 wrote to memory of 352 5020 chrosha.exe amadka.exe PID 5020 wrote to memory of 352 5020 chrosha.exe amadka.exe PID 5020 wrote to memory of 4272 5020 chrosha.exe lummalg.exe PID 5020 wrote to memory of 4272 5020 chrosha.exe lummalg.exe PID 5020 wrote to memory of 4272 5020 chrosha.exe lummalg.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 4272 wrote to memory of 4672 4272 lummalg.exe RegAsm.exe PID 5020 wrote to memory of 3864 5020 chrosha.exe boom8.exe PID 5020 wrote to memory of 3864 5020 chrosha.exe boom8.exe PID 5020 wrote to memory of 3864 5020 chrosha.exe boom8.exe PID 3864 wrote to memory of 4336 3864 boom8.exe schtasks.exe PID 3864 wrote to memory of 4336 3864 boom8.exe schtasks.exe PID 3864 wrote to memory of 4336 3864 boom8.exe schtasks.exe PID 3864 wrote to memory of 3212 3864 boom8.exe ISetup8.exe PID 3864 wrote to memory of 3212 3864 boom8.exe ISetup8.exe PID 3864 wrote to memory of 3212 3864 boom8.exe ISetup8.exe PID 5020 wrote to memory of 2200 5020 chrosha.exe rundll32.exe PID 5020 wrote to memory of 2200 5020 chrosha.exe rundll32.exe PID 5020 wrote to memory of 2200 5020 chrosha.exe rundll32.exe PID 2200 wrote to memory of 4692 2200 rundll32.exe rundll32.exe PID 2200 wrote to memory of 4692 2200 rundll32.exe rundll32.exe PID 4692 wrote to memory of 1352 4692 rundll32.exe netsh.exe PID 4692 wrote to memory of 1352 4692 rundll32.exe netsh.exe PID 3864 wrote to memory of 3424 3864 boom8.exe toolspub1.exe PID 3864 wrote to memory of 3424 3864 boom8.exe toolspub1.exe PID 3864 wrote to memory of 3424 3864 boom8.exe toolspub1.exe PID 3212 wrote to memory of 4696 3212 ISetup8.exe u2h8.0.exe PID 3212 wrote to memory of 4696 3212 ISetup8.exe u2h8.0.exe PID 3212 wrote to memory of 4696 3212 ISetup8.exe u2h8.0.exe PID 4692 wrote to memory of 1220 4692 rundll32.exe powershell.exe PID 4692 wrote to memory of 1220 4692 rundll32.exe powershell.exe PID 3212 wrote to memory of 2260 3212 ISetup8.exe u2h8.1.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe"C:\Users\Admin\AppData\Local\Temp\dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\1000022001\87f58b9d28.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\87f58b9d28.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
PID:3776
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"3⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"C:\Users\Admin\AppData\Local\Temp\1000035001\lumma21.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3796
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\netsh.exenetsh wlan show profiles5⤵PID:780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084248216164_Desktop.zip' -CompressionLevel Optimal5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exeC:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\1000053001\amadka.exe"C:\Users\Admin\AppData\Local\Temp\1000053001\amadka.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:352
-
-
C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"C:\Users\Admin\AppData\Local\Temp\1000063001\lummalg.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4672 -s 7164⤵
- Program crash
PID:2976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN boom8.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe" /F3⤵
- Creates scheduled task(s)
PID:4336
-
-
C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"C:\Users\Admin\AppData\Local\Temp\1000172001\ISetup8.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\u2h8.0.exe"C:\Users\Admin\AppData\Local\Temp\u2h8.0.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\JEHJKJEBGH.exe"5⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\JEHJKJEBGH.exe"C:\Users\Admin\AppData\Local\Temp\JEHJKJEBGH.exe"6⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 2.2.2.2 -n 1 -w 3000 > Nul & Del C:\Users\Admin\AppData\Local\Temp\JEHJKJEBGH.exe7⤵PID:2700
-
C:\Windows\SysWOW64\PING.EXEping 2.2.2.2 -n 1 -w 30008⤵
- Runs ping.exe
PID:2328
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 24805⤵
- Program crash
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2h8.1.exe"C:\Users\Admin\AppData\Local\Temp\u2h8.1.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "5⤵PID:844
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F6⤵
- Creates scheduled task(s)
PID:2016
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 9964⤵
- Program crash
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"C:\Users\Admin\AppData\Local\Temp\1000173001\toolspub1.exe"3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3424
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"3⤵
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"C:\Users\Admin\AppData\Local\Temp\1000174001\4767d2e713f2021e8fe856e3ea638b58.exe"4⤵PID:5864
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"5⤵PID:5172
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes6⤵
- Modifies Windows Firewall
PID:4664
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2348
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5740
-
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\system32\netsh.exenetsh wlan show profiles4⤵PID:1352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\084248216164_Desktop.zip' -CompressionLevel Optimal4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main2⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"C:\Users\Admin\AppData\Local\Temp\1000085001\file300un.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
PID:4272 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\system32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"' & exit3⤵PID:3664
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\.BLRVzdv\svchost.exe"'4⤵
- Creates scheduled task(s)
PID:4648
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:3868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Users\Admin\Pictures\pKCSAcK5319N0JtChqMvcnTK.exe"C:\Users\Admin\Pictures\pKCSAcK5319N0JtChqMvcnTK.exe"4⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\u6s.0.exe"C:\Users\Admin\AppData\Local\Temp\u6s.0.exe"5⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 10966⤵
- Program crash
PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\u6s.1.exe"C:\Users\Admin\AppData\Local\Temp\u6s.1.exe"5⤵PID:3292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:3904
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:1436
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:5588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 12365⤵
- Program crash
PID:3220
-
-
-
C:\Users\Admin\Pictures\8I9aft4ragcKbDIfi5IbJmCC.exe"C:\Users\Admin\Pictures\8I9aft4ragcKbDIfi5IbJmCC.exe"4⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\u23k.0.exe"C:\Users\Admin\AppData\Local\Temp\u23k.0.exe"5⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 10966⤵
- Program crash
PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\u23k.1.exe"C:\Users\Admin\AppData\Local\Temp\u23k.1.exe"5⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Task.bat" "6⤵PID:1576
-
C:\Windows\SysWOW64\chcp.comchcp 12517⤵PID:5628
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "MalayamaraUpdate" /tr "'C:\Users\Admin\AppData\Local\Temp\Updater.exe'" /sc minute /mo 30 /F7⤵
- Creates scheduled task(s)
PID:5880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 15325⤵
- Program crash
PID:432
-
-
-
C:\Users\Admin\Pictures\hFVJ3WTGf1hrh4SvftorQexs.exe"C:\Users\Admin\Pictures\hFVJ3WTGf1hrh4SvftorQexs.exe"4⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 23565⤵
- Program crash
PID:5860
-
-
-
C:\Users\Admin\Pictures\VWeSVBkAkJCbmnr6EzqZl9pp.exe"C:\Users\Admin\Pictures\VWeSVBkAkJCbmnr6EzqZl9pp.exe"4⤵PID:4988
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 5406⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 5366⤵
- Program crash
PID:1436
-
-
-
-
C:\Users\Admin\Pictures\zmCU8saDkkWUujiQbnSCrRg0.exe"C:\Users\Admin\Pictures\zmCU8saDkkWUujiQbnSCrRg0.exe"4⤵PID:4648
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:2428
-
-
C:\Users\Admin\Pictures\zmCU8saDkkWUujiQbnSCrRg0.exe"C:\Users\Admin\Pictures\zmCU8saDkkWUujiQbnSCrRg0.exe"5⤵PID:3092
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1056
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5148
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5404
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:1596
-
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe6⤵PID:2244
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:4212
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F7⤵
- Creates scheduled task(s)
PID:4980
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f7⤵PID:784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile7⤵PID:4496
-
-
-
-
-
C:\Users\Admin\Pictures\QUnLKjpHkZKEOOkx1p8f4SoX.exe"C:\Users\Admin\Pictures\QUnLKjpHkZKEOOkx1p8f4SoX.exe"4⤵PID:1012
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:1804
-
-
C:\Users\Admin\Pictures\QUnLKjpHkZKEOOkx1p8f4SoX.exe"C:\Users\Admin\Pictures\QUnLKjpHkZKEOOkx1p8f4SoX.exe"5⤵PID:5192
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5428
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5548
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5260
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5660
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:3476
-
-
-
-
C:\Users\Admin\Pictures\Rc8Nzuh79gBPl5QiIvZJYoip.exe"C:\Users\Admin\Pictures\Rc8Nzuh79gBPl5QiIvZJYoip.exe"4⤵PID:2488
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile5⤵PID:5124
-
-
C:\Users\Admin\Pictures\Rc8Nzuh79gBPl5QiIvZJYoip.exe"C:\Users\Admin\Pictures\Rc8Nzuh79gBPl5QiIvZJYoip.exe"5⤵PID:3552
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:4312
-
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"6⤵PID:5076
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes7⤵
- Modifies Windows Firewall
PID:5444
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile6⤵PID:5184
-
-
-
-
C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe"C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe" --silent --allusers=04⤵PID:3028
-
C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exeC:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x300,0x304,0x308,0x2dc,0x320,0x6e3721f8,0x6e372204,0x6e3722105⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\nfa15Iyj8QUYA2MDXxIu2uRn.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\nfa15Iyj8QUYA2MDXxIu2uRn.exe" --version5⤵PID:236
-
-
C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe"C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3028 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240324185741" --session-guid=b7a1a9d0-87e8-48bb-9667-d8dd1dcf939b --server-tracking-blob=MzkwM2MyM2E1ZWVjYTEwODhlODkwNTc2MDNiODY5OWZkNjAyZWVlZTVjMTVlNTE1MjUwZTI3MGE3YWJjYWJiMjp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjExIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcxMTMwNjY1Ny4wNjY0IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiJlNDY5MTZjZS1kMTNmLTQzYTEtODc4Yi02MGNhYzg0NjMxY2IifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=24050000000000005⤵PID:2320
-
C:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exeC:\Users\Admin\Pictures\nfa15Iyj8QUYA2MDXxIu2uRn.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x30c,0x310,0x314,0x2dc,0x318,0x6d5f21f8,0x6d5f2204,0x6d5f22106⤵PID:1124
-
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"5⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\assistant_installer.exe" --version5⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x284,0x288,0x28c,0x264,0x290,0xf50040,0xf5004c,0xf500586⤵PID:2664
-
-
-
-
C:\Users\Admin\Pictures\FWPtU52lFekFhmxo7MWBsqJx.exe"C:\Users\Admin\Pictures\FWPtU52lFekFhmxo7MWBsqJx.exe"4⤵PID:3804
-
-
C:\Users\Admin\Pictures\nFHUuCpFkGn49nodmNfBudvT.exe"C:\Users\Admin\Pictures\nFHUuCpFkGn49nodmNfBudvT.exe"4⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\7zS9333.tmp\Install.exe.\Install.exe5⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\7zSA062.tmp\Install.exe.\Install.exe /updidO "385118" /S6⤵PID:2640
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions\" /f /v \"exe\" /t REG_SZ /d 0 /reg:64&"7⤵PID:5600
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:64&8⤵PID:5724
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:329⤵PID:6016
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Extensions" /f /v "exe" /t REG_SZ /d 0 /reg:649⤵PID:5372
-
-
-
-
C:\Windows\SysWOW64\forfiles.exe"C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m cmd.exe /c "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:32® ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet\" /f /v \"SpyNetReporting\" /t REG_DWORD /d 0 /reg:64&"7⤵PID:5680
-
C:\Windows\SysWOW64\cmd.exe/C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:32® ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:64&8⤵PID:5816
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:329⤵PID:5852
-
-
\??\c:\windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /f /v "SpyNetReporting" /t REG_DWORD /d 0 /reg:649⤵PID:5960
-
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "gIlHasUke" /SC once /ST 02:03:43 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="7⤵
- Creates scheduled task(s)
PID:2312
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /I /tn "gIlHasUke"7⤵PID:5788
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "gIlHasUke"7⤵PID:244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /CREATE /TN "bdnnguwcOLBYKAjbbA" /SC once /ST 18:59:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\ElyBxStRAaEXFVuko\naOnfwtmHGUDmSz\bzgSpPu.exe\" id /Gusite_idzWP 385118 /S" /V1 /F7⤵
- Creates scheduled task(s)
PID:5640
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4672 -ip 46721⤵PID:4756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3212 -ip 32121⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 244 -ip 2441⤵PID:4664
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"1⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2720 -ip 27201⤵PID:3660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2832 -ip 28321⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2832 -ip 28321⤵PID:1648
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\A321.bat" "1⤵PID:2144
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:5568
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:2180
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3876 -ip 38761⤵PID:5796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4696 -ip 46961⤵PID:5928
-
C:\Users\Admin\AppData\Local\Temp\BEA9.exeC:\Users\Admin\AppData\Local\Temp\BEA9.exe1⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\BEA9.exeC:\Users\Admin\AppData\Local\Temp\BEA9.exe2⤵PID:2812
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e90a272a-b00e-4227-ac7e-eb5d93720933" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
PID:5804
-
-
C:\Users\Admin\AppData\Local\Temp\BEA9.exe"C:\Users\Admin\AppData\Local\Temp\BEA9.exe" --Admin IsNotAutoStart IsNotTask3⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\BEA9.exe"C:\Users\Admin\AppData\Local\Temp\BEA9.exe" --Admin IsNotAutoStart IsNotTask4⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 6005⤵
- Program crash
PID:3624
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4408 -ip 44081⤵PID:5620
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==1⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exeC:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe1⤵PID:5476
-
C:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exeC:\Users\Admin\AppData\Local\Temp\1000082001\boom8.exe1⤵PID:5524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4444 -ip 44441⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\F191.exeC:\Users\Admin\AppData\Local\Temp\F191.exe1⤵PID:5356
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5684
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4496
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3920 -ip 39201⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\4232.exeC:\Users\Admin\AppData\Local\Temp\4232.exe1⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 11562⤵
- Program crash
PID:232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4550.bat" "1⤵PID:5488
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 12⤵PID:5612
-
-
C:\Users\Admin\AppData\Local\Temp\5C83.exeC:\Users\Admin\AppData\Local\Temp\5C83.exe1⤵PID:3980
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 10923⤵
- Program crash
PID:800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 7163⤵
- Program crash
PID:5176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 11683⤵
- Program crash
PID:3700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4496 -ip 44961⤵PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4904 -ip 49041⤵PID:5364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4904 -ip 49041⤵PID:244
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4904 -ip 49041⤵PID:1060
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1920
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:5648
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵PID:5672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
2Credential Access
Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
1.7MB
MD51d82785a31ff1daa68547dbcf420e953
SHA163e6973b9d0eb4edd402541b6c5411de96c5617f
SHA2567f60ece436bf9d9abc72a3747992bc7d266a031c4c93e0a06ac205d7b1a7f559
SHA5123852488cdcb0dd1f185a9d2aeb90b0e4f7615ed8035346b6e861e8aa9f6ae3f8b4682b30d5c235c6c9159e4b0d5370ab2a4ff613630dccc7c17e9d15f7709c9f
-
Filesize
3KB
MD5ae626d9a72417b14570daa8fcd5d34a4
SHA1c103ebaf4d760df722d620df87e6f07c0486439f
SHA25652cc3f3028fab0d347a4a3fffef570b42f85748176d81a3344996d42fd1de32a
SHA512a0690bda318bdf43d6f292f88d4ea2ebeec83b95e9ebca80083dbb08e7ddcdb9735cc58b89d369a34f10acf8a114d4a207ed8d0f070c5baf87c5798e9f35bc14
-
Filesize
1KB
MD5bc2722c0412ec63225416a47c1ac8ef3
SHA12257802f9a7dc82ddc60e01f8fa54a736b048419
SHA25696b78e90c4ed96366e807fdbc0e83b9a35d28157577040dd2e9556f976319951
SHA5123e61e690b94e2a22e605f624ff863585bff3fa25053cf97571caebc6aac79f92c33f0ce8390eac56ccfb40597ea03004a73ad5615be7f7d055673b35d7da4f2b
-
Filesize
1KB
MD53d45eb481b83a6a796c32cd5640acce0
SHA1cec3928764bcf109ecc1df90f838ba8e3db74926
SHA25628c5873416191d47d6fdcd8f5272b2fa8dc5a9c57c8c0ca6e3cebee858774888
SHA512a913da0255349af6299c1f32d3761c50fe71ab34e97c629985e3aaf34ac74266a494db40ef77d25cd291ec08139b949a299ca2d57edf7f703fb58b5373d3cd1f
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\additional_file0.tmp
Filesize2.5MB
MD520d293b9bf23403179ca48086ba88867
SHA1dedf311108f607a387d486d812514a2defbd1b9e
SHA256fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348
SHA5125d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\installer_prefs_include.json
Filesize222B
MD5c2c74c21a3884cb775c83556f2a450b1
SHA1d56dd72d9ff45eaac1f1afd066e743424cb92eed
SHA256231b957503c5dbec4c8945eb1f2c71a0ee8e881ba1b0bebe9dbb39b61d5226f2
SHA5122e1da81fbb405b3fbcf3b9cf48c4a5361b93863fa541d12497f776eaeb329a98f463de2458fe3e819fcfc22c5f0ed421bb9e4236d917f373e3a09cc8dbec654d
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\installer_prefs_include.json
Filesize1008B
MD57f53228a5638d095925f972f637fee9b
SHA1f2955c1de6fa6c963f00eedf454bada82f3f3e41
SHA25616f78365e20cf645a95c23faf1fde0c8fc4df5e0be3a2388dec744a95806eeeb
SHA512e6fca17d2beffd0277e62872e1c3dd8db0398fc6ac3d8eb7aa3d30e252bc05ec1d037aa2c516f00e853042d0196bbd7f3ece7c0dc7e86ef137c096acfaf2050a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\installer_prefs_include.json.backup
Filesize207B
MD5d9919c8620bff6e0cbd3ece3c1bb3279
SHA18d84e1d692e6f46208ee5fa2b2e7dc2e0fd3a0b9
SHA256d5d623b49883eeb73ac66b37a88564a32b81b1a38cf7f9b680552274d3cf08fa
SHA5125e6f20412482b29b929cfa485d79c2f2bb450f2f4d1ed5d3fb9d1586515fc16d4598390a50bb2135e0af6b464ec175fd89bb0e46383e2af5369653a7eed2f8da
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403241857411\opera_package
Filesize1.1MB
MD58eee9d9886eaf3646d602516e4480469
SHA1304f094852b68d9a31ae57a72e0fdadf323ad016
SHA2562d17bfeb6efcb3d8008a9a789d31e3a5c9b57afec27ddf8059e0b216f44cfd66
SHA51218e1a6a28fa2154b97830b0138fb1f75dcfc56b7f18320c221708618c2890eccbcfe439674319b22aa9e963c2cb39a53775b15ec0ef884ec1bb54b746aeb99eb
-
Filesize
1.8MB
MD54568f01beecde7da90031897af161569
SHA10760f3477bea16b74b9821f0b788efccd0b3cfd9
SHA256dc8512cd663a08a4228e570e2f1020498caf2bca7dfa0d88359d6706103ad33f
SHA51267f8eb8e1dcae4635b3655a107821c37c659a361adaf378c9b8784dfe0c3bece92696ee6020296a1f33237b9ed6bc8acf39274b8ef59675f6680a5e6e8e71d8a
-
Filesize
2.9MB
MD5af1bbc9643773073c9aacd2657bff90b
SHA13832e43d27d55a34c052bfac3288ce30c1c9ae83
SHA2569323ec3848ad60824445a6f41932e5c0ace6949835a2c6a4bdaa8f6c15c1860e
SHA51226414b09bf8b5b33968bac3d1714c62887c8924d0c181d76aa45830b7081f783ccc03691e16d416d9015b643fb307a5d41fe50c1e44ef5829e482c81c88101c0
-
Filesize
413KB
MD5d467222c3bd563cb72fa49302f80b079
SHA19335e2a36abb8309d8a2075faf78d66b968b2a91
SHA256fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e
SHA512484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7
-
Filesize
350KB
MD504df085b57814d1a1accead4e153909e
SHA16d277da314ef185ba9072a9b677b599b1f46c35b
SHA25691a36d137ebfa812b055728807e11338d15d3a5d869cb4babdf779266688e4dd
SHA512f37678424e46e4f28e1047161db60ad737515558c8c8905ed598ca96b198304da7356e49e7bb9d1e77fe75372f0b5a7f670a353d093749c37bb85c40ec7fdafa
-
Filesize
418KB
MD50099a99f5ffb3c3ae78af0084136fab3
SHA10205a065728a9ec1133e8a372b1e3864df776e8c
SHA256919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226
SHA5125ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6
-
Filesize
4.1MB
MD5c59b5442a81703579cded755bddcc63e
SHA1c3e36a8ed0952db30676d5cf77b3671238c19272
SHA256cac7fc4ae9c97eba7455992b2d41449ee257ec485c562bfc7245a90033b1d774
SHA512c9c834860982652e7ec1db085e534f6b1c35298ce75b29c2cbb0ac04ff40cd64363b458bcbd8c0983cf1ed778a4269372c6bc4ce7f831a6e1e70ee5f4a0772f9
-
Filesize
3.2MB
MD500658482532bb9fb6f340bb6e18442a3
SHA11e4ae4d493de08515567d70c6582b045ed07c654
SHA25661e9f9698ec89f76a056be23f734884aad41712d0640997a82c76587af9ce897
SHA5125fc371d4fc361b71e90c6735cf1c636299151ae2489ef432b6733e92d801647e8fa992aa85b1ad87f8781f0be304545ee86383ca3c108a6989e6511970916040
-
Filesize
436KB
MD5c16c92e2216c8252d8607bb4b529da59
SHA11cd1719e72c9cf757dcd3455854d7eb48fd9208d
SHA2567ee17c94baf2999939b0863d1a64e34127cd938dbc984ec6e841233550ea526b
SHA5120ecef72315f84262c4e80fe30b529113a6a15bcfda6766b06c179abcdb1ae842d3a885920d1b6f2e6cc1463f400bf3c7cd4e94d673c91c92d335c01e26ceb606
-
Filesize
294KB
MD55700c54d51e14d0ce00bbbb6015baed2
SHA171eb9361a9d6b35317fc8a385b748a8a6ce3bee7
SHA256583d73f0111e0aeed0a34fa4fc4ba85875a11f88ac93f9bacb59359aaf5b94e2
SHA5129dddd66cf82aead6400a19e81ccd0ebc0f5e312bc5772937e1929820a1db0fb74cf1480ef3bb9e9c70aefa25ce02c8c7d9f1a17bff6eb2137d76247a61eb2b9d
-
Filesize
4.2MB
MD58571682a29a8a02438e0608d3a4a6e60
SHA12f70c14ca45d72f15bd6d71cfbf24785ea04e144
SHA2565fb1582078e5cce90085980f1d7995b5fdb01261da1a9dec17866e7b92af8c24
SHA512ee1bd69aae71f938f84ccee35521b2418e5fac36d12c1e592b0bbe6de2e2ad1397d9dee11c21ac0c1eccc5a5370a0371ff0e809814aa8cc6d8cb5d39a69bd876
-
Filesize
77B
MD555cc761bf3429324e5a0095cab002113
SHA12cc1ef4542a4e92d4158ab3978425d517fafd16d
SHA256d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a
SHA51233f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155
-
Filesize
351KB
MD540408d90b261f8716b703db1715df09f
SHA1ac4ccd5c3d585ff9f8ee24dc79fbaa2b918212ab
SHA2565ef8a6fc75231cb5751d95fd0fd21e6e9486097939c1f5a61930b01d59880c4a
SHA512c5f58b8862888d7019a736ec9652ae958265169d944447f96d96a43677f211d017fb60dbb090f35d98d2444c5cf9017b556737780f4399a0c156fdfb0b53b29d
-
Filesize
338KB
MD5380fd37db71449a4a1855a0475c05edb
SHA1f7e10aae523a86fb6c23a8fed9d042f9e82dc557
SHA2568964c329759b76bef968db9126bf2052f334baaf6e4cbcde52371ffc66b45187
SHA5127a6ebc422c616f989093663f06bca79da046cc8b4872074507e55e7385852ecb0b788d6372bb16fa2d2879da659f84cf1f4124f4e0af6d0245c7c20bb333c11b
-
Filesize
576KB
MD524c2f86a54a96f327c21baa867357e53
SHA1ce961a4118ec895d7ea9a9e93e3386e4df129709
SHA256e3d93cb05dad2d291408224432a540803f16b839d9b397ae9cd061eae78bed4f
SHA51239cafa7d1d6b9b73c6fae246ddf19bbb769d64a0e60447ac9fa7aeb8f0e1fb339897b332e88db0b3f10b312a2ab213a455c9e2c2d2ccc688d2530532daafdd66
-
Filesize
128KB
MD5c6cd3260bedd969efd8f6151d9a3b4d4
SHA115412cf7526f688344387401dbba84827340d2d4
SHA2562a7a0090165469b01d905d4ba6513664ab65c732531891614a2c12ab38532239
SHA51225d453cda995bbf2b58f3fe471e51f132a8879048f6ca85ea3eef984b4c99a0f40157a202a6427683c8b1abe054c2bfc9130ecc78872c163ef7a08ca3993dca6
-
Filesize
640KB
MD5d3edf5bfea32dd835282ef83bd2e79c9
SHA17f18ab500f5d846eceb47fd47d12010d1b74d84d
SHA2566d9eb448f00b0764b7f383bafb72198b5dc7f4b34e690ff18a07052f4b714637
SHA512e261222841709e3a5b63ad248a9f67e7e82ccc754493e8d2ddf1b8ab4f36d84b98d1cf8ac3d706c620cebdecf5576dc237a121b34f5adc6824abe1a0c79c2f0f
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
291KB
MD5bca9f45d45410be3485717c7eb4320e4
SHA141d6a52b47d5251176d78e39eea0915186bfc49e
SHA2561a55c2c2e090256a83f5913fc1548a35fba33d5e6d411bd2486e52217acdb113
SHA5123d95a4789eacb46b079d8c12fc330bb10619d01d27b851206a08247fab3b6d1c768914baf2675abe0348cd616cfbf9d2028d855015fc260d70749c72934563f8
-
Filesize
1.7MB
MD5eee5ddcffbed16222cac0a1b4e2e466e
SHA128b40c88b8ea50b0782e2bcbb4cc0f411035f3d5
SHA2562a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54
SHA5128f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc
-
Filesize
128B
MD511bb3db51f701d4e42d3287f71a6a43e
SHA163a4ee82223be6a62d04bdfe40ef8ba91ae49a86
SHA2566be22058abfb22b40a42fb003f86b89e204a83024c03eb82cd53e2a0a047c331
SHA512907ad2c070cc1db89f43459a94d7f48985d939d749c9648b78572a266f0d3fde47813a129e9151dbf4a7d96d36f588172f57c88b8b947b56ed818d7d068abab2
-
Filesize
109KB
MD5726cd06231883a159ec1ce28dd538699
SHA1404897e6a133d255ad5a9c26ac6414d7134285a2
SHA25612fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46
SHA5129ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e
-
Filesize
1.2MB
MD515a42d3e4579da615a384c717ab2109b
SHA122aeedeb2307b1370cdab70d6a6b6d2c13ad2301
SHA2563c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103
SHA5121eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444
-
Filesize
1.2MB
MD5a09c2f907786e754e9e01a1bdb03179e
SHA1400d3dae7895118e1a8dc2f148ce10fa885e550d
SHA256c5786f11af6fd4757e552fde2a70f73e344580e59ba412b3972d3763260b9744
SHA512422b7280635021cc7b6c22d13209e8707e064d6f8ca2b1947556a2ab35adca9cd6051ac200f17043c1a13e549e98ca2e8cf5121bf8eb9bfc98f91241ce89a1e9
-
Filesize
109KB
MD5154c3f1334dd435f562672f2664fea6b
SHA151dd25e2ba98b8546de163b8f26e2972a90c2c79
SHA2565f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f
SHA5121bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841
-
Filesize
1.2MB
MD5f35b671fda2603ec30ace10946f11a90
SHA1059ad6b06559d4db581b1879e709f32f80850872
SHA25683e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7
SHA512b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705
-
Filesize
7KB
MD55b423612b36cde7f2745455c5dd82577
SHA10187c7c80743b44e9e0c193e993294e3b969cc3d
SHA256e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09
SHA512c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c
-
Filesize
436KB
MD523c80cf3c864384f8cc01cb46188531a
SHA1adee1474c797b1ca5654d8c0cef9182a9784a888
SHA25651695af669927b81ff90f13ecd63423b8868042de06ec20969b0c9ce59b0229c
SHA512805de8a09553b66f145525b853c53fad739314070e4ed1b23bd9ad53f5d3d74542ef47ae63d4cb29603e4c269a096c5eb95cf6ab1717783e8712256e8a281d9f
-
Filesize
14KB
MD5f0f338cfa229157d8bd097e3055407e2
SHA19f67a0234b71a43d68b86ba624e3edae1b3f7c6e
SHA25609f9ccb94d5b4b1e0739076e0555f7aba54124645ac1fbc731d5173c7e65f46f
SHA512079dd6c041a535c6b4f523512b88d60f2b216705e1da5626984cfea1aeda94ecf4482eeb5aa66bd0b0080baad70bd94f66812d05269a44e2b8af29797b45b76f
-
Filesize
3.7MB
MD5e5adc576fc2da2ddd8249485b1b5627e
SHA119e289c26ad51eb9d1f6d479eba64cf4c3d79e63
SHA2562b10b4a0fb6076ac77b2ec036084220295fdf2d6184dc5035acb8b17ef73bb90
SHA5123c0d0e0cea0706e3d4d78b1892ab6cd14a429521780062b47fda5bad5b54466f97decb6140e40ec101ef0a6fbc20798ecb750d6709c889a172521c472d237aaf
-
Filesize
448KB
MD5700f397ed51a662b6e8ac80825e9c434
SHA196395a8f95c453b7af858278007e8f80752c7f06
SHA25639e740aad7e7bea11d7f24036ebc2f98b5b2394f450e8c4292a0218518c7fbb5
SHA512ea39fbeea3b87ba58c31feb35e9505092f054bf7a4ac8387b361ec42c1687e203d3673b722d7257c02859107f5bc3a59d05eb14aa432ce6811c924121c96c87c
-
Filesize
512KB
MD567190922fe7e45a7011af4eaec69f092
SHA1ae12660051c058709807f378a002a89141e05b4a
SHA2565300772d24c7940434d4a34154a049617128906aaf932390dd88d27614d26963
SHA51278fb9e987460db8e0d5294cfae68b4ec19967dde22b90e09fad352a813d400681a3394c74c409aec22fcff2bfdd65485f5e10e2afb04adf20e64e98cfa0f13db
-
Filesize
1.1MB
MD510b4a06405ec51349d62ec3d943a0633
SHA1f17a0363a1cdc13772487011b41c2d035edc8cdc
SHA25662ceae849f403e4b432cc4ad33975e401fa417103142bea9b7272917c0f79ea9
SHA512440f76c5442ef24b0e8e8a4ffe0eb42c12bfb842bac94bdc8a537b646fa830c0c0e2e14ee4b5104cc47c16d5eb7eb391f8df31a517931d2414358fecb3cbb2d3
-
Filesize
182KB
MD58ebb3006936a370a5cbb5d26d98594c2
SHA1eaf00aca948b477d02aefcf6b22b7b37841aa73d
SHA256aa7674cb250aa6990af151efe159cac7f4528cf0a97f28586433b5d3d05d7eaf
SHA512b61b5995de442347eb16b874f482f99961aa4ab8565f5c207da56a1778623cbbc8ad20ce22884e69ed98114fbb657969d913aeafb2a57b142f4ac3de04a0b979
-
Filesize
128KB
MD5fcfb8260948324110394e63771ab9466
SHA1f28efaee5158e0c57caeefe8a9f97603a3cf8b78
SHA2567f81b3513d8a12850892db884bac49591422998ee8069e070e823745986d2d26
SHA512950c1eaf7c156e6ec640fa68f148caa5208b607a53164179ae7aaf5992f6b6128cde90f11d32d9e76bf9e980296e1c77c19a1387e9533cdd95c7c4e749feef4f
-
Filesize
522KB
MD5b8616322186dcdf78032a74cf3497153
SHA1bf1c1568d65422757cc88300df76a6740db6eab5
SHA25643dda2be3813b81729b3d388f546838a36ee3471da5ed266fe958e2316f1f6ea
SHA5127b1e4ad944960fc2aa661426f77e64ff151cd8d5860e584874da1c4f03c6d195d4ee9031c36c24a234a851176b003254d14f9334712e07babc6934cf19a7b2fb
-
Filesize
384KB
MD5ddef63e02f62da1bfd03ecd5fc00ae94
SHA1f8cdcafa70741e5d6693daa1d1e174b7e60da403
SHA256fe91ea7b1c045d14da3afc42fbd6aeb8985de994209109a9effc3378714d188b
SHA51235c265778d432c86185dae0659597fb69219ebdde015c24210f4463d5858aedcd4d889ceb8425d17b3642e28d2610cbd561bc553a9c63dcc89724c810f998571
-
Filesize
3KB
MD5a817caa9fb9d5062809130662c1bd570
SHA102f8212eb9b05b773952fa53b4c44c071044df04
SHA2565119cd6cffb6becf197b7d1ed2e2e6dfe07ea84465dafd4c5c9e9285deb56fff
SHA512e3bbf779e556ba5f1d94f87dfe01b33cdecb2f84d28a84f307a2d5871ff69c5b1230c1b0098adeb1730002a8cfc694d6650c257809d3f9cfa173d9a1606cb50e
-
Filesize
314KB
MD5167f83d78c1b85f0bda119d96abf2002
SHA166f8332c0686dd040cf521f04dd6662d9053977d
SHA256d49a3b37978e3d683475b49ac4374f054a943bf674819b4e6a7d4ba6f52cf082
SHA5121d5dbbb61ed3586348a37c076a93b4b2b3781dd3d3cace99378dab4433ea3f62dbaffd282570bb31fbb6f774b095aea96f149cd3cfc838542ed58c1577bbdc8d
-
Filesize
1.1MB
MD5019cf8a830a0af6a4b3c0a373aec97b1
SHA1d724ccb03930fbb613edb0d63eb7d4a08f30783a
SHA256469a4c396db2c44b57eed362814309f3052309e4b8d2b6a64b2f0ba56b64c4fa
SHA512c0439a20b5aa8bdfc1fad5b4fecd1fd9563d572f5d21abebde6da52b8017caed35b9c3f914631bf91662f3ff023d7f3c431ad62a8fe33e9111e72122b20e1a99
-
Filesize
2.8MB
MD50a075e3b11b39f226e2024861aec6141
SHA1688027f16df9ca5d88801b2a42c7f05cccb3ed7f
SHA256efd82e4cb0dfee9858c0989d00d9526a5609ff1b0fb199c0c837436649dfb9cb
SHA512b3bd32b76addc8331de91c558596ac1dea980b8518bf60e56cbf7ec113e72d2cc8bdaac99747aa7d17c1f7f8f293c53481f69bab64d7964aba89db9850966bad
-
Filesize
768KB
MD5a3019378aba38f501a6de61cc3a6b7a5
SHA197919301c11831bb368b95d6926835042ceb6490
SHA256ca20863883a4d8874da2a26cf472f2876dab31777915c358d4de0d4463ae081f
SHA512f15474dca0b91a8e3255c802efbace5a359e2f351844f173a94a87e8416b125da4b4025f1e6b86ff0421bf02ccb5f4a5c225d6975d7f01023bb7d30d4f61c340
-
Filesize
704KB
MD549132c17a8bb8092ff701a37e868307e
SHA15f8ad046f5138c26e1288e0a0572d2240d9145b1
SHA256ada45acc4c8964a5425272f4f2bc0f720321d648bcb3d98403a9d218a56796e8
SHA512b8216ef732cd8722d20e4a2cf49f1c1ba5fd678af5936bc014967dd487af38bdc0e2c3e740cf9b0278f36179b87cd31114d7cf9747e1070aa47bbb4f99f4afeb
-
Filesize
256KB
MD5567906ebe63a4364953ae88df4d7410b
SHA11a8c759030cbc48bc199d8422986cfc64b3eabe5
SHA2567b6e64da8945a5120e76c22956df0843ad49926ce47e62f95914c02e6a070c6d
SHA512661535b30d649d1691cb70a62591854bda55ca02b71bfcc0c03b2c0d6e48b3fcb6ec4eed88307c78eaeba3c1b453c9885fd5e8701002473e212db368e73fc23b
-
Filesize
22KB
MD567021548646254d1f878dff71e665f2c
SHA1ac2f609e62f698dd91219cdee4a2779dd839edb9
SHA256ba335a41ec6731d6af78b43564331b63bef40c1ca7b1c6d6eb8712e5344e5bbd
SHA512fc676304ffbe7eb6da48ea4303ee553e3b0507a2508570d8cf2d686103354ea1fbf8654a9e11ba50b867d5b3c25d6eddf210b2dfd447052585a18f5564aa04f4
-
Filesize
960KB
MD5386b673ad1a10724bdb1b6c610e0f8b7
SHA167ff101633ad0ef4599cbefb1fa150b077364dd1
SHA256cc0b9c70368304a6e2b37debd13a80112546789cdaa9d88f500b7b7892c55ab2
SHA512000f369b0b9c63bea708a2c8bea57c502ad347b51a40e2dffe1ceeed027497f9fbe3e82f5f7c75a918ff629634f115e354b37a8cd4a372ba70313c7c40953c14
-
Filesize
768KB
MD5e75392c16cd92cfaeb48421ae6a1510f
SHA13e02b999d4e0263999425fa47190e51722789361
SHA2563caee26ce9f2d471dc33fb5d3edae50d62774ce6fbc901a20a56a4c7dc7e6b7e
SHA512250eabb086779b45574173d91c7e1e8bdeabf9d8f3ef33598f14150aca00f44280ad59041abb801890554b89acc0ffe521e1e485e611bcf210fcc5cd04a68bf7
-
Filesize
127B
MD58ef9853d1881c5fe4d681bfb31282a01
SHA1a05609065520e4b4e553784c566430ad9736f19f
SHA2569228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2
SHA5125ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005