Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 01:23

General

  • Target

    tmp.exe

  • Size

    413KB

  • MD5

    d467222c3bd563cb72fa49302f80b079

  • SHA1

    9335e2a36abb8309d8a2075faf78d66b968b2a91

  • SHA256

    fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

  • SHA512

    484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

  • SSDEEP

    6144:0UorLrzMYSnDyTtDOYtf3J7+YZIPcrPJruPWeX2/e1Cw+GOpumhauZef6P5rwmx:0vcYZD17DMPWev1Cb3umhauZef6a

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • install_dir

    4d0ab15804

  • install_file

    chrosha.exe

  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://193.233.132.167

Attributes
  • strings_key

    1a9519d7b465e1f4880fa09a6162d768

  • url_paths

    /enigma/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 23 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 21 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 11 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 17 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 3 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Drops file in Windows directory
    PID:3332
  • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe
      "C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1352
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        3⤵
        • Drops startup file
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe
          "C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:212
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -nologo -noprofile
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1704
          • C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe
            "C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Checks for VirtualBox DLLs, possible anti-VM trick
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5820
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -nologo -noprofile
              6⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:5944
            • C:\Windows\system32\cmd.exe
              C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
              6⤵
                PID:4604
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                  7⤵
                  • Modifies Windows Firewall
                  PID:5632
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                6⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5504
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -nologo -noprofile
                6⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:2260
              • C:\Windows\rss\csrss.exe
                C:\Windows\rss\csrss.exe
                6⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Manipulates WinMonFS driver.
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                PID:2692
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  7⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5272
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                  7⤵
                  • Creates scheduled task(s)
                  PID:4084
                • C:\Windows\SYSTEM32\schtasks.exe
                  schtasks /delete /tn ScheduledUpdate /f
                  7⤵
                    PID:5436
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    7⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:6032
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    7⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5664
                  • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                    C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                    7⤵
                    • Executes dropped EXE
                    PID:5924
                  • C:\Windows\SYSTEM32\schtasks.exe
                    schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                    7⤵
                    • Creates scheduled task(s)
                    PID:2580
                  • C:\Windows\windefender.exe
                    "C:\Windows\windefender.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:1732
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                      8⤵
                        PID:1616
                        • C:\Windows\SysWOW64\sc.exe
                          sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                          9⤵
                          • Launches sc.exe
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2412
              • C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe
                "C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2436
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2920
                • C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe
                  "C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2136
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    6⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3696
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    6⤵
                      PID:2204
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        7⤵
                        • Modifies Windows Firewall
                        PID:5444
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3924
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:336
                • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe
                  "C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3796
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4964
                  • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe
                    "C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe"
                    5⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Checks for VirtualBox DLLs, possible anti-VM trick
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:5952
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      6⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:116
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                      6⤵
                        PID:5860
                        • C:\Windows\system32\netsh.exe
                          netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                          7⤵
                          • Modifies Windows Firewall
                          PID:5756
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:820
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        6⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5960
                  • C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe
                    "C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe"
                    4⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Drops file in System32 directory
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:1460
                  • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe
                    "C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe" --silent --allusers=0
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Enumerates connected drives
                    • Modifies system certificate store
                    • Suspicious use of WriteProcessMemory
                    PID:2796
                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe
                      C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2ec,0x2f0,0x2f4,0x2c8,0x2f8,0x6f4021f8,0x6f402204,0x6f402210
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:3512
                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\xfG82x0lroBU9PDhZ1q2beQA.exe
                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\xfG82x0lroBU9PDhZ1q2beQA.exe" --version
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:4420
                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe
                      "C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2796 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240326012414" --session-guid=88cdef3a-67a5-45b1-9aa9-8efd6870aee6 --server-tracking-blob=Zjc1YmVjMWE3YTFkNmNjMTQ0MDU1ZDc1ODM1ODc1YjRlNDU1Mzc2YjE0ZTllMjZhMjE2ZjRhNjMyOTNhMDY5OTp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGUvd2luZG93cy8/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1ta3QmdXRtX2NhbXBhaWduPTc2NyIsInN5c3RlbSI6eyJwbGF0Zm9ybSI6eyJhcmNoIjoieDg2XzY0Iiwib3BzeXMiOiJXaW5kb3dzIiwib3BzeXMtdmVyc2lvbiI6IjEwIiwicGFja2FnZSI6IkVYRSJ9fSwidGltZXN0YW1wIjoiMTcxMTQxNjI0Ny44MTk3IiwidXRtIjp7ImNhbXBhaWduIjoiNzY3IiwibWVkaXVtIjoiYXBiIiwic291cmNlIjoibWt0In0sInV1aWQiOiIwODYxMGRjYi1lODE4LTQ3YTktYWYwZS01YmFiNWYzYWJmOWQifQ== --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=FC04000000000000
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Enumerates connected drives
                      • Suspicious use of WriteProcessMemory
                      PID:5000
                      • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe
                        C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.40 --initial-client-data=0x2e0,0x2e4,0x2e8,0x2bc,0x2f8,0x6e3e21f8,0x6e3e2204,0x6e3e2210
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:4476
                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe
                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\Assistant_108.0.5067.20_Setup.exe_sfx.exe"
                      5⤵
                      • Executes dropped EXE
                      PID:5652
                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe
                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe" --version
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:4248
                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe
                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=108.0.5067.20 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7d0040,0x7d004c,0x7d0058
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:4896
              • C:\Windows\SysWOW64\rundll32.exe
                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                2⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:4176
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll, Main
                  3⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:528
                  • C:\Windows\system32\netsh.exe
                    netsh wlan show profiles
                    4⤵
                      PID:4512
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\757987694264_Desktop.zip' -CompressionLevel Optimal
                      4⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5396
                • C:\Windows\SysWOW64\rundll32.exe
                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main
                  2⤵
                  • Blocklisted process makes network request
                  • Loads dropped DLL
                  PID:5308
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                1⤵
                  PID:4840
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                  1⤵
                    PID:2400
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:5504
                    • C:\Windows\windefender.exe
                      C:\Windows\windefender.exe
                      1⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:3204

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                      Filesize

                      2KB

                      MD5

                      3d086a433708053f9bf9523e1d87a4e8

                      SHA1

                      b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

                      SHA256

                      6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

                      SHA512

                      931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      9cb3d8d83f158587c6ec37dc8b4d23c1

                      SHA1

                      574666f877474eee329a84403f651c1d808cc6bf

                      SHA256

                      e56474f3787fc781065c9debde4543aa9e3d1c2dd23bfbb66367e879022ab881

                      SHA512

                      d73f81fa03b3028f052c8dc6a7033702c08fd41873c1d7af3a79f4ce2d958a52abf48b69a80470873d5a0be2634e230ddcfd947b82e4fceddfc02c52baa05db4

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\additional_file0.tmp

                      Filesize

                      2.5MB

                      MD5

                      20d293b9bf23403179ca48086ba88867

                      SHA1

                      dedf311108f607a387d486d812514a2defbd1b9e

                      SHA256

                      fd996b95ae46014edfd630bfc2bf8bc9e626adf883a1da017a8c3973b68ec348

                      SHA512

                      5d575c6f0d914583f9bb54f7b884caf9182f26f850da9bdd962f4ed5ed7258316a46fafaf3828dccb6916baaadb681fe1d175a3f4ed59f56066dc7e32b66f7b6

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\assistant_installer.exe

                      Filesize

                      1.9MB

                      MD5

                      b3f05009b53af6435e86cfd939717e82

                      SHA1

                      770877e7c5f03e8d684984fe430bdfcc2cf41b26

                      SHA256

                      3ea8d40fcede1fc03e5603246d75d13e8d44d7229d4c390c39a55534053027f7

                      SHA512

                      d2dee80aaa79b19f1eb1db85079a05f621780e06bfea9e838b62d757ba29399f9090ec7c6ff553377c9b712f3ba8dd812cdff39f3e28829928e86746a8ac6b27

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\dbgcore.dll

                      Filesize

                      166KB

                      MD5

                      8b6f64e5d3a608b434079e50a1277913

                      SHA1

                      03f431fabf1c99a48b449099455c1575893d9f32

                      SHA256

                      926d444ffca166e006920412677c4ed2ef159cf0efc0578cb45b824f428f5eb2

                      SHA512

                      c9aeac62ece564ac64a894300fb9d41d13f22951ead73421854c23c506760d984dff0af92bef2d80f3a66e782f0075832e9c24a50ae6110d27a25c14e065b41c

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\assistant\dbghelp.dll

                      Filesize

                      1.7MB

                      MD5

                      925ea07f594d3fce3f73ede370d92ef7

                      SHA1

                      f67ea921368c288a9d3728158c3f80213d89d7c2

                      SHA256

                      6d02ebd4ec9a6093f21cd8ccefb9445fa0ab7b1f69ac868a5cfc5d28ed8d2de9

                      SHA512

                      a809851da820d9fdd8fb860a8f549311dcc2579df2c6f6fba74f50d5d8bf94baa834b09fb5476ac248f18d1deb6b47d4fdd6d658889d5d45ca8774a9264483d2

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202403260124141\opera_package

                      Filesize

                      2.4MB

                      MD5

                      f11d89056bf6c226c5df153ebfe29f50

                      SHA1

                      709d6441291cf407dfb904a7bd4bece1d81a5281

                      SHA256

                      37af59056d5275e76cf09996305d8fb3d3e6f080eff37dfa45c33485e47f02e0

                      SHA512

                      32ee537f447a75299edb8205520e3d21b2ddcee62eaf86eee0ce35f38c2da477b7d245df88b1bd3c25faa14c45cd9a5c2ddf78a88b429588590710c64a37ece9

                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      74KB

                      MD5

                      e3a28b57502667d307a568a8773151da

                      SHA1

                      44d4208e02193bbd56a4536aa33af1f57b1e815f

                      SHA256

                      c1b91beb9d69ddf42f22853f3304a9b271cb431dfe3fa53f4e4ddd7ff4cba6c8

                      SHA512

                      c0074ffd592d4f0349fbaf33704544b560e99765557f18653a94adecfb411edde0bd9fb91c13eea4c6ff61563e19585494277b20be7085cc2fff62073d6fb037

                    • C:\Users\Admin\AppData\Local\Temp\1000091001\un300un.exe

                      Filesize

                      4.1MB

                      MD5

                      8803d74d52bcda67e9b889bd6cc5823e

                      SHA1

                      884a1fa1ae3d53bc435d34f912c0068e789a8b25

                      SHA256

                      627e36dea92cbdd49fcee34c18a29884010a72b5b004c89df90c19a50303a2b3

                      SHA512

                      c190ca373875789477a755f6246565bc7cb5744f1d5f62037e71d3595c1023f587f34a2437d9691ad96cde789026b7c2896110935e58cc2f1498cfea5d0d9564

                    • C:\Users\Admin\AppData\Local\Temp\4d0ab15804\chrosha.exe

                      Filesize

                      413KB

                      MD5

                      d467222c3bd563cb72fa49302f80b079

                      SHA1

                      9335e2a36abb8309d8a2075faf78d66b968b2a91

                      SHA256

                      fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                      SHA512

                      484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124127442796.dll

                      Filesize

                      1.5MB

                      MD5

                      6e955e77535a4e3bf6c5176033e8bdd2

                      SHA1

                      5d2626b438ca9298ef5e33d9ba696241ec8666ff

                      SHA256

                      5570a7d8113978ec69073550f478f4b092023de1dfc4cbc1bf86c24a81de7b4c

                      SHA512

                      62eff301d672dd604a226194849cecb567fa150f4a007eb456b7d8fbf634293cbe9a2ea73e57cae36368ce2b174b2833b35b9387ccbb4c8faf03b5575c9cebdd

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124130483512.dll

                      Filesize

                      1.1MB

                      MD5

                      a91787e30ae7e3c5febb142a55f1a32a

                      SHA1

                      2390e2e8aa63d5fc5c1d99b178ebdee3655bd4bf

                      SHA256

                      8c16a0e43f6d7d56c22377420d6975ebc2152b964009121dfa63a7cd0253b0c8

                      SHA512

                      48977d290c064a3c094248dc663aef482c252583b9b0f564ffdd2baf99ea2b23c73d52dd5ccbfb0fe48b63399036255002035bd1c02d17f05eaa77fc118eb6b1

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124139084420.dll

                      Filesize

                      66KB

                      MD5

                      9ba82b798aa916d7d7a1862593358152

                      SHA1

                      0f14cd437badb5ab0a5f2ce8bd24d563cb1707f3

                      SHA256

                      46d4f110f8d2f1e275dfa7792fe3568b2cb319d82c47ecbd57e79c793a289f57

                      SHA512

                      ad1c41c3b2ec26553409aeccf39bc24dad2d20fb1bcd465860a0870025238324342564fcd74041e6a1bdbcdaafd45eb8f7b7a0d81002d8be04a34007b8eef7c9

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124139084420.dll

                      Filesize

                      57KB

                      MD5

                      2be8c2587c13e3a2accee6cb2ce30ed4

                      SHA1

                      5b6993d8c5a95afe4009327341474aaa85bd3bfd

                      SHA256

                      b2292898b84cb13f1061421b05922f52825b14b310f61a227928c965d0f1947a

                      SHA512

                      84ca71961557b816f8f8386608c78ca6a0dafc7a0171b91e077a0351c6723e66fd2fa26d0942e32a0054c8af1be5fbe60c36292120967aa824dc79be9818c772

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124142545000.dll

                      Filesize

                      1.2MB

                      MD5

                      45ed2f58df091d03257f2a2ea5cd41af

                      SHA1

                      33d7fa5f3744321885ac3f1fc3f28a7d40191daf

                      SHA256

                      996fb9d1f26971d869c7f5030db73f823bac4f90e82762ad699d6d07a23b52be

                      SHA512

                      bf55f0105c5f1bc20c0defe2d508fbb5ba54175371918806e493369e6de15e24cff65d7e417d5ba6d14453b9c98f93abd339f285c662ea186f98716046d866dc

                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2403260124145734476.dll

                      Filesize

                      1.2MB

                      MD5

                      d287b8e14e6bcc480f40aa9309076624

                      SHA1

                      0ddb9e08d1e350aecc351d26d08ef83a086f5495

                      SHA256

                      4f4c0fb0603dfe7a317b76a76e0990a57cb5c2c28d1c0b01e2cd4b42dedf1da3

                      SHA512

                      9514591844bf349abe280fd1daeaaba4c7b462ce80953c812b741d70524dd819b173257975eaac8e0c236cfe537205d33417160ef4a265a3b3edbe44e08aa4fd

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u1tcvi2c.3tw.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe

                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                      Filesize

                      40B

                      MD5

                      fd61f1cc37a8c1188797c1a0dc07871d

                      SHA1

                      20451aa4d4f99839fc0ce0d0d0c4f1d9eaeaa3e7

                      SHA256

                      59d09ce96328fcbd559e14950f949b09eb5c984b1468441c011804519ebdf1aa

                      SHA512

                      66c9bd4f9efd93314a53430ec30dfe7e0c8f5897370d204ab8e51344bf3b8068221aa8e12abf701b717921a034416bd2e1d476306a5b87051d4c39b28680b2d0

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll

                      Filesize

                      109KB

                      MD5

                      154c3f1334dd435f562672f2664fea6b

                      SHA1

                      51dd25e2ba98b8546de163b8f26e2972a90c2c79

                      SHA256

                      5f431129f97f3d56929f1e5584819e091bd6c854d7e18503074737fc6d79e33f

                      SHA512

                      1bca69bbcdb7ecd418769e9d4befc458f9f8e3cee81feb7316bb61e189e2904f4431e4cc7d291e179a5dec441b959d428d8e433f579036f763bbad6460222841

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                      Filesize

                      1.2MB

                      MD5

                      f35b671fda2603ec30ace10946f11a90

                      SHA1

                      059ad6b06559d4db581b1879e709f32f80850872

                      SHA256

                      83e3df5bec15d5333935bea8b719a6d677e2fb3dc1cf9e18e7b82fd0438285c7

                      SHA512

                      b5fa27d08c64727cef7fdda5e68054a4359cd697df50d70d1d90da583195959a139066a6214531bbc5f20cd4f9bc1ca3e4244396547381291a6a1d2df9cf8705

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                      Filesize

                      897KB

                      MD5

                      43b0e96d6262cb2861081089827f0e58

                      SHA1

                      89b6d623ebce3d77716d05de1ad5942ab601cf2b

                      SHA256

                      8b01bc8ef1470afc516cac4995493cf162ff7cedca481d1f7dd062d3cf48bc9e

                      SHA512

                      d06f5ffd562a0120030c5b5c1df35e6251ff1917aba9593085279cb39d2bc00501ad2556f9b83b4582c8f3468b760eb73c36e6db7b12fae90a2da13e9f50d13a

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                      Filesize

                      802KB

                      MD5

                      11172acb048c708ea510632fcb166e61

                      SHA1

                      4a052bd64b670e06cbf1973cf63e8c684ec1bf63

                      SHA256

                      2a7ee3c068ce56e96d47f10abde0cc85aafdb5e43d7f64ed54988f8a4c3fd625

                      SHA512

                      f9bc8f0053f8b3f0fc0a408a4124f867bb86bea7b5706ada8896ed660585a60f64d3dda626fba3622e378844bf6ffddb36448b07c66b21e94653fc3aa8e53950

                    • C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dll

                      Filesize

                      839KB

                      MD5

                      76ec1e9a6676a09c256301695d106944

                      SHA1

                      d56ff3400faae1e9af1316df97daf4229a3b69a4

                      SHA256

                      967fdf6c1da118b0834d6f792ecd1d54d763dd5664cff1da419cc57cd3b69de4

                      SHA512

                      be3e7b0509f0b964c0743407baaf67de967871f142feb8ecc394d01691768ed137dd042efc3ea3bf4df2ea077ef20eb7fea950a7ecdd4797949f870493a6474e

                    • C:\Users\Admin\Pictures\7tZ0f7wiBrvCrxe5BaJGXPhz.exe

                      Filesize

                      7KB

                      MD5

                      5b423612b36cde7f2745455c5dd82577

                      SHA1

                      0187c7c80743b44e9e0c193e993294e3b969cc3d

                      SHA256

                      e0840d2ea74a00dcc545d770b91d9d889e5a82c7bedf1b989e0a89db04685b09

                      SHA512

                      c26a1e7e96dbd178d961c630abd8e564ef69532f386fb198eb20119a88ecab2fe885d71ac0c90687c18910ce00c445f352a5e8fbf5328f3403964f7c7802414c

                    • C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe

                      Filesize

                      2.2MB

                      MD5

                      926d90bb95158ef51853408f27b2d74f

                      SHA1

                      10cd9c4923f55cd35d3094f0f5bca9e99866a0ca

                      SHA256

                      b95edc7a86d08044bd24001e7a27d7229df83dd7cde683756c4fa7de2e0475e4

                      SHA512

                      e8f7eb0363752b161f8b447297068f4785309b190f8f730b6aa46e0af132686d3af0da8332aaf6be20e4e32d28e8d0133c673529493ed4eb39cf8e98e1fd5657

                    • C:\Users\Admin\Pictures\B3dRtpPBGDRaCVG6aN8a3pJz.exe

                      Filesize

                      3.9MB

                      MD5

                      d8bd41d32d617bdb1569119d57380de2

                      SHA1

                      70e3eaf334fbc721d091b0c42b291fac46d2b485

                      SHA256

                      7afa8c82bcc6dd08b00431e4c0de694c4f3ce91cfffe3742ab1a6539580eba75

                      SHA512

                      4533d6a6e246c562a49e8a383bfe02c9d4577e9e0e88ee83559f690e945ec03fbfc4a1417ff165e4e0518dedc24b7df7174d7cd3a22641cb10a9631eb50472ee

                    • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe

                      Filesize

                      1.2MB

                      MD5

                      7c358ffa5eec3685abb86214b3eaefbc

                      SHA1

                      b7871f8e62b0fa7e026f9bf0e7fc27826ea44d35

                      SHA256

                      2da66febbd915a1bf7c0763d199d51dd6f9c030c1983a641ac6b4465a7b3b45a

                      SHA512

                      eb81cbf37158a790eee44c8c9c8624a78698669304bdd08e810c987d92eafc4b17a2ad7dbc43d1db50884dbb09b91680a6c1e1a9c5bd23c0504ba083e66baeb9

                    • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe

                      Filesize

                      1.4MB

                      MD5

                      cc1c0012f4505f8781e8c563502acdee

                      SHA1

                      5cb9df29f2d26e66793b19e4e5608cf07977ed37

                      SHA256

                      77daa0e352924d90564e543bb8b780b46c8aad9f2763b1049d7923aab45017b1

                      SHA512

                      c724a2c3fb0ffc05888845dfa6e83ce1f029d412ef161b0730ff543e08b74a9ebcb1388bccae850fe9841412a70e3bfa3c5fb39b6680e3282aa6c786ceb90d7a

                    • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe

                      Filesize

                      2.3MB

                      MD5

                      1dacd9a836b4ecd35c129c778379951a

                      SHA1

                      64d4f7567e9aafad32f191a5a21d44b0380765f3

                      SHA256

                      e9ddcb65c65f186dabdd4ff6f6cc515114c1c30bc82d53c36f176b9e00287114

                      SHA512

                      5769dc2053c0b6e9618fc6636175621efea35bf6ed1f960476c1a4a242913af1cd2271c04cf0d93e836961011585f861ececa11d1aaf216645b93c4fea3a073a

                    • C:\Users\Admin\Pictures\Xc90dhXVQswAqCCztpQHibxA.exe

                      Filesize

                      2.5MB

                      MD5

                      0c265c49e4b2d57c1a6a29b5977966ac

                      SHA1

                      6d4d2df1c22e7af90a43d04cb4a260888786ae45

                      SHA256

                      1aac98dc5ddbc418d2e417154c9223fbb3f092f37c0dd9cfc6d59613109cf54c

                      SHA512

                      e926dd1dd2447291721247ca49dde6d586d34c689c16a4ec14f516501528fb39b5f8617f68f2014a358fd6b3574b10cd9b9b8d2039425d4bc2bef68fb2398e3c

                    • C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe

                      Filesize

                      128KB

                      MD5

                      0528c3ba471402467e6177c5d85aaa11

                      SHA1

                      51cec45a3cb42e604ab2b2c60b2c77a5fc58da5d

                      SHA256

                      f3b46c66fdd167657d351d66ed886f9146dd3c86e3adb349b8495375fa7e5650

                      SHA512

                      f8503b88d1dbf59945ac47f0bf01f1c00ae3d25bcbedffd59beff84c850bc83b3068b5ca840a4990576903eed648c149f7efc4e21b00cba3bbcf53f0acb09fa6

                    • C:\Users\Admin\Pictures\wD2RUxX6MD7QXPGNkZWrYw7j.exe

                      Filesize

                      1.2MB

                      MD5

                      e0b90cd0103e77c92b5c8c05c7184afb

                      SHA1

                      c07181a3d6cc0b6fab2b4b782a1a9d77beb741db

                      SHA256

                      0647347144ccfdc0cd34bffbb68b1815909fb67c1c1a60dd26232fa77680adc2

                      SHA512

                      847ae726cc6be8315900f9a199dc3618d53ca811adff7bfda2a52bcbae50752c4cb0604f68580dc20fbc793588da57596a8723bb8bf71abbf8e1600fd7d8486e

                    • C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe

                      Filesize

                      3.2MB

                      MD5

                      e0eaa0a913312ae838f2e2d4e0b5371a

                      SHA1

                      a9e73483b559aebe1a3e31cd15350a0b2ff1c04e

                      SHA256

                      cc9485c2fa785a7238667318f64d57fc96bb9a839c2aa625bdbdeb1c21f45b18

                      SHA512

                      0f0b089929f437e2ad9793ac9121a74524ffc2a21c337b976f3f3093c2fb62ffeb6a08b052c809eee9396a7e5ad61d4f56978c8c741ea6b7db49e6e3d27a0586

                    • C:\Users\Admin\Pictures\wZ19rY9w78Hl2smNcBrDqNNL.exe

                      Filesize

                      4.2MB

                      MD5

                      16ba0152d22360d4e1c2b782cde6dc52

                      SHA1

                      26a0cbce35fbd6ed02ff8d59e59656ecfd799da1

                      SHA256

                      28048e60571fa0ae2c5703a500f9b83d7427c376a6d44b13bf2d13df26c6a9e5

                      SHA512

                      7b3fb5c0065ae788a86f5ae439f6ad1f6bbb38b1f9039077f73fed84d57282bf331118a88eed5750c44a781a7ff231d2297e333d22b8e03353987513d0bb56e5

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      64KB

                      MD5

                      4315dab50894bc4a5990730491538d7a

                      SHA1

                      d7fe8c11ed988b4e9ac23c52bffd0388de2ecc9a

                      SHA256

                      a2225a0dde6ce4a16a0d5f2a653d4b14de7a4930e09b25d48ca41720160b1b95

                      SHA512

                      a7c83562bd313647c34298a56abaa69c62101f02fce61565c8bd1a372a657dd5715a7606c6873754816cf705e83a0fcfacccacc45e2a0fc92a54e0c28d80b910

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      1.5MB

                      MD5

                      03209b90c8c2a1a973f999b9c1f756f1

                      SHA1

                      30f1013b64c6a8abad3bca6ad0db669e9fd1278a

                      SHA256

                      6ea023b49e8fdc4e933276ddce0449402f0d9ddf65137fc4999d1866a59a9535

                      SHA512

                      4c4b0940af3f959942de0eac0d8c471e74eabd918bf0531e59b91110f07542aecd787f8b50c2a7b61efd9e6daa92b798db5c5e9ed854c4adabf14a0740debb85

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      1.1MB

                      MD5

                      9f92f846e2a01da2e179e7458fc4907c

                      SHA1

                      4f25ee772a6e55ccb29851bf6136f468c8717e07

                      SHA256

                      aeabbddbfc23c375f65b6eca081aa261ec2861a6fffb489dbbf0301e4345af27

                      SHA512

                      68e6079d01c6af1ed91ac1a6cbc244e0efc4835217e4d3b2c117b04af797195c351077435816aa97f7598d9517fc05ae6f5de37967f8d4564da5db3846a33fd6

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      128KB

                      MD5

                      716b935f22d55139a4e614e96029e2b3

                      SHA1

                      e30efd601ad701e8e87228e9a19d6b92548516fb

                      SHA256

                      c931aaef7e4f4f1393b1d28698a5cb0a69aff90a831b97a510b3c3fe5ce53c19

                      SHA512

                      52f47ff533465c1eadd31421313b53c713793ec0224e31a9255f3fb2499487ee278203a857e3a3d55771813571a5b84bf7bab0cbd26cb22fc8b6b6b372b8804f

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      1.3MB

                      MD5

                      623b1aa60cad12ba9efab06b5c7fd6dc

                      SHA1

                      db73901700a47e92307bc4c31e43fb5a817826e1

                      SHA256

                      cdbf8c382a4014d90d977909610e16ae5c4ae3c54bc8e9e07b6239e2ef051bd4

                      SHA512

                      c36c02eb3ef2745d072b939d9301386d01f71931ed6fa6be55b68e9eeb3fdef2b969730027e7a62989e2ed167725e3fcd70d4e6238be5e3cf3121e425dbe57e0

                    • C:\Users\Admin\Pictures\xfG82x0lroBU9PDhZ1q2beQA.exe

                      Filesize

                      1.2MB

                      MD5

                      121d7cecd0ddb3619186452add75002a

                      SHA1

                      5d6718d3d727ccbb62c38dca85b88e11fbb0d9d9

                      SHA256

                      2fdbfaac7401f18e33a2f32ad51d3329cde852280ec14e01f0551892e3086da4

                      SHA512

                      3547bce6f4ea18b21096351d48c3712dcc1ae8c0620a45877a8bffa6d1ac617568f33cb181361f9239a57b9aa1f85c49eb10b4d3253a6453f7c0dc2421e67f5b

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      283bdf7cac5f25578b9443aaf224b6ea

                      SHA1

                      c2240b8c3e2cf96d22cb748ef297ac0cc312320a

                      SHA256

                      efb7d303a91539478ea4ff387901e9cca4e11778cbcb71940ade707df3fcddaf

                      SHA512

                      d3bd9b32d1a93d7d7574c3e3069101a57f9a06952ceac526963ccbcee4b7684f1868ab2e8f9004e992530c21c2d1c1fdad955d94c061739804484f8f88fe4e7f

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      37b74ca7e962300ead3fc2b903fa1d88

                      SHA1

                      b2f43c7b5189ea8663034966ff8b7bc0b742ff3c

                      SHA256

                      e54320a1702723aafc3e82c26a0dbb74a2d3c7cedd6aa11104d3078f06d7d195

                      SHA512

                      27a0820d5d3f446eea31bd22db7c1b424bce5ad21458abcc7645d3bffd969b00d8e997a50600ad83c4749c83bd2803b799799232a94204fb2f4c7a3642d22b5c

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      bc4c83c22457c3e226a694e82f64e4b0

                      SHA1

                      9f341f816d43344a41c3609095738bcb4eaf42f7

                      SHA256

                      63b94f72bf271d2ed4aabf94259248e983a2937d484eb35019af2840f40b63f9

                      SHA512

                      2cc7e4e03f7769a63d057b9745debcefdb41a5f8aa5536d8f271cc24b5c69bfe47ad896f3b617624dcfd0776bfe2f66daf430622280e9e6491df6e857fdf437c

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      ece8c2175c54de91c0d96c5eb6dddcc6

                      SHA1

                      2bceea0c653bc9d294cb62e7b15101dc57e484a1

                      SHA256

                      4c54384b6bbbe32f6b2c85a789e8e67c9bb39e6db7d5f5d0858c15525797c904

                      SHA512

                      e4b4024994a06451a44277e0872905658fdc782e9dd35b0c04682f01f0cb7ddc415d761758b7a06c9cc2a2de836e17d137492e9c0126a01c5ec232bbafef09bd

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      bcb383afe61732570736d82fef2e2be0

                      SHA1

                      bf6e9badc842e263c33c22587727b283c747524b

                      SHA256

                      84e8e9f6af577506ab96cd3be406ccaba7f0857e48fff2e5988c9ba9a8249826

                      SHA512

                      429cad3baa3c8090c54022aeaef64a919cb1d197ac1050fb47b004557df39fd18caf9302727cae31546d132ad4ee9f79344a65c6542db0cfaae996a46a54f080

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      96c08f587adc2ec58906de71c89f1721

                      SHA1

                      1bd92a07875845d080ec14ba91abdc3e3a7b2f0e

                      SHA256

                      cac3f28031a67271116a5d24523b6517317f14b734ae19b237e16bd6eecf0688

                      SHA512

                      ebbebda42a5181d5fe52ebee594204f42166c0f70990b231d17aaa672db3eea9be5c30c855b8b6dcbdf1a4333e621376da212bb5ae86d5d9badbcdc3ce3b1583

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      068a53c97e6620617c44dd14f53e291e

                      SHA1

                      c8847343ab58bea10d388b86a629145eaed539e5

                      SHA256

                      48aa7efb397f46434e1237004eda6b9d018e3ce8646f799348a5ea7f67aded3b

                      SHA512

                      956f79d7ddb3e36b9f32313ef7e1909ed65e398397dcc94c4ccbf5106b7d3b2e38e391601130a6ed1e6b730418160defed4e39d2b2255f0b2099aa11b1c2006f

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                      Filesize

                      19KB

                      MD5

                      e0b988b56749e9eee44ed06c0a1694b0

                      SHA1

                      3bbcd84ad03b2cd906c6178c0110dfb68d4cd7cd

                      SHA256

                      afbc7f0038325b04dd4aa23ea43df798946a574eac8ab683a54634f25ab2f922

                      SHA512

                      2ff786324dc7c6d95c4011de0261d5039359e90c6c2efe6670e3a8bd00b13220c303bf3ad1c7d88dafd7ef6fe925874b974ef8a648b783e4f0f88ae1349dfa86

                    • C:\Windows\System32\GroupPolicy\gpt.ini

                      Filesize

                      127B

                      MD5

                      8ef9853d1881c5fe4d681bfb31282a01

                      SHA1

                      a05609065520e4b4e553784c566430ad9736f19f

                      SHA256

                      9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

                      SHA512

                      5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

                    • C:\Windows\rss\csrss.exe

                      Filesize

                      3.8MB

                      MD5

                      0cf8e0dcdf294995341fbc24098eb987

                      SHA1

                      461150a3621600151ecbb4e412b4d31908474acd

                      SHA256

                      79bf9fd8f576b8ed0da795cce0f92864c02d21e8ab79f59d93894b0ee9e7dc4b

                      SHA512

                      4955301ca1d477dcc4593dfbbf4a65bbe4f8292b3b0ff1ba60be81afd5b71f5244aa494939ce11fbcdb3de2847eec210747e868d6698d8f35d39837427f6317f

                    • C:\Windows\windefender.exe

                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • memory/212-277-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/212-178-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/212-62-0x0000000002E30000-0x000000000371B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/212-59-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/212-50-0x0000000002A20000-0x0000000002E28000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/212-160-0x0000000002A20000-0x0000000002E28000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/212-439-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/1460-112-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-211-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-101-0x00007FF900000000-0x00007FF900002000-memory.dmp

                      Filesize

                      8KB

                    • memory/1460-104-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-105-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-102-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-100-0x00007FF97E770000-0x00007FF97EA39000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/1460-113-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-122-0x00007FF980FB0000-0x00007FF9811A5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1460-258-0x00007FF980FB0000-0x00007FF9811A5000-memory.dmp

                      Filesize

                      2.0MB

                    • memory/1460-98-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-97-0x00007FF900020000-0x00007FF900021000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-248-0x00007FF97E770000-0x00007FF97EA39000-memory.dmp

                      Filesize

                      2.8MB

                    • memory/1460-103-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1460-95-0x00007FF60C7F0000-0x00007FF60D207000-memory.dmp

                      Filesize

                      10.1MB

                    • memory/1704-233-0x000000007FB70000-0x000000007FB80000-memory.dmp

                      Filesize

                      64KB

                    • memory/1704-250-0x0000000008190000-0x000000000880A000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/1704-143-0x0000000006820000-0x000000000686C000-memory.dmp

                      Filesize

                      304KB

                    • memory/1704-93-0x0000000005320000-0x0000000005330000-memory.dmp

                      Filesize

                      64KB

                    • memory/1704-212-0x0000000005320000-0x0000000005330000-memory.dmp

                      Filesize

                      64KB

                    • memory/1704-131-0x00000000062E0000-0x0000000006634000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/1704-111-0x0000000005790000-0x00000000057B2000-memory.dmp

                      Filesize

                      136KB

                    • memory/1704-83-0x0000000003100000-0x0000000003136000-memory.dmp

                      Filesize

                      216KB

                    • memory/1704-120-0x0000000006200000-0x0000000006266000-memory.dmp

                      Filesize

                      408KB

                    • memory/1704-228-0x0000000007920000-0x0000000007952000-memory.dmp

                      Filesize

                      200KB

                    • memory/1704-230-0x000000006F700000-0x000000006F74C000-memory.dmp

                      Filesize

                      304KB

                    • memory/1704-232-0x000000006F750000-0x000000006FAA4000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/1704-139-0x0000000006790000-0x00000000067AE000-memory.dmp

                      Filesize

                      120KB

                    • memory/1704-243-0x0000000007900000-0x000000000791E000-memory.dmp

                      Filesize

                      120KB

                    • memory/1704-246-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/1704-231-0x0000000005320000-0x0000000005330000-memory.dmp

                      Filesize

                      64KB

                    • memory/1704-99-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/1704-247-0x0000000007980000-0x0000000007A23000-memory.dmp

                      Filesize

                      652KB

                    • memory/1704-119-0x0000000006190000-0x00000000061F6000-memory.dmp

                      Filesize

                      408KB

                    • memory/1704-94-0x0000000005960000-0x0000000005F88000-memory.dmp

                      Filesize

                      6.2MB

                    • memory/1704-251-0x0000000007B70000-0x0000000007B8A000-memory.dmp

                      Filesize

                      104KB

                    • memory/1704-252-0x0000000007BE0000-0x0000000007BEA000-memory.dmp

                      Filesize

                      40KB

                    • memory/1704-255-0x0000000007E00000-0x0000000007E96000-memory.dmp

                      Filesize

                      600KB

                    • memory/1704-257-0x0000000007D60000-0x0000000007D71000-memory.dmp

                      Filesize

                      68KB

                    • memory/1704-96-0x0000000005320000-0x0000000005330000-memory.dmp

                      Filesize

                      64KB

                    • memory/1732-814-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/2136-724-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2136-583-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2436-74-0x00000000029A0000-0x0000000002DA1000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2436-299-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2436-205-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2436-75-0x0000000002DB0000-0x000000000369B000-memory.dmp

                      Filesize

                      8.9MB

                    • memory/2436-450-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2436-77-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2436-181-0x00000000029A0000-0x0000000002DA1000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/2692-799-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2692-815-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2692-826-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/2796-157-0x0000000000B50000-0x0000000001088000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/2920-260-0x000000006F750000-0x000000006FAA4000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/2920-185-0x0000000002600000-0x0000000002610000-memory.dmp

                      Filesize

                      64KB

                    • memory/2920-270-0x000000007F2E0000-0x000000007F2F0000-memory.dmp

                      Filesize

                      64KB

                    • memory/2920-183-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/2920-186-0x0000000002600000-0x0000000002610000-memory.dmp

                      Filesize

                      64KB

                    • memory/2920-259-0x000000006F700000-0x000000006F74C000-memory.dmp

                      Filesize

                      304KB

                    • memory/3204-825-0x0000000000400000-0x00000000008DF000-memory.dmp

                      Filesize

                      4.9MB

                    • memory/3512-167-0x0000000000B50000-0x0000000001088000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3796-229-0x0000000002B40000-0x0000000002F3E000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/3796-91-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/3796-308-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/3796-207-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/3796-78-0x0000000002B40000-0x0000000002F3E000-memory.dmp

                      Filesize

                      4.0MB

                    • memory/3796-328-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/4420-179-0x0000000000DA0000-0x00000000012D8000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4476-206-0x0000000000B50000-0x0000000001088000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4868-25-0x0000000000400000-0x0000000000408000-memory.dmp

                      Filesize

                      32KB

                    • memory/4868-27-0x0000000005660000-0x0000000005670000-memory.dmp

                      Filesize

                      64KB

                    • memory/4868-26-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4868-146-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4868-159-0x0000000005660000-0x0000000005670000-memory.dmp

                      Filesize

                      64KB

                    • memory/4964-224-0x0000000005060000-0x0000000005070000-memory.dmp

                      Filesize

                      64KB

                    • memory/4964-222-0x00000000736C0000-0x0000000073E70000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4964-223-0x0000000005060000-0x0000000005070000-memory.dmp

                      Filesize

                      64KB

                    • memory/5000-189-0x0000000000B50000-0x0000000001088000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/5820-729-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/5820-489-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/5952-499-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB

                    • memory/5952-737-0x0000000000400000-0x0000000000D1C000-memory.dmp

                      Filesize

                      9.1MB