Analysis

  • max time kernel
    111s
  • max time network
    124s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-04-2024 10:03

General

  • Target

    https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.35

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Detect ZGRat V1 3 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 4 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 26 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 5 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 13 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.35
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe7cc49758,0x7ffe7cc49768,0x7ffe7cc49778
      2⤵
        PID:2940
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:2
        2⤵
          PID:2228
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
          2⤵
            PID:3404
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
            2⤵
              PID:3304
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:1
              2⤵
                PID:4512
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:1
                2⤵
                  PID:2064
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5244 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                  2⤵
                    PID:4832
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5308 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                    2⤵
                      PID:872
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                      2⤵
                        PID:880
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                        2⤵
                          PID:796
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                          2⤵
                            PID:3400
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5368 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                            2⤵
                              PID:2036
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5348 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                              2⤵
                                PID:860
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:8
                                2⤵
                                  PID:4452
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4568 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:2
                                  2⤵
                                    PID:5244
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:1272
                                  • C:\Windows\System32\rundll32.exe
                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                    1⤵
                                      PID:2660
                                    • C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe
                                      "C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe"
                                      1⤵
                                      • Executes dropped EXE
                                      PID:992
                                      • C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp" /SL5="$202B6,837550,832512,C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Checks processor information in registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        PID:4464
                                        • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exe
                                          "C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exe" -ip:"dui=ebaa0802-254d-4be1-a642-a8a5c0b06224&dit=20240415100403&is_silent=true&oc=ZB_RAV_Cross_Solo_Soft&p=fa70&a=100&b=&se=true" -i
                                          3⤵
                                          • Executes dropped EXE
                                          PID:3064
                                          • C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe
                                            "C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe" /silent
                                            4⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:1564
                                            • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exe
                                              "C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exe" "C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe" /silent
                                              5⤵
                                              • Drops file in Drivers directory
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Drops file in Program Files directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3432
                                              • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
                                                "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:10
                                                6⤵
                                                • Executes dropped EXE
                                                PID:512
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf
                                                6⤵
                                                • Adds Run key to start application
                                                PID:4408
                                                • C:\Windows\system32\runonce.exe
                                                  "C:\Windows\system32\runonce.exe" -r
                                                  7⤵
                                                  • Checks processor information in registry
                                                  PID:1516
                                                  • C:\Windows\System32\grpconv.exe
                                                    "C:\Windows\System32\grpconv.exe" -o
                                                    8⤵
                                                      PID:4984
                                                • C:\Windows\system32\wevtutil.exe
                                                  "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml
                                                  6⤵
                                                    PID:1696
                                                  • C:\Windows\SYSTEM32\fltmc.exe
                                                    "fltmc.exe" load rsKernelEngine
                                                    6⤵
                                                    • Suspicious behavior: LoadsDriver
                                                    PID:4832
                                                  • C:\Windows\system32\wevtutil.exe
                                                    "C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\elam\evntdrv.xml
                                                    6⤵
                                                      PID:392
                                                    • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                                                      "C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i -i
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Modifies system certificate store
                                                      PID:5008
                                                    • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                                                      "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe" -i -i
                                                      6⤵
                                                      • Executes dropped EXE
                                                      PID:4604
                                                    • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                                                      "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe" -i -i
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Drops file in Program Files directory
                                                      • Modifies system certificate store
                                                      PID:2316
                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe
                                                "C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe" --silent --allusers=0 --otd=utm.medium:apb,utm.source:ais,utm.campaign:opera_new_b
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Enumerates connected drives
                                                • Modifies system certificate store
                                                PID:3116
                                                • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe
                                                  C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2ac,0x2b0,0x2b4,0x288,0x2b8,0x7195e1d0,0x7195e1dc,0x7195e1e8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:984
                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe" --version
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:652
                                                • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3116 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240415100429" --session-guid=8db75a2e-1adb-4979-9231-835547731687 --server-tracking-blob=ZmE5YzFmMDNlZTRmNmYwZjgwOTY1ODc4MWYzOGRiNDg3YWIzOTYxNzg1ZTM4MGM1YzZjZDU0OTM4MWRlZTQxMjp7ImNvdW50cnkiOiJJTCIsImVkaXRpb24iOiJjZGYiLCJpbnN0YWxsZXJfbmFtZSI6Ik9wZXJhU2V0dXAuZXhlIiwicHJvZHVjdCI6eyJuYW1lIjoib3BlcmEifSwicXVlcnkiOiIvZWRpdGlvbi9jZGY/dXRtX2NvbnRlbnQ9Y2RmJnV0bV9tZWRpdW09cGIiLCJzeXN0ZW0iOnsicGxhdGZvcm0iOnsiYXJjaCI6Ing4Nl82NCIsIm9wc3lzIjoiV2luZG93cyIsIm9wc3lzLXZlcnNpb24iOiIxMCIsInBhY2thZ2UiOiJFWEUifX0sInRpbWVzdGFtcCI6IjE3MTI0NzU3NzIuMDk1MiIsInVzZXJhZ2VudCI6Ik1vemlsbGEvNS4wIChXaW5kb3dzIE5UIDEwLjA7IFdpbjY0OyB4NjQpIEFwcGxlV2ViS2l0LzUzNy4zNiAoS0hUTUwsIGxpa2UgR2Vja28pIENocm9tZS8xMjMuMC4wLjAgU2FmYXJpLzUzNy4zNiIsInV0bSI6eyJjYW1wYWlnbiI6Im9wZXJhX25ld19iIiwiY29udGVudCI6ImNkZiIsIm1lZGl1bSI6ImFwYiIsInNvdXJjZSI6ImFpcyJ9LCJ1dWlkIjoiNGQ1NTg2MjEtNjlkNy00Nzk0LTk5ZDMtY2NmODEwMjY4YTg3In0= --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A804000000000000
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Enumerates connected drives
                                                  PID:5032
                                                  • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe
                                                    C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2a0,0x2a4,0x2a8,0x12c,0x2b8,0x70b3e1d0,0x70b3e1dc,0x70b3e1e8
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:2276
                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  PID:4760
                                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe" --version
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:4048
                                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x1556038,0x1556044,0x1556050
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:1212
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1400
                                                3⤵
                                                • Program crash
                                                PID:3720
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1400
                                                3⤵
                                                • Program crash
                                                PID:1612
                                          • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
                                            "C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:10
                                            1⤵
                                            • Executes dropped EXE
                                            PID:3592
                                          • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                                            "C:\Program Files\ReasonLabs\EPP\rsWSC.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Modifies data under HKEY_USERS
                                            PID:2656
                                          • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                                            "C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:880
                                          • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                                            "C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Enumerates connected drives
                                            • Modifies data under HKEY_USERS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:212
                                            • \??\c:\program files\reasonlabs\epp\rsHelper.exe
                                              "c:\program files\reasonlabs\epp\rsHelper.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              PID:5568
                                            • \??\c:\program files\reasonlabs\EPP\ui\EPP.exe
                                              "c:\program files\reasonlabs\EPP\ui\EPP.exe" --minimized --first-run
                                              2⤵
                                              • Executes dropped EXE
                                              PID:5600
                                              • C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe
                                                "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" "c:\program files\reasonlabs\EPP\ui\app.asar" --engine-path="c:\program files\reasonlabs\EPP" --minimized --first-run
                                                3⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:5632
                                                • C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe
                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2064 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:6072
                                                • C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe
                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=3104 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:6112
                                                • C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe
                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3288 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:6140
                                                • C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe
                                                  "C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3640 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1
                                                  4⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:5192
                                            • C:\program files\reasonlabs\epp\rsLitmus.A.exe
                                              "C:\program files\reasonlabs\epp\rsLitmus.A.exe"
                                              2⤵
                                                PID:5180
                                            • C:\Windows\system32\wbem\WmiApSrv.exe
                                              C:\Windows\system32\wbem\WmiApSrv.exe
                                              1⤵
                                                PID:2476

                                              Network

                                              MITRE ATT&CK Matrix ATT&CK v13

                                              Persistence

                                              Boot or Logon Autostart Execution

                                              1
                                              T1547

                                              Registry Run Keys / Startup Folder

                                              1
                                              T1547.001

                                              Privilege Escalation

                                              Boot or Logon Autostart Execution

                                              1
                                              T1547

                                              Registry Run Keys / Startup Folder

                                              1
                                              T1547.001

                                              Defense Evasion

                                              Modify Registry

                                              2
                                              T1112

                                              Subvert Trust Controls

                                              1
                                              T1553

                                              Install Root Certificate

                                              1
                                              T1553.004

                                              Credential Access

                                              Unsecured Credentials

                                              1
                                              T1552

                                              Credentials In Files

                                              1
                                              T1552.001

                                              Discovery

                                              Query Registry

                                              6
                                              T1012

                                              System Information Discovery

                                              5
                                              T1082

                                              Peripheral Device Discovery

                                              1
                                              T1120

                                              Collection

                                              Data from Local System

                                              1
                                              T1005

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe
                                                Filesize

                                                797KB

                                                MD5

                                                ded746a9d2d7b7afcb3abe1a24dd3163

                                                SHA1

                                                a074c9e981491ff566cd45b912e743bd1266c4ae

                                                SHA256

                                                c113072678d5fa03b02d750a5911848ab0e247c4b28cf7b152a858c4b24901b3

                                                SHA512

                                                2c273bf79988df13f9da4019f8071cf3b4480ecd814d3df44b83958f52f49bb668dd2f568293c29ef3545018fea15c9d5902ef88e0ecfebaf60458333fcaa91b

                                              • C:\Program Files\ReasonLabs\EPP\InstallUtil.InstallLog
                                                Filesize

                                                706B

                                                MD5

                                                96b9ff6f3912c7b80900084c911d2077

                                                SHA1

                                                d0f9df560811c4b23dbc1e070e3e892fb84eb216

                                                SHA256

                                                988d5cb0f6a46f47371c22ca392972b40f7da9a09aa0369f7e12f624d6232f1d

                                                SHA512

                                                4df89a85afec2807bb8c07ca713d3c9f903f25ae9128371851ce247518137804f9e45555bf671f1a9504434803f2696efcaf3772a52409f93d8f8cdf3f8305ef

                                              • C:\Program Files\ReasonLabs\EPP\InstallerLib.dll
                                                Filesize

                                                310KB

                                                MD5

                                                c3b43e56db33516751b66ee531a162c9

                                                SHA1

                                                6b8a1680e9485060377750f79bc681e17a3cb72a

                                                SHA256

                                                040b2e0dea718124b36d76e1d8f591ff0dbca22f7fb11f52a2e6424218f4ecad

                                                SHA512

                                                4724f2f30e997f91893aabfa8bf1b5938c329927080e4cc72b81b4bb6db06fe35dae60d428d57355f03c46dd29f15db46ad2b1036247c0dcde688183ef11313a

                                              • C:\Program Files\ReasonLabs\EPP\System.Net.Http.dll
                                                Filesize

                                                193KB

                                                MD5

                                                8aaffe537f6b9a0560a27f9bd548dfa2

                                                SHA1

                                                06ab3e6125707f4ebfaa9c56192efc51ffab7c88

                                                SHA256

                                                7c94b2ba7bf96322bc0603a9fdeef31286255aef28bc0fa6183e4be65159d5ef

                                                SHA512

                                                fa74208ec5618e6366f85f5cb6105fce1bb06fda0ad1d0a0a2eae09c9d735af54f094be510d2627d05b53aeeb48a3838f4d0e37b2af2f831e388e81fe6607024

                                              • C:\Program Files\ReasonLabs\EPP\elam\rsElam.sys
                                                Filesize

                                                19KB

                                                MD5

                                                8129c96d6ebdaebbe771ee034555bf8f

                                                SHA1

                                                9b41fb541a273086d3eef0ba4149f88022efbaff

                                                SHA256

                                                8bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51

                                                SHA512

                                                ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18

                                              • C:\Program Files\ReasonLabs\EPP\mc.dll
                                                Filesize

                                                1.1MB

                                                MD5

                                                6d27fe0704da042cdf69efa4fb7e4ec4

                                                SHA1

                                                48f44cf5fe655d7ef2eafbd43e8d52828f751f05

                                                SHA256

                                                0f74ef17c3170d6c48f442d8c81923185f3d54cb04158a4da78495c2ec31863e

                                                SHA512

                                                2c3587acab4461568ac746b4cdf36283d4cb2abe09fc7c085615384e92f813c28cf4fcb4f39ec67860eac9c0e4a5f15021aee712d21a682f8df654968ed40ea3

                                              • C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe
                                                Filesize

                                                657KB

                                                MD5

                                                31d9fb62e2c93b09ea373506809b7127

                                                SHA1

                                                9f2b25d0f7853619d9bb9ada07f3f4d28eb2d01c

                                                SHA256

                                                e20d6f35a53a65ba5922d22c47ce6ca650b9f54b4637c1fc3c3904fcf6f18d31

                                                SHA512

                                                62cee54bfa73e4380ba44551a88070c8df9f7d0db1fb3a7e608fc4f701280436b3c9df66e0163065d42e9a1c7b67e1d2949a149b0d86fdf2d2e7fcf918f346da

                                              • C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dll
                                                Filesize

                                                327KB

                                                MD5

                                                9d3d8cd27b28bf9f8b592e066b9a0a06

                                                SHA1

                                                9565df4bf2306900599ea291d9e938892fe2c43a

                                                SHA256

                                                97fe82b6ce5bc3ad96c8c5e242c86396accdf0f78ffc155ebc05f950597cdbd6

                                                SHA512

                                                acefc1552d16be14def7043b21ec026133aabd56f90800e131733c5b0c78316a4d9dc37d6b3093e537ce1974219154e8bd32204127a4ab4d4cd5f3041c6a8729

                                              • C:\Program Files\ReasonLabs\EPP\rsEngine.Loggers.Application.dll
                                                Filesize

                                                143KB

                                                MD5

                                                f25c46924f7354d6dd841ddd323058df

                                                SHA1

                                                4e1f7e80304f60bb6d380286e4a8ffa5730691fb

                                                SHA256

                                                a7b5a14cec1c111d8c5a39563bd3a6eb3844468e141ad35326600faa90bcafb0

                                                SHA512

                                                c143feff18c35b4bc1c751fa157fe14d27650b24876efae40754b9691154d105b47d4d5c58ab776e2a9d9cc4d6009f3ff9b8d65c15b6cba3a2c1e1d0cb92c526

                                              • C:\Program Files\ReasonLabs\EPP\rsEngine.config
                                                Filesize

                                                5KB

                                                MD5

                                                be90740a7ccd5651c445cfb4bd162cf9

                                                SHA1

                                                218be6423b6b5b1fbce9f93d02461c7ed2b33987

                                                SHA256

                                                44fa685d7b4868f94c9c51465158ea029cd1a4ceb5bfa918aa7dec2c528016e4

                                                SHA512

                                                a26869c152ed8df57b72f8261d33b909fb4d87d93dc0061bf010b69bad7b8c90c2f40a1338806c03d669b011c0cb5bbfcd429b7cd993df7d3229002becb658ad

                                              • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLog
                                                Filesize

                                                257B

                                                MD5

                                                2afb72ff4eb694325bc55e2b0b2d5592

                                                SHA1

                                                ba1d4f70eaa44ce0e1856b9b43487279286f76c9

                                                SHA256

                                                41fb029d215775c361d561b02c482c485cc8fd220e6b62762bff15fd5f3fb91e

                                                SHA512

                                                5b5179b5495195e9988e0b48767e8781812292c207f8ae0551167976c630398433e8cc04fdbf0a57ef6a256e95db8715a0b89104d3ca343173812b233f078b6e

                                              • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLog
                                                Filesize

                                                660B

                                                MD5

                                                705ace5df076489bde34bd8f44c09901

                                                SHA1

                                                b867f35786f09405c324b6bf692e479ffecdfa9c

                                                SHA256

                                                f05a09811f6377d1341e9b41c63aa7b84a5c246055c43b0be09723bf29480950

                                                SHA512

                                                1f490f09b7d21075e8cdf2fe16f232a98428bef5c487badf4891647053ffef02987517cd41dddbdc998bef9f2b0ddd33a3f3d2850b7b99ae7a4b3c115b0eeff7

                                              • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
                                                Filesize

                                                323KB

                                                MD5

                                                020402475fceac13f6df2037fadad1fc

                                                SHA1

                                                7aa31b7ecd3858f77d3ac0794865ca7de291c197

                                                SHA256

                                                4a120c77a4a297ea9a28fd28e79eb63266201d9f45ddaeb606b3597ca2d3f005

                                                SHA512

                                                d0aea0df7f13dfca7a1d10f2f7dec3702c9f3c598ed0556f9cd9cecaf1d6129b00a16065c13ed72b0bfa735b58b358649f3f63c655f294ed92c68e14840c2ecd

                                              • C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe.config
                                                Filesize

                                                17KB

                                                MD5

                                                5ef4dc031d352d4cdcefaf5b37a4843b

                                                SHA1

                                                128285ec63297232b5109587dc97b7c3ebd500a6

                                                SHA256

                                                4b094b7bd38e5bf01900e468ddd545b42369ae510ec2366427804a57da5013a7

                                                SHA512

                                                38b0444e4f07ad0b50891e2b0da6374b0033cb9656a4918e9eaae34e381d95671978d19abbcf2b8fdb079921b85e20dbe2c4392b15984ce6051b48b4a05a172f

                                              • C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLog
                                                Filesize

                                                239B

                                                MD5

                                                1264314190d1e81276dde796c5a3537c

                                                SHA1

                                                ab1c69efd9358b161ec31d7701d26c39ee708d57

                                                SHA256

                                                8341a3cae0acb500b9f494bdec870cb8eb8e915174370d41c57dcdae622342c5

                                                SHA512

                                                a3f36574dce70997943d93a8d5bebe1b44be7b4aae05ed5a791aee8c3aab908c2eca3275f7ce636a230a585d40896dc637be1fb597b10380d0c258afe4e720e9

                                              • C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLog
                                                Filesize

                                                606B

                                                MD5

                                                43fbbd79c6a85b1dfb782c199ff1f0e7

                                                SHA1

                                                cad46a3de56cd064e32b79c07ced5abec6bc1543

                                                SHA256

                                                19537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0

                                                SHA512

                                                79b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea

                                              • C:\Program Files\ReasonLabs\EPP\rsWSC.exe
                                                Filesize

                                                203KB

                                                MD5

                                                103f5f469e0d03308b4d8a18c2ad9b3b

                                                SHA1

                                                c380199a6fedc9b1b6638db1264fb05818155f40

                                                SHA256

                                                2bf7c8a5421bd74eae8ede15328c0c39a4ddf524149dee0521372fafdd2f8812

                                                SHA512

                                                608dfa389729ee6f4fff1197eee15e2359f288937e1cbc9b044cf9abf7de06b5d135a2a4a8c5be558ad2593cb5abc0c93b14cec37dd58d2682a2234d0d1d1dee

                                              • C:\Program Files\ReasonLabs\EPP\ui\EPP.exe
                                                Filesize

                                                2.2MB

                                                MD5

                                                defbb0a0d6b7718a9b0eaf5e7894a4b0

                                                SHA1

                                                0495a5eccd8690fac8810178117bf86ea366c8c3

                                                SHA256

                                                c3d2f7e0ad6fd26578595fb3f7c2b202ab6fba595d32dfa5c764922145db0788

                                                SHA512

                                                55dab7ae748a668a2bb57deb6fbff07e6056d97b6f88850890610ac135b8839d3c61f4dc505d3f32cc09a3ff2ce80ce663d0c830f9f399367dc03c92ea7ca89a

                                              • C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf
                                                Filesize

                                                2KB

                                                MD5

                                                e8ef8570898c8ed883b4f9354d8207ae

                                                SHA1

                                                5cc645ef9926fd6a3e85dbc87d62e7d62ab8246d

                                                SHA256

                                                edc8579dea9faf89275f0a0babea442ed1c6dcc7b4f436424e6e495c6805d988

                                                SHA512

                                                971dd20773288c7d68fb19b39f9f5ed4af15868ba564814199d149c32f6e16f1fd3da05de0f3c2ada02c0f3d1ff665b1b7d13ce91d2164e01b77ce1a125de397

                                              • C:\ProgramData\ReasonLabs\EPP\SignaturesYF.dat.tmp
                                                Filesize

                                                5.1MB

                                                MD5

                                                d13bddae18c3ee69e044ccf845e92116

                                                SHA1

                                                31129f1e8074a4259f38641d4f74f02ca980ec60

                                                SHA256

                                                1fac07374505f68520aa60852e3a3a656449fceacb7476df7414c73f394ad9e0

                                                SHA512

                                                70b2b752c2a61dcf52f0aadcd0ab0fdf4d06dc140aee6520a8c9d428379deb9fdcc101140c37029d2bac65a6cfcf5ed4216db45e4a162acbc7c8c8b666cd15dd

                                              • C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp
                                                Filesize

                                                2.9MB

                                                MD5

                                                10a8f2f82452e5aaf2484d7230ec5758

                                                SHA1

                                                1bf814ddace7c3915547c2085f14e361bbd91959

                                                SHA256

                                                97bffb5fc024494f5b4ad1e50fdb8fad37559c05e5d177107895de0a1741b50b

                                                SHA512

                                                6df8953699e8f5ccff900074fd302d5eb7cad9a55d257ac1ef2cb3b60ba1c54afe74aee62dc4b06b3f6edf14617c2d236749357c5e80c5a13d4f9afcb4efa097

                                              • C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat.tmp
                                                Filesize

                                                550KB

                                                MD5

                                                afb68bc4ae0b7040878a0b0c2a5177de

                                                SHA1

                                                ed4cac2f19b504a8fe27ad05805dd03aa552654e

                                                SHA256

                                                76e6f11076cc48eb453abbdbd616c1c46f280d2b4c521c906adf12bb3129067b

                                                SHA512

                                                ebc4c1f2da977d359791859495f9e37b05491e47d39e88a001cb6f2b7b1836b1470b6904c026142c2b1b4fe835560017641d6810a7e8a5c89766e55dd26e8c43

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                Filesize

                                                1KB

                                                MD5

                                                acb15b007f140368012c53365aff928a

                                                SHA1

                                                5bd9e426b8d41cd98333f2cf9511e57fc43112e8

                                                SHA256

                                                32630d751d104254106c789f995e2ce22ddd3f60a202c905a6e5cdc31f86af87

                                                SHA512

                                                a1afaca21a9781d8d7cdaf1cc3a960f9de839203ab3a82fc96463fd6d3d7ac1c0d053b3178894ddb347525f7f98459995817165e940a374b9bfea4f6e8f79db5

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
                                                Filesize

                                                1018B

                                                MD5

                                                95b1bf62086f40d53dcde917c602b67b

                                                SHA1

                                                290c377db638b7e11f08d0b58724052c5ef00bab

                                                SHA256

                                                83488ed76f6126c3b91debd0c55348c3db8066add332690e4133b0a9b2e8b288

                                                SHA512

                                                3b0247c957e41725b5548c6dfe8a0aa35c1bdf0323a00ef8c987b646294fea32db55af742f745041d829134af4e33e570d84a055730fa7d6618780554b3f754f

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                Filesize

                                                5KB

                                                MD5

                                                d01d0ecb207bcce8fba3f05001617e31

                                                SHA1

                                                e67f52affa4071f88e31ac854e679230f4c9d8a8

                                                SHA256

                                                c9a8194af702255e22483849fa33ec1d528b439019406d56b63cd5314759e24e

                                                SHA512

                                                fa3f0c82ee8a85439cbe8b7e0a4a36b3e2bbf6554e6b5a9048715331cedccb634119e5fcea548063de54bb55cf5112bdb7c4822ab21ea19b5179f54d1d3ffb57

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                Filesize

                                                5KB

                                                MD5

                                                99d720c76916dad10e98231249691779

                                                SHA1

                                                9e02028168aca6807e919ff82529a8eeba08a66f

                                                SHA256

                                                6ca2f895aedcd5ce3fd285fa25e6bb224d89cdda0349e45aa4dc56fb77585428

                                                SHA512

                                                3c25dc6cc699d79dfb12b9681620f111d45e14e995614b1254a6da55c48241d26e638703409d07ff319c7c2a5beb655aaeb8f12d6b20fa1a62094236fd58c8bd

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                                Filesize

                                                5KB

                                                MD5

                                                c366d334b558838e2bd3676251613ed4

                                                SHA1

                                                d0457ab70b0c8a68f25c3175b06e3caf567ad162

                                                SHA256

                                                e43abd4ea370c059fa3d80124a4dac7afa3b7b1e3f2a40dc7e938fafa895902c

                                                SHA512

                                                b460df4af6ffcb9d8c8d1a807a94eaad7eedf03d0c9f5f019ab8ad2b2360eed0264abfea3a399f20fb277a861b4546043b2d51a4fba9825d12416cb3062dbbc5

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                                Filesize

                                                136KB

                                                MD5

                                                fe5510fb51281e3b4cc711bd1eb6bc22

                                                SHA1

                                                1b5a1abe6cbec64fb6c0de759ed81c9d2b932bdb

                                                SHA256

                                                1b7b6b42b898d7f840e44a05903611fbffe8b6286f8f065e5cf1828445e3717e

                                                SHA512

                                                c2d5e7faa05f3a1c05b8e8b64ad108aa402466dfabe166eabf37f8e3513f36b9d69bc76686fe37fee3a670ff90fa70709c03aafbfcd143031da10e24d0a9ec5e

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
                                                Filesize

                                                109KB

                                                MD5

                                                c0e748cdb94c05df63fcacdf127be914

                                                SHA1

                                                99805c7cb961ad004a2a3c2ce97ac26943c4bd85

                                                SHA256

                                                0ab2c5b091e8c47bf4cd40efee00a2375899a5d88bebaebea2dd0d3aa598f3c0

                                                SHA512

                                                dfa50ff076ed910fb370c6bc7bafa7169117b32382c6ece7eb320c320fd66f96f9b3149e7e1bc67ab12b87f5df5fc607e54ca3942b25db412da55614ffa298d2

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57f7cd.TMP
                                                Filesize

                                                105KB

                                                MD5

                                                8f824420bd96a1e35359b52083baebe4

                                                SHA1

                                                1de90febb535f05dfdd642c06052b20984a615e6

                                                SHA256

                                                b809d8dba52d5a555f4f5c790a1911d5e73c2a557294e855d756d225de45395e

                                                SHA512

                                                ba201655206b9a40b0de053a1a4afbdb530f63b36bb9df906746afe07d8c2245524b9b8bfe92aa5768d710ab25b8cf6fc0585403b369f921b1bbc37eef7386c0

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json
                                                Filesize

                                                2B

                                                MD5

                                                99914b932bd37a50b983c5e7c90ae93b

                                                SHA1

                                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                SHA256

                                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                SHA512

                                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\additional_file0.tmp
                                                Filesize

                                                2.5MB

                                                MD5

                                                15d8c8f36cef095a67d156969ecdb896

                                                SHA1

                                                a1435deb5866cd341c09e56b65cdda33620fcc95

                                                SHA256

                                                1521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8

                                                SHA512

                                                d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a

                                              • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\opera_package
                                                Filesize

                                                103.8MB

                                                MD5

                                                5014156e9ffbb75d1a8d5fc09fabdc42

                                                SHA1

                                                6968d1b5cec3039e53bbbedeee22e2d43d94c771

                                                SHA256

                                                7a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802

                                                SHA512

                                                bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016

                                              • C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe
                                                Filesize

                                                1.9MB

                                                MD5

                                                7df87fb6f81050b74397602985e69b0f

                                                SHA1

                                                68b6d5eb0b05749907ba3d505084969e45892889

                                                SHA256

                                                ea4f7c9064f9b9907dab6ca9a5ba9d653c09fb99aee6fe80eac0f164bbaa7208

                                                SHA512

                                                e2c28e5dd637addc32dc898c26636b72fe27ee247bc247f478eaa7e11968d14cd6602b24b515666832114985b1aeb7cd2d7f55e93f0101f8e2b6c569142c3c2d

                                              • C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp
                                                Filesize

                                                3.1MB

                                                MD5

                                                b73671574337bfc2ed9c1e7a7f844fa2

                                                SHA1

                                                b5ca54ecae35b3e241fd07ee6055394e20043c13

                                                SHA256

                                                95332d921556a7709512c2a8f8c8dfec0d77c3b23eea611ec6da04c072544cc5

                                                SHA512

                                                f8615d63fbbe26f13446f6cc8c96e4d41e0822048889ad30a7560caaecf6bab236b221948f60539bc3c5f15789fede52d66dab1e40a3f4510ff033950d9e330b

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\Opera_new.png
                                                Filesize

                                                38KB

                                                MD5

                                                d9ee988b72b14e305f2b8891b1952cde

                                                SHA1

                                                fe73c83b75b11b6eec464cd68df6748ad446ff47

                                                SHA256

                                                2fe0e0d53b94b1dfecb7a9a1990479d55371c49d8387e9037a48460c4b2d76fe

                                                SHA512

                                                9f31c3470a598350296879d6a7d8ccff96d64b59dafb00e53b8ae90f78b341bf7cbde1a4d0fe836e6013048910ee9aa54baece3b6d754c5c0c1e0cd52ccf6eaa

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\RAV_Cross.png
                                                Filesize

                                                56KB

                                                MD5

                                                4167c79312b27c8002cbeea023fe8cb5

                                                SHA1

                                                fda8a34c9eba906993a336d01557801a68ac6681

                                                SHA256

                                                c3bf350627b842bed55e6a72ab53da15719b4f33c267a6a132cb99ff6afe3cd8

                                                SHA512

                                                4815746e5e30cbef626228601f957d993752a3d45130feeda335690b7d21ed3d6d6a6dc0ad68a1d5ba584b05791053a4fc7e9ac7b64abd47feaa8d3b919353bb

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exe
                                                Filesize

                                                44KB

                                                MD5

                                                14289d75280a89979ca3e0e90081ef35

                                                SHA1

                                                4d2ca18611cf967d50d850fc68080cb36528df43

                                                SHA256

                                                b95dd3698f06f86f4c32bd0647b257468edca0d0e76c6e253113ac9eb3a67264

                                                SHA512

                                                b3205d926a4c93d5a032fae1df7a1cf932551ee579874e79599c4796d11e79e6bcb0f33b662ff11e1a264b90d8945e11c1eede67ba99465c91e340dd44b4c567

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1.zip
                                                Filesize

                                                2.3MB

                                                MD5

                                                f743314bda8fb2a98ae14316c4d0d3a2

                                                SHA1

                                                5d8f007bd38a0b20d5c5ed5aa20b77623a856297

                                                SHA256

                                                2113c6d5ef32e3ded8b4b070a6d0da8b1c11a1ba5e7d7fbfb61deeeafc9d451c

                                                SHA512

                                                f30af84df2eb2ddf3ed414c069f0edbcf42110f14e0aed61c0f28d6bca0f1c7785db1d53f90686ffe1f543d610b0f5f223c79160f7245924c38d99e6ffe2321d

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe
                                                Filesize

                                                5.1MB

                                                MD5

                                                472dea5069dd8ba24cd0379d70a78f4f

                                                SHA1

                                                b543293dd4cf909eb0ad3477e718bcdcbf0dadef

                                                SHA256

                                                80640139d8a69161417b01b1e21618921096ec5ea25658e1a56de9a6b7941395

                                                SHA512

                                                fa85babaa4a7ac60759da659ef22348569cf7c653d6c865b3c8277dc1a4a9d7edb356a621b218a9c1f39b48ac7f01dee902a046a57b2bc8b9ce6f424051bf6e4

                                              • C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\mainlogo.png
                                                Filesize

                                                3KB

                                                MD5

                                                6613711e0275a30ae0ebb2cf15ea2cd5

                                                SHA1

                                                aca1ca94ccd1545bb7c45196fb0263d3e663b392

                                                SHA256

                                                e27ed5122766a4961f0f8441767e21e3237fa52e68086cde03cd97e871762163

                                                SHA512

                                                617d6b66387ae5d2b9563f8b45c40cce90ca5c1f6a8038dbdca2622c7c1b23d46f2877b3b44e442b33d1d0336c18a5344581c03f1718acbfa4e8e6c1802430bf

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\Microsoft.Win32.TaskScheduler.dll
                                                Filesize

                                                341KB

                                                MD5

                                                a09decc59b2c2f715563bb035ee4241e

                                                SHA1

                                                c84f5e2e0f71feef437cf173afeb13fe525a0fea

                                                SHA256

                                                6b8f51508240af3b07a8d0b2dc873cedc3d5d9cb25e57ea1d55626742d1f9149

                                                SHA512

                                                1992c8e1f7e37a58bbf486f76d1320da8e1757d6296c8a7631f35ba2e376de215c65000612364c91508aa3ddf72841f6b823fa60a2b29415a07c74c2e830212b

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exe
                                                Filesize

                                                539KB

                                                MD5

                                                41a3c2a1777527a41ddd747072ee3efd

                                                SHA1

                                                44b70207d0883ec1848c3c65c57d8c14fd70e2c3

                                                SHA256

                                                8592bae7b6806e5b30a80892004a7b79f645a16c0f1b85b4b8df809bdb6cf365

                                                SHA512

                                                14df28cc7769cf78b24ab331bd63da896131a2f0fbb29b10199016aef935d376493e937874eb94faf52b06a98e1678a5cf2c2d0d442c31297a9c0996205ed869

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsAtom.dll
                                                Filesize

                                                156KB

                                                MD5

                                                9deba7281d8eceefd760874434bd4e91

                                                SHA1

                                                553e6c86efdda04beacee98bcee48a0b0dba6e75

                                                SHA256

                                                02a42d2403f0a61c3a52138c407b41883fa27d9128ecc885cf1d35e4edd6d6b9

                                                SHA512

                                                7a82fbac4ade3a9a29cb877cc716bc8f51b821b533f31f5e0979f0e9aca365b0353e93cc5352a21fbd29df8fc0f9a2025351453032942d580b532ab16acaa306

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsJSON.dll
                                                Filesize

                                                218KB

                                                MD5

                                                f8978087767d0006680c2ec43bda6f34

                                                SHA1

                                                755f1357795cb833f0f271c7c87109e719aa4f32

                                                SHA256

                                                221bb12d3f9b2aa40ee21d2d141a8d12e893a8eabc97a04d159aa46aecfa5d3e

                                                SHA512

                                                54f48c6f94659c88d947a366691fbaef3258ed9d63858e64ae007c6f8782f90ede5c9ab423328062c746bc4ba1e8d30887c97015a5e3e52a432a9caa02bb6955

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsLogger.dll
                                                Filesize

                                                177KB

                                                MD5

                                                83ad54079827e94479963ba4465a85d7

                                                SHA1

                                                d33efd0f5e59d1ef30c59d74772b4c43162dc6b7

                                                SHA256

                                                ec0a8c14a12fdf8d637408f55e6346da1c64efdd00cc8921f423b1a2c63d3312

                                                SHA512

                                                c294fb8ac2a90c6125f8674ca06593b73b884523737692af3ccaa920851fc283a43c9e2dc928884f97b08fc8974919ec603d1afb5c178acd0c2ebd6746a737e1

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsStubLib.dll
                                                Filesize

                                                248KB

                                                MD5

                                                a16602aad0a611d228af718448ed7cbd

                                                SHA1

                                                ddd9b80306860ae0b126d3e834828091c3720ac5

                                                SHA256

                                                a1f4ba5bb347045d36dcaac3a917236b924c0341c7278f261109bf137dcef95a

                                                SHA512

                                                305a3790a231b4c93b8b4e189e18cb6a06d20b424fd6237d32183c91e2a5c1e863096f4d1b30b73ff15c4c60af269c4faaadaf42687101b1b219795abc70f511

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\586a467b\3eb28c58_1c8fda01\rsLogger.DLL
                                                Filesize

                                                179KB

                                                MD5

                                                b279550f2557481ae48e257f0964ae29

                                                SHA1

                                                53bef04258321ca30a6d36a7d3523032e3087a3e

                                                SHA256

                                                13fe4a20114cdf8cd3bba42eeaabe8d49be0b03eec423f530c890463014ccaaa

                                                SHA512

                                                f603cbac1f55ad4de7a561a1d9c27e33e36de00f09a18ff956456afec958f3e777277db74f0b25c6467e765d39175aa4fcdd38e87a3d666b608d983acb9321cd

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\af42aa25\3eb28c58_1c8fda01\rsServiceController.DLL
                                                Filesize

                                                174KB

                                                MD5

                                                d0779008ba2dc5aba2393f95435a6e8d

                                                SHA1

                                                14ccd0d7b6128cf11c58f15918b2598c5fefe503

                                                SHA256

                                                e74a387b85ee4346b983630b571d241749224d51b81b607f88f6f77559f9cb05

                                                SHA512

                                                931edd82977e9a58c6669287b38c1b782736574db88dad0cc6e0d722c6e810822b3cbe5689647a8a6f2b3692d0c348eb063e17abfa5580a66b17552c30176426

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\eb4b50b0\46ed8758_1c8fda01\rsAtom.DLL
                                                Filesize

                                                158KB

                                                MD5

                                                875e26eb233dbf556ddb71f1c4d89bb6

                                                SHA1

                                                62b5816d65db3de8b8b253a37412c02e9f46b0f9

                                                SHA256

                                                e62ac7163d7d48504992cd284630c8f94115c3718d60340ad9bb7ee5dd115b35

                                                SHA512

                                                54fdc659157667df4272ac11048f239101cb12b39b2bf049ef552b4e0ce3998ff627bf763e75b5c69cc0d4ef116bfe9043c9a22f2d923dbedddacf397e621035

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\tmp\C15KKNID\rsJSON.DLL
                                                Filesize

                                                219KB

                                                MD5

                                                d43100225a3f78936ca012047a215559

                                                SHA1

                                                c68013c5f929fe098a57870553c3204fd9617904

                                                SHA256

                                                cc5ea6c9c8a14c48a20715b6b3631cbf42f73b41b87d1fbb0462738ff80dc01a

                                                SHA512

                                                9633992a07ea61a9d7acd0723dbd715dbd384e01e268131df0534bcdfcd92f12e3decc76aa870ea4786314c0b939b41c5f9e591a18c4d9d0bad069f30acd833e

                                              • C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\uninstall.ico
                                                Filesize

                                                170KB

                                                MD5

                                                af1c23b1e641e56b3de26f5f643eb7d9

                                                SHA1

                                                6c23deb9b7b0c930533fdbeea0863173d99cf323

                                                SHA256

                                                0d3a05e1b06403f2130a6e827b1982d2af0495cdd42deb180ca0ce4f20db5058

                                                SHA512

                                                0c503ec7e83a5bfd59ec8ccc80f6c54412263afd24835b8b4272a79c440a0c106875b5c3b9a521a937f0615eb4f112d1d6826948ad5fb6fd173c5c51cb7168f4

                                              • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat
                                                Filesize

                                                40B

                                                MD5

                                                15adc867c47382c18ecb9fb24834d841

                                                SHA1

                                                bf9233eaff089c3459683821e5fce0e467f3b3fe

                                                SHA256

                                                5608f87a4bcb845bf9359b311ec23053cacc708d29022ef769c42a1b8bf6dfdc

                                                SHA512

                                                f36d0b6e71666ec30a54fb64c9be47257f98f29b3b30891a5050d3dabe48cef71210044b1253adb804af52a5af2bb9eab04fa83267f9b37d37ea48a8ac205113

                                              • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_0
                                                Filesize

                                                8KB

                                                MD5

                                                cf89d16bb9107c631daabf0c0ee58efb

                                                SHA1

                                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                SHA256

                                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                SHA512

                                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                              • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_1
                                                Filesize

                                                264KB

                                                MD5

                                                d0d388f3865d0523e451d6ba0be34cc4

                                                SHA1

                                                8571c6a52aacc2747c048e3419e5657b74612995

                                                SHA256

                                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                SHA512

                                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                              • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_2
                                                Filesize

                                                8KB

                                                MD5

                                                0962291d6d367570bee5454721c17e11

                                                SHA1

                                                59d10a893ef321a706a9255176761366115bedcb

                                                SHA256

                                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                SHA512

                                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                              • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_3
                                                Filesize

                                                8KB

                                                MD5

                                                41876349cb12d6db992f1309f22df3f0

                                                SHA1

                                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                SHA256

                                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                SHA512

                                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                              • C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Local Storage\leveldb\CURRENT
                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer.exe
                                                Filesize

                                                1.9MB

                                                MD5

                                                a76e8ba0ea3ec64953bac23b287e4c0b

                                                SHA1

                                                fab26482564a690d5489ee1b8f6bd7fd4d62f81c

                                                SHA256

                                                8b5ab9174204a2c588573482d4c10711a4042497307cd053039057d2ddbdfb8c

                                                SHA512

                                                9a4010772b05cd55580e0a7c5fd5c54a135a6cd96f0e0cadaa05f67a2d851330c78981826ce26cb262605f40acddeb4e1642664958870978a3ae0dd5fe7209b7

                                              • C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe
                                                Filesize

                                                1.7MB

                                                MD5

                                                d95fcbfcad9e6f4a360231e4d5f65145

                                                SHA1

                                                5805d2b22cf4076d9623972087ba9c13be3d9009

                                                SHA256

                                                35e63cfcf5dea8d660b0c079ab5595a63b9b2b54fe30fa028f16f7c1a97b356f

                                                SHA512

                                                00bbe867f73ad6612486cfb6e280b7ff31c7c3d1bc4f9e812969d330b52b89e6de4fa099c5c195e52a59c63aa1d242eb61c9e23d5b8d685cfa82414f56b9da7c

                                              • \??\pipe\crashpad_2544_NGXRLMCTPQQKVPWM
                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • \Users\Admin\AppData\Local\Temp\Opera_installer_2404151004293893116.dll
                                                Filesize

                                                4.6MB

                                                MD5

                                                2a3159d6fef1100348d64bf9c72d15ee

                                                SHA1

                                                52a08f06f6baaa12163b92f3c6509e6f1e003130

                                                SHA256

                                                668bf8a7f3e53953dd6789fc6146a205c6c7330832c5d20b439eedb7c52ed303

                                                SHA512

                                                251c0d3cdd0597b962d4e32cf588a82454c42067cbe5e35b41b0548eea742ea25815e5d6830b63c1992b5730a4e6d7c005fb0019aa4c389549b06fff9a74b38c

                                              • \Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\ArchiveUtilityx64.dll
                                                Filesize

                                                150KB

                                                MD5

                                                3351152f6ee87e97682a0a7c459ef614

                                                SHA1

                                                5312f9da67fcfd573dc5e45f6a7cc35fa463af89

                                                SHA256

                                                6e2673687ba029074657f0d1c4410691ee013eff2223d0c7695dfe4f70c62f1c

                                                SHA512

                                                2b7ecb22746bf907ae4da891e170226da4f180ade27e41a16e1ef9e11f39e5e35b9eac3fcfff520dbb8a8888a1dbd1ca2459ab58ce8dc44a424c5de7b8132de6

                                              • \Users\Admin\AppData\Local\Temp\nso4DFD.tmp\System.dll
                                                Filesize

                                                12KB

                                                MD5

                                                cff85c549d536f651d4fb8387f1976f2

                                                SHA1

                                                d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

                                                SHA256

                                                8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

                                                SHA512

                                                531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

                                              • memory/992-104-0x0000000000400000-0x00000000004D8000-memory.dmp
                                                Filesize

                                                864KB

                                              • memory/992-65-0x0000000000400000-0x00000000004D8000-memory.dmp
                                                Filesize

                                                864KB

                                              • memory/992-62-0x0000000000400000-0x00000000004D8000-memory.dmp
                                                Filesize

                                                864KB

                                              • memory/2316-1346-0x000002B305DE0000-0x000002B305DE1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2316-1343-0x000002B305DD0000-0x000002B305DD1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2316-1345-0x000002B305E10000-0x000002B305E36000-memory.dmp
                                                Filesize

                                                152KB

                                              • memory/2316-1342-0x000002B31FE50000-0x000002B31FEA4000-memory.dmp
                                                Filesize

                                                336KB

                                              • memory/2316-1337-0x000002B3059A0000-0x000002B3059F4000-memory.dmp
                                                Filesize

                                                336KB

                                              • memory/2316-1340-0x000002B305D80000-0x000002B305D81000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2316-1339-0x000002B31FE40000-0x000002B31FE50000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/2316-1338-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/2656-1322-0x000002B222F70000-0x000002B2232D4000-memory.dmp
                                                Filesize

                                                3.4MB

                                              • memory/2656-1321-0x000002B222A40000-0x000002B222F6A000-memory.dmp
                                                Filesize

                                                5.2MB

                                              • memory/2656-1320-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/2656-1323-0x000002B222620000-0x000002B222630000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/2656-1324-0x000002B2097A0000-0x000002B2097A1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/2656-1325-0x000002B2227B0000-0x000002B22292A000-memory.dmp
                                                Filesize

                                                1.5MB

                                              • memory/2656-1326-0x000002B209BA0000-0x000002B209BBA000-memory.dmp
                                                Filesize

                                                104KB

                                              • memory/2656-1327-0x000002B209BF0000-0x000002B209C12000-memory.dmp
                                                Filesize

                                                136KB

                                              • memory/3064-460-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/3064-1200-0x000001ED1DDD0000-0x000001ED1DDE0000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3064-146-0x000001ED1DDD0000-0x000001ED1DDE0000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3064-145-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/3064-144-0x000001ED38370000-0x000001ED38896000-memory.dmp
                                                Filesize

                                                5.1MB

                                              • memory/3064-143-0x000001ED1D9C0000-0x000001ED1D9C8000-memory.dmp
                                                Filesize

                                                32KB

                                              • memory/3432-741-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-298-0x000001609C560000-0x000001609C561000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-747-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-739-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-737-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-735-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-731-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-729-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-727-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-725-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-751-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-1203-0x00000160B6D60000-0x00000160B6D9A000-memory.dmp
                                                Filesize

                                                232KB

                                              • memory/3432-1201-0x00000160B6890000-0x00000160B6891000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-763-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-1212-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/3432-1214-0x00000160B68C0000-0x00000160B68C1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-1216-0x00000160B6D20000-0x00000160B6D50000-memory.dmp
                                                Filesize

                                                192KB

                                              • memory/3432-753-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-1222-0x000001609C510000-0x000001609C520000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3432-1223-0x00000160B68A0000-0x00000160B68A1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-1228-0x00000160B6D20000-0x00000160B6D4A000-memory.dmp
                                                Filesize

                                                168KB

                                              • memory/3432-755-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-1234-0x00000160B68B0000-0x00000160B68B1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-1236-0x000001609C510000-0x000001609C520000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3432-757-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-761-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-1241-0x00000160B6E50000-0x00000160B6E7E000-memory.dmp
                                                Filesize

                                                184KB

                                              • memory/3432-1247-0x00000160B6910000-0x00000160B6911000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-759-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-743-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-745-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-283-0x000001609C110000-0x000001609C198000-memory.dmp
                                                Filesize

                                                544KB

                                              • memory/3432-287-0x000001609C590000-0x000001609C5D0000-memory.dmp
                                                Filesize

                                                256KB

                                              • memory/3432-288-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/3432-290-0x000001609C5D0000-0x000001609C600000-memory.dmp
                                                Filesize

                                                192KB

                                              • memory/3432-297-0x000001609C510000-0x000001609C520000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/3432-733-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-749-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-300-0x000001609DFC0000-0x000001609DFFA000-memory.dmp
                                                Filesize

                                                232KB

                                              • memory/3432-714-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-301-0x000001609C520000-0x000001609C521000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-715-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-723-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-717-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-721-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-719-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmp
                                                Filesize

                                                312KB

                                              • memory/3432-713-0x00000160B6CD0000-0x00000160B6D20000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/3432-307-0x000001609DF80000-0x000001609DFAA000-memory.dmp
                                                Filesize

                                                168KB

                                              • memory/3432-308-0x000001609C530000-0x000001609C531000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/3432-316-0x00000160B6940000-0x00000160B6998000-memory.dmp
                                                Filesize

                                                352KB

                                              • memory/4464-121-0x0000000000400000-0x000000000071C000-memory.dmp
                                                Filesize

                                                3.1MB

                                              • memory/4464-110-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-284-0x0000000000400000-0x000000000071C000-memory.dmp
                                                Filesize

                                                3.1MB

                                              • memory/4464-69-0x0000000000950000-0x0000000000951000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4464-203-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-93-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-94-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-128-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-105-0x0000000000400000-0x000000000071C000-memory.dmp
                                                Filesize

                                                3.1MB

                                              • memory/4464-109-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-285-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-347-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-442-0x0000000000400000-0x000000000071C000-memory.dmp
                                                Filesize

                                                3.1MB

                                              • memory/4464-348-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-122-0x0000000000950000-0x0000000000951000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4464-127-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/4464-126-0x00000000049F0000-0x0000000004B30000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/5008-1282-0x00000205C22B0000-0x00000205C22B1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5008-1297-0x00000205DC330000-0x00000205DC36E000-memory.dmp
                                                Filesize

                                                248KB

                                              • memory/5008-1278-0x00000205C1EF0000-0x00000205C1F1E000-memory.dmp
                                                Filesize

                                                184KB

                                              • memory/5008-1279-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB

                                              • memory/5008-1281-0x00000205DC320000-0x00000205DC330000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/5008-1283-0x00000205C1EF0000-0x00000205C1F1E000-memory.dmp
                                                Filesize

                                                184KB

                                              • memory/5008-1296-0x00000205C3BC0000-0x00000205C3BD2000-memory.dmp
                                                Filesize

                                                72KB

                                              • memory/5008-1317-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmp
                                                Filesize

                                                9.9MB