Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2024 01:01

General

  • Target

    Delta V3.61 b_77978399.exe

  • Size

    5.7MB

  • MD5

    0aa6945aee17c3eae75f48e715ee5eb7

  • SHA1

    b84977d612d1760f7a682e96dba9f7160cdaf72d

  • SHA256

    0b8be7d62ba830a3a53686afb8af57d1b2301d76c8b06759bf4b148d1e2ab6cc

  • SHA512

    8cdb467c92fefe0add78824acc496bf1c70c1eada04a801076073df92497660551c7b3c56a7d97a5ba74eb75879e5323f4b33ee51f94cab8c8afe6515056f5e5

  • SSDEEP

    98304:Vj8ab67Ht6RL8xpH4Tv7wPV6osBsBpPj7cZ+KCojTeEw98rqNkUi+bD:Vj8aatLPV6oPrke8rqN7

Malware Config

Signatures

  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Password Policy Discovery 1 TTPs

    Attempt to access detailed information about the password policy used within an enterprise network.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 25 IoCs
  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 61 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 40 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 17 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
    1⤵
    • Loads dropped DLL
    PID:1208
  • C:\Users\Admin\AppData\Local\Temp\Delta V3.61 b_77978399.exe
    "C:\Users\Admin\AppData\Local\Temp\Delta V3.61 b_77978399.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\opera.exe
      C:\Users\Admin\AppData\Local\opera.exe --silent --allusers=0
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe
        C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe --silent --allusers=0 --server-tracking-blob=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
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe
          C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.94 --initial-client-data=0x32c,0x330,0x334,0x300,0x338,0x70fb1a74,0x70fb1a80,0x70fb1a8c
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1204
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:932
        • C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=2208 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20241013010306" --session-guid=230c31f5-86ed-46ec-a13c-8b08991c98e0 --server-tracking-blob="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 " --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=1C06000000000000
          4⤵
          • Enumerates connected drives
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe
            C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.94 --initial-client-data=0x31c,0x320,0x324,0x2f8,0x328,0x703f1a74,0x703f1a80,0x703f1a8c
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:3616
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\Assistant_114.0.5282.21_Setup.exe_sfx.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4904
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\assistant_installer.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\assistant_installer.exe" --version
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:720
          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\assistant_installer.exe
            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=114.0.5282.21 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x4c17a0,0x4c17ac,0x4c17b8
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:5060
    • C:\Users\Admin\AppData\Local\Temp\PremierOpinion\ContentI3.exe
      "C:\Users\Admin\AppData\Local\Temp\PremierOpinion\ContentI3.exe" -c:1538 -t:InstallUnion
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files (x86)\PremierOpinion\pmropn.exe
        C:\Program Files (x86)\PremierOpinion\pmropn.exe -install -uninst:PremierOpinion -t:InstallUnion -bid:9zkM1im3A1ibL7qUu$POGG -o:0
        3⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2968
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\link.txt
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:4460
  • C:\Program Files (x86)\PremierOpinion\pmservice.exe
    "C:\Program Files (x86)\PremierOpinion\pmservice.exe" /service
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\system32\rundll32.exe
      C:\Windows\system32\rundll32.exe C:\Windows\system32\pmls64.dll,UpdateProcess 1208
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4632
    • C:\Windows\SysWOW64\reg.exe
      reg.exe EXPORT "HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{eeb86aef-4a5d-4b75-9d74-f16d438fc286}" C:\PROGRA~2\PREMIE~1\RData.reg /y
      2⤵
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:876
    • \??\c:\program files (x86)\premieropinion\pmropn.exe
      "c:\program files (x86)\premieropinion\pmropn.exe" -boot
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -s
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1144
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -s
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4836
    • C:\Windows\SysWOW64\cmd.exe
      /C C:\PROGRA~2\PREMIE~1\pmropn32.exe 1644
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\PROGRA~2\PREMIE~1\pmropn32.exe
        C:\PROGRA~2\PREMIE~1\pmropn32.exe 1644
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3832
    • C:\Windows\SysWOW64\cmd.exe
      /C C:\PROGRA~2\PREMIE~1\pmropn64.exe 1644
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\PROGRA~2\PREMIE~1\pmropn64.exe
        C:\PROGRA~2\PREMIE~1\pmropn64.exe 1644
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4632
    • \??\c:\program files (x86)\premieropinion\pmropn.exe
      "c:\program files (x86)\premieropinion\pmropn.exe" -updateapps
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=1527c705-839a-4832-9118-54d4bd6a0c89_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4380
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=c5e2524a-ea46-4f67-841f-6a9465d9d515_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2968
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=e2a4f912-2574-4a75-9bb0-0d023378592b_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4352
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=f46d4000-fd22-4db4-ac8e-4e1ddde828fe_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:448
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.aad.brokerplugin_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2972
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.accountscontrol_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4276
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.asynctextservice_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3236
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.bioenrollment_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3092
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.creddialoghost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4648
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.ecapp_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:184
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.lockapp_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2916
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.microsoftedge_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2800
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.microsoftedgedevtoolsclient_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:644
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.vclibs.140.00_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:208
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.win32webviewhost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4436
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.apprep.chxapp_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3248
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.assignedaccesslockapp_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1220
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.callingshellapp_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2108
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.capturepicker_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3440
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.cloudexperiencehost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4564
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.contentdeliverymanager_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3448
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.narratorquickstart_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3372
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.oobenetworkcaptiveportal_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:768
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.oobenetworkconnectionflow_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4724
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.parentalcontrols_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4868
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.peopleexperiencehost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:452
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.pinningconfirmationdialog_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:756
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.search_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2800
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.secureassessmentbrowser_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:532
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.shellexperiencehost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:432
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3856
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.xgpuejectdialog_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2600
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.xboxgamecallableui_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3964
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoftwindows.client.cbs_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1220
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=microsoftwindows.undockeddevkit_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2224
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=ncsiuwpapp_8wekyb3d8bbwe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:932
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=windows.cbspreview_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3564
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=windows.printdialog_cw5n1h2txyewy
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1124
      • C:\Windows\SysWOW64\CheckNetIsolation.exe
        CheckNetIsolation.exe LoopbackExempt -a -n=windows_ie_ac_001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2972
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
    • Loads dropped DLL
    PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\PREMIE~1\RData.reg

    Filesize

    3KB

    MD5

    8637475a5744c382956aa1ce5ff945ea

    SHA1

    0ae087d07b96e6c92445686b6c4a15e40e754843

    SHA256

    71eac10c166973feeb484ffe2d4abde4a2c5392a4b177f49b72243bfe4229a5c

    SHA512

    325080cbca35a0df82ae3cac9982bc8ed4d12251e1409c3fdec4754824a258a83ebc7e2b6e6eb69639aa8cd4ca2439c2296c1655430ee52b4ac46115ab5109bb

  • C:\PROGRA~2\PREMIE~1\snt.dat

    Filesize

    3.1MB

    MD5

    5cc1063bcc4abe1dc4ebe2d866c8dbcc

    SHA1

    668cda5d04972e244ae7a8e6a3f5110b690f7c64

    SHA256

    b4e217617c514cfa1e03a87d6a78c440cb22cc06ae5175b6b076b79f29382fa1

    SHA512

    e92b217f9fa8dcdf73b634d38291c2f2b62d933748d0a1350c2712d956558b53143bd5640c7290ac1b1c54aca045dc7985ced79c72b1c7657178289865416224

  • C:\Program Files (x86)\PremierOpinion\cacert.pem

    Filesize

    3KB

    MD5

    77eb3ade4c5b0db67c6e8a26f131073c

    SHA1

    ad9e8c00174cc2e707f59df671f89a9d7fc2ffc7

    SHA256

    9f19e7a7139cca8373b516ab1ae49c644aa1c8048e8c7aa5784774a081dcbb87

    SHA512

    20eb7d34c80bb8d8a415bcdccf8e46cb36396c095ed1468b69c0cb91da915e3a14c7fd55247f68e64ff71cf8d336cc286c3662710ca6281840fdc2f1eb7ac6a1

  • C:\Program Files (x86)\PremierOpinion\pmls.dll

    Filesize

    885KB

    MD5

    50a0c6c01cdc5d2690ccd1f1541f6670

    SHA1

    c5e017a468efb70eabb1f861784edac62acb0e17

    SHA256

    f9a853830949bb22d6f4d128d71a0ab923d9b5549c0dc8785c7de7d1a4eabf99

    SHA512

    028d5a56c581d3751628c7503e83aa52c332678495943c3648049ae0b26a7190e98395ad205cf60896140d1a802c14a346a2d1553e7b53090c3f5beefd66e9b1

  • C:\Program Files (x86)\PremierOpinion\pmls64.dll

    Filesize

    1.1MB

    MD5

    aa56cb7fd83150c3a75cd6a0de97eb78

    SHA1

    34415c5c8e57cfe9a7b4a498eacfe1403f3191ec

    SHA256

    034e066829d28bbc81604250f6df721a35ab1c0898ab82bef6305ffada240765

    SHA512

    765f12e5e060db934d0f4e8159bb9bd10cdbe797d79488a0dc88215a73e49101e279ca69e10c1775a5e161bb4dd02585724c7c87bbefdcdd047adb4277804fa2

  • C:\Program Files (x86)\PremierOpinion\pmropn.exe

    Filesize

    6.7MB

    MD5

    f27f98c1a877f9ca6f06c23bed4014ca

    SHA1

    25a231319659c30d6f86a5c9cdd1747d7c471542

    SHA256

    1ed47933c9f33c4860ecc0bf1ba7525212aa00054037a9a51a8d8f5ce3b821bd

    SHA512

    f054a618d2f8e7a829c26548312b436e21058ee1ff64b40e7c19be2bde037003c21332af3c60e2fd92675af80526ef6faf84b8c1d7a095bb2c4d0b799e66599c

  • C:\Program Files (x86)\PremierOpinion\pmropn32.exe

    Filesize

    245KB

    MD5

    6e4d6b68e9565c4cc7791b00c2094ff9

    SHA1

    965a00a5a8bb05b35fbaa357951779ea3b71e392

    SHA256

    65d6f18e1b366aff5343c3f6628041329e7c1375d18ba57076b19bf5f48bc483

    SHA512

    0cb1396822c7350057cfc7280e1c67ccf1e1a2206347a10025e285f00e9364563685ba5282775960a9329511fd321a631222c87ae7ca8106eca00fb78722b20f

  • C:\Program Files (x86)\PremierOpinion\pmropn64.exe

    Filesize

    304KB

    MD5

    ae5bbcc69b05359d0d5cc72ca6a1262e

    SHA1

    6843bd883d50216be44065411a983a4bcccdcc91

    SHA256

    12bfd1007634138b22c56ead24db02a1fe3a4d4b7fe04d30cd07a0ff5d4c8425

    SHA512

    6417aaeb4ccd86504bc1f83e32c91a60920e98fff833c02fdbef974819a3288cab0c96d6b114ceed4432c305d49120cacbc7e0da69c911f4035aadfbec7a91de

  • C:\Users\Admin\AppData\Local\D3DSCache\3231ae299a0af0b2\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

    Filesize

    4B

    MD5

    f49655f856acb8884cc0ace29216f511

    SHA1

    cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

    SHA256

    7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

    SHA512

    599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\additional_file0.tmp

    Filesize

    2.7MB

    MD5

    be22df47dd4205f088dc18c1f4a308d3

    SHA1

    72acfd7d2461817450aabf2cf42874ab6019a1f7

    SHA256

    0eef85bccb5965037a5708216b3550792e46efdfdb99ac2396967d3de7a5e0c8

    SHA512

    833fc291aacecd3b2187a8cbd8e5be5b4d8884d86bd869d5e5019d727b94035a46bb56d7e7734403e088c2617506553a71a7184010447d1300d81667b99310c7

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\assistant_installer.exe

    Filesize

    2.0MB

    MD5

    3b103a9ba068fb4f932d272d19f5619f

    SHA1

    8270adf6a18d0101ce54afb77179d55a78a35fc7

    SHA256

    7e9f5f137372bf9e13383dc06c71139d92a4a7efcb5c64c570311999ecafab15

    SHA512

    83011d2315dfdd8838d62b66f576259882033e28e58ffb1931f97bb0a105cce5f03a4ca6c1de88611876d038f7e2ca7be626d4e0fb689d1ed8c99c6ce9adda4e

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\dbgcore.DLL

    Filesize

    166KB

    MD5

    612a3bebcf72256296103e034ace0236

    SHA1

    4e722e00e3294194224ae348477e3898c01b47b3

    SHA256

    3e20d38b7f1ab5dcbb1057f06f4dabf64e57b71d12a7335b4c5601b5b4a6047c

    SHA512

    dde0aabbe0905408c8df74fb51232b322e233dc43fc34f4ddac9a5e626359d7e4948d41f3fcbb95f0a635cbd229953757ba456a095b2b3523bb7a851663e6302

  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202410130103061\assistant\dbghelp.dll

    Filesize

    1.7MB

    MD5

    3f68b6ab3dcfd45911952ed4f5d75197

    SHA1

    c24c63d36a26f2320ae1c70b282769fae1e18b48

    SHA256

    e2f7ff92d8b959239e535b1824eac0bcf21b3134418a7b0411fa0c92ab6259e4

    SHA512

    5e6e031c5b802f667dc846f5dddd3c3ff5ad810b6274633bf519aa07d6a4eb7cd1c810b04f9fd552e0f6c7bb7285db0d3dc64b7a5690899583ae30bdc4e3c09f

  • C:\Users\Admin\AppData\Local\Temp\7zS80F88408\setup.exe

    Filesize

    5.3MB

    MD5

    d2b32d2ca95b09c440db5f37788a3829

    SHA1

    d0f5f06b9050ee2cc9202e6eae18349ab1257d70

    SHA256

    6cab004538645353524008c307f897f76a1b46282ea6761cc88fdd4b6fe3e9ca

    SHA512

    cc091d48ff9abf5add640bfdf99148b466cfded3cafc8451f87cf3723fd4b7f096e4b518216fbf7482f34167dc8deea5de251fe369bccd28ce2bf56b09163a86

  • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2410130103047342208.dll

    Filesize

    4.8MB

    MD5

    a0a086eadb30b33d556ace427e6fe3b5

    SHA1

    ccd76ed307469d0e2ec59a57f4b9ef5f6db42123

    SHA256

    99ad2bef393791036eb600f35cd5ba5c7d9cdb28676ceb5fb6fbb748515e2f16

    SHA512

    f2208b5ad4180d7bfb1b6eab3f18f52692505d5fc84ef34118e16659421a099f11fad1ea49233951057bbdfcf173c13d9927fb2ea984629b8fe60cd91c8c14a6

  • C:\Users\Admin\AppData\Local\Temp\PremierOpinion\ContentI3.exe

    Filesize

    3.8MB

    MD5

    bf6eed6cdc17a0130189a33a55ef5209

    SHA1

    e337f5a0931f69c464f162385f1330b4d27b372f

    SHA256

    ef2734657b11113a433abb7ebac962e2bf6bf685f05c5f672997f01875430168

    SHA512

    90d23fd84007343e85f9fc003cf826b112fd930216a24d8c1488468443ae2a4b0c3cc2426b91c81a8228e125050e922fce05672e010e65247709fc4a7b856f1d

  • C:\Users\Admin\AppData\Local\Temp\~os23CB.tmp\pmph.dll

    Filesize

    807KB

    MD5

    9d96ccb0d5ab5541b61d5c138d91796f

    SHA1

    cf3ee3e66c8f9c23e3efd29978215461347e650d

    SHA256

    379a1f1f02c8cb704f248c2f1ff79c8986f73c350a3bf6d9bbc93aeacd286e36

    SHA512

    69ca7d96896d872eefa63f0c0bd9613526a914e99c4cf12b5d221315277aa64894d99d0f5ce9c5e0ef640d61c9202cd3d51ddb2ab4c55f8fdf60d24a8c1ff6ac

  • C:\Users\Admin\AppData\Local\Temp\~os23CB.tmp\pmservice.exe

    Filesize

    4.2MB

    MD5

    4ef95918e313c7ca01084629416fc714

    SHA1

    5bdaba6920d3f4d1f8ea47ce693276530b5f2a9c

    SHA256

    303707068aab06ab0341178558c28ce1670d10f16c39522859c4f21097a87ee9

    SHA512

    75861731e9ec1a43741b2b84f60677e9fdf26d5db8d6e4e91297f826fc2c357272c18cede7f64c42798f5459900b33d693ababe4e1140e4cfc54ef7a04af633a

  • C:\Users\Admin\AppData\Local\link.txt

    Filesize

    57B

    MD5

    ec0997dc529c9ecf7825772b7ee2d0e9

    SHA1

    10d3891a3c3a2eb40e951fb96e8b0f0865b1ed49

    SHA256

    ccbc2a3c61e15e64256881f6d505f0e0fecf97d72fa0327a157ab2fa10f79f56

    SHA512

    d0f6197af91abc0d723dd889a00cba48973098709d4b80b24155dcb2fb5523461f816ec97accf873a679a467d818074c2a1d07eb49b94b1f0670d7307724eb7b

  • C:\Users\Admin\AppData\Local\opera.exe

    Filesize

    2.1MB

    MD5

    5c271d4e34eaa03d7d9405f8b8026b70

    SHA1

    c73837452889bb62b246792cb5fcbae7eeed7311

    SHA256

    2d8681f0e346f3bf9734565b629159adb6fe97d8c79a5e83cc3f45fb1e2d8f48

    SHA512

    c9cf9c39005df5ae6ea340d5810943277bc1c92e9cc30912f5ef3308cabb1fec3965e9296b49c25dd7e14241cbf667b8f984153b54ed0fa8fe8f55fd2c9d3ece

  • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

    Filesize

    40B

    MD5

    665c512cedb375ce0046f47aed47e746

    SHA1

    c386689a2de4b5f00b801452a8e3d54bc49c3367

    SHA256

    59ada1f4ff168ebff58f2f8de9d6b0d583c81f2afa314a114bcb6fcb36026b55

    SHA512

    fcc182b691fb8601d434ac6b6cca0a0df2ccf9661647279b81d763efdc95813fd0e8eac2a15e8506b3172c101096a34a360a05b5ea5e9ee04dd297277156a8a3

  • memory/1644-325-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-327-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-396-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-399-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-398-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-401-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-400-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-397-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-390-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-392-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-391-0x0000000009F90000-0x0000000009F91000-memory.dmp

    Filesize

    4KB

  • memory/1644-328-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-329-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-324-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-326-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-320-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-319-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/1644-318-0x0000000005F40000-0x0000000005F41000-memory.dmp

    Filesize

    4KB

  • memory/2968-229-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-234-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-239-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-230-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-238-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-237-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-236-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-240-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-228-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/2968-235-0x00000000037B0000-0x00000000037B1000-memory.dmp

    Filesize

    4KB

  • memory/4632-282-0x00007FFBA5700000-0x00007FFBA5731000-memory.dmp

    Filesize

    196KB

  • memory/4632-272-0x00007FFBA7410000-0x00007FFBA747B000-memory.dmp

    Filesize

    428KB

  • memory/4632-271-0x00007FFBA5C90000-0x00007FFBA5F59000-memory.dmp

    Filesize

    2.8MB

  • memory/4632-270-0x00007FFBA6A90000-0x00007FFBA6B4E000-memory.dmp

    Filesize

    760KB

  • memory/4632-273-0x00007FFB9A260000-0x00007FFB9A730000-memory.dmp

    Filesize

    4.8MB

  • memory/4632-283-0x00007FFBA6140000-0x00007FFBA687F000-memory.dmp

    Filesize

    7.2MB

  • memory/4632-281-0x00007FFB9DAF0000-0x00007FFB9DBF8000-memory.dmp

    Filesize

    1.0MB

  • memory/4632-274-0x00007FFBA4EF0000-0x00007FFBA4F5A000-memory.dmp

    Filesize

    424KB