Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19/11/2024, 17:58

General

  • Target

    Atlantis Exploit_03896721.exe

  • Size

    5.7MB

  • MD5

    15d1c495ff66bf7cea8a6d14bfdf0a20

  • SHA1

    942814521fa406a225522f208ac67f90dbde0ae7

  • SHA256

    61c2c4a5d7c14f77ee88871ded4cc7f1e49dae3e4ef209504c66fedf4d22de42

  • SHA512

    063169f22108ac97a3ccb6f8e97380b1e48eef7a07b8fb20870b9bd5f03d7279d3fb10a69c09868beb4a1672ebe826198ae2d0ea81df4d29f9a288ea4f2b98d8

  • SSDEEP

    98304:+j8ab67Ht6RL8xpH4Tv7wPV6osBsBpPj7cZ+KCojTeEL78rqNkIi+bn:+j8aatLPV6oPrk38rqNj

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 59 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • NTFS ADS 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Atlantis Exploit_03896721.exe
    "C:\Users\Admin\AppData\Local\Temp\Atlantis Exploit_03896721.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Users\Admin\AppData\Local\OperaGX.exe
      C:\Users\Admin\AppData\Local\OperaGX.exe --silent --allusers=0
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3212
      • C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe
        C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe --silent --allusers=0 --server-tracking-blob=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
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe
          C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.202 --initial-client-data=0x330,0x334,0x338,0x30c,0x33c,0x718f8c5c,0x718f8c68,0x718f8c74
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:904
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\setup.exe" --version
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4856
        • C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --vought_browser=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera GX" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --server-tracking-data=server_tracking_data --initial-pid=3512 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_20241119175844" --session-guid=1ab6e6d5-9a45-4481-8dc5-346c13816ad1 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=F805000000000000
          4⤵
          • Enumerates connected drives
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe
            C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=114.0.5282.202 --initial-client-data=0x328,0x32c,0x33c,0x304,0x340,0x709b8c5c,0x709b8c68,0x709b8c74
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1564
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2968
        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\assistant_installer.exe
          "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\assistant_installer.exe" --version
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2712
          • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\assistant_installer.exe
            "C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktopGX --annotation=ver=73.0.3856.382 --initial-client-data=0x288,0x28c,0x290,0x264,0x294,0x854f48,0x854f58,0x854f64
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2304
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\link.txt
      2⤵
      • System Location Discovery: System Language Discovery
      • Opens file in notepad (likely ransom note)
      PID:4924
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0x80,0x108,0x7ff9a867cc40,0x7ff9a867cc4c,0x7ff9a867cc58
      2⤵
        PID:3400
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:2
        2⤵
          PID:2928
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1804,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:3
          2⤵
            PID:1400
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:8
            2⤵
              PID:4984
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:1
              2⤵
                PID:5104
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3156,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:1
                2⤵
                  PID:4780
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4380,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4456 /prefetch:1
                  2⤵
                    PID:4048
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4692,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:8
                    2⤵
                      PID:2904
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4868,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:8
                      2⤵
                        PID:2044
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4760,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:1
                        2⤵
                          PID:4680
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5196,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4824 /prefetch:1
                          2⤵
                            PID:2736
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5248,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5292 /prefetch:8
                            2⤵
                            • NTFS ADS
                            PID:3064
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5316,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:8
                            2⤵
                            • NTFS ADS
                            PID:4452
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4908,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5360 /prefetch:1
                            2⤵
                              PID:2464
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5340,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5112 /prefetch:1
                              2⤵
                                PID:4368
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3760,i,13896688895994286913,2514173190937027501,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:8
                                2⤵
                                • Modifies registry class
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:3648
                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                              1⤵
                                PID:4676
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                1⤵
                                  PID:2400

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                  Filesize

                                  1KB

                                  MD5

                                  67e486b2f148a3fca863728242b6273e

                                  SHA1

                                  452a84c183d7ea5b7c015b597e94af8eef66d44a

                                  SHA256

                                  facaf1c3a4bf232abce19a2d534e495b0d3adc7dbe3797d336249aa6f70adcfb

                                  SHA512

                                  d3a37da3bb10a9736dc03e8b2b49baceef5d73c026e2077b8ebc1b786f2c9b2f807e0aa13a5866cf3b3cafd2bc506242ef139c423eaffb050bbb87773e53881e

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

                                  Filesize

                                  436B

                                  MD5

                                  971c514f84bba0785f80aa1c23edfd79

                                  SHA1

                                  732acea710a87530c6b08ecdf32a110d254a54c8

                                  SHA256

                                  f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

                                  SHA512

                                  43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

                                  Filesize

                                  174B

                                  MD5

                                  555dbb418570922c66a6586991511dec

                                  SHA1

                                  d5259a65538f382bcc9db552b0486fc46d15344b

                                  SHA256

                                  7928c9abd5253ab11a59672d6c986ca1e284c1f19ece1b9b8e856f14689ddab1

                                  SHA512

                                  c829b7ed9a782cb16d635b82e71a59bef3cebfc18ef96a1e0badc0f2bfb20aa532ca3c470f2613d9aeb5e9fa649c18d1329db09f963df4217d831c13e096c1eb

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

                                  Filesize

                                  170B

                                  MD5

                                  d5c525e1e8bf52a7c5e210c7d0fef727

                                  SHA1

                                  b6c08bfdab3e9c612c719f34e39d7379d5351940

                                  SHA256

                                  44bc23138937b5c6a701425ea2a8ffc5110d27a3a4bbf3c440e3da4ae411e01a

                                  SHA512

                                  27dc9f17492bfd820252da70bf69ed3f617b70f28071731abb537f299acb0267772e038d44bc6001468d0c09d1a8582ef29b747d0a56f6507d867fe5c060b7bd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                  Filesize

                                  649B

                                  MD5

                                  0f9b9559576de4e0be5b70a49f6ac3d9

                                  SHA1

                                  0e33a2b4b22876955a548c13ab7e87d0754e97df

                                  SHA256

                                  2fdddf67399d7608a002f86422aec450b0678da313bddf27d046d1f53449d034

                                  SHA512

                                  b5b8ea6e77cba7b51952deec1501fe8147428af9c66bf2e856212d5fbc53aedd55527f41aee3b3b2ae7df6f5e67afc2fba52c1beb1a4fa934a5e1fe52a63c00f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  336B

                                  MD5

                                  86559c7190f96396be866458f7ac19e2

                                  SHA1

                                  78aecb653ec8039ae0febf31801aaa76f04578ea

                                  SHA256

                                  68c596d6b8ab89d91f7ca580bc558a23d920052d7ecb14b998e4a463699dfec1

                                  SHA512

                                  d3d5071172e09f00f59911c0289be846318d85ef085029e1a2a87fb3b23c2f482edd11b104039cc7e171a608e5e7c8adad4266a1b768f1a8ec7042e6e62069d2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  59f9f06dd3414e2b2a152574d1af870e

                                  SHA1

                                  a3e313449001153be97862cb7e686889e13a0b9a

                                  SHA256

                                  b1b380dd1550bb3f0c021e621f2dc61ba6871685408a2d8143c797856b41ec5d

                                  SHA512

                                  141d1f379368625b3e4ec450717453ac7d7b6b50ef054fd7048909e116d9cf75f1ce0d31b439c9791b5428b9cd98213381cffc886d07bc6cc6e5ecadde5539de

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  beec4e6e4b2b9862fb46406120afc3cb

                                  SHA1

                                  ac4f3fff4ace9501c8e39572a2cb4e539657d16b

                                  SHA256

                                  1c97f2ad95bd1d38956e2cd14615df63d5dda329b70debd086784dd54d597b79

                                  SHA512

                                  4102154b4ed1e803eb91474dbe77d8332683e6615a46044c708c45471ea1239723ee45a4cb295eb786ebae5c2f5caa6f2932a3847168f541cf72b4abbe9ecaa4

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  f0b46025f9ac8a6c1d858964ec6c1678

                                  SHA1

                                  3b92205d3ab1f126234b0b2435dcde9201e9d670

                                  SHA256

                                  3c7cc7215b40903780c4c176c8eaea4ab2e565a0426b6978a5d00acf300a0b75

                                  SHA512

                                  b86eb2946d3448cce2323e8b3d48e0ed58a96d58dbac1ad6666f54334d34d0849789a06fde7fa8f1544647ae1746b2da1ed0e68768aefef38803699ac1bcc68a

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  690B

                                  MD5

                                  d4bad3bcc7e23962d18c8c3de2c28b15

                                  SHA1

                                  731ba5b5179f878671686e2f0af714c3a635a1d9

                                  SHA256

                                  90e33bfb17a0866087f799b5cfc290af68ec39e5228425e1d440555c555f5afc

                                  SHA512

                                  890f823829bb6d8cdd244957b93078edd2c077f8ff159fbb89d768b3f69d935fd4f004b1beecd3352171b19d4d6e347de141beb92a6c7ef51c6089afc13df49d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  eca5001c83ab7659cb5e707706adc0a8

                                  SHA1

                                  2d16d2845cee4e462c14d4a14b5bebcbb2cb6596

                                  SHA256

                                  1557b2d456c433314a3f51dcd58b44a488a9d0cedd3df01a4733006f50206b0b

                                  SHA512

                                  e155ab4e215e98e104d407e0233e4fb7e801e6291289ebde66328e53cb7608e60d65464741672cf4eb119809aa4b44ac0edb21c26441ceb2613a779b32c14970

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  87dec9e696921a1681076d9305eab289

                                  SHA1

                                  cc4e32e041e86697ca1cb07e5e613c4ce9f39755

                                  SHA256

                                  9eca3ea6b9045bb778947f5420069846272816ee896af6458db9d42418da7855

                                  SHA512

                                  1b9c15d241a1b25004844fdd16ec1d94fe69e01326491a06e632e8d8883709446d4d1d57ec945235c8ae096f907acae4a2b138f3579878f385e3b39110b47856

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  a048558178b659db99a26b0bbc56dcce

                                  SHA1

                                  d7a35a495a06e1b9adc176284446544af2e7a8ed

                                  SHA256

                                  52e000d6321a0dd01973fef8a1a17cfed85551601101d7736100fb50a8f3354b

                                  SHA512

                                  56924aa326b6f5ef31ff4f0a59e6f9b0d9e9f5fab77d41351b972b644c6462d912450657424287f118a31ed971c42d2822d430fee129538981ce0890fd28dfdd

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  9665c3b9fb1c88809adfba41e45b03f7

                                  SHA1

                                  edf3a3861bf1c5ae213263c1ce878536aed238c1

                                  SHA256

                                  eb0df3a31fdecc45a39008d7396c757c822debcc746e5501e2738e6597679a9d

                                  SHA512

                                  af7bbcb4982729abce4852c2cdc29f66417bf834a43ad5c584d5f6c545945df1f7157809a9bce68e0e0bc18a1e3745286cdc0ba5bb12f8b9801a0e52e10f24f8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  9KB

                                  MD5

                                  be0bb2f88efdf409386c43bd0a4a2b51

                                  SHA1

                                  fb13a8d1ccdf3afcf168f1f75222154397be5b8a

                                  SHA256

                                  f0c4aebbefcf97138b0927dd008fa47d5fdfea50d6de4b0f9566649c31188cfa

                                  SHA512

                                  5b3462db2ca33947d3f8021a4522869ff18198d22877e4e394b0d7603c181e0e6e4fad2a62ee644a1779bf9b25dd28883a45b15e658cc5f852e2686e2cfad2ea

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  1da63e5385ff4f725ffbb41540aaf4f7

                                  SHA1

                                  d9d87a73afb86ea37206e69741d660824a20eb65

                                  SHA256

                                  f9901d7a26d2d4b2019ac1d89830b3e3d3c631d5faf4638b5b66429b3004769b

                                  SHA512

                                  c8a2745d76c890885dcbbfbb17388496477df9b246a7aae7310d9fe18e875fbe557bba33870315f2e60e6d387234e400f2604590b2aefced1bbfe88fe02ecb9f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  0a069bcb699ceafd0712127859bdef36

                                  SHA1

                                  8136514e55cc3065f3dc83ad2b43fe4463b73d04

                                  SHA256

                                  57ac783de6e2522501cd3d318222e346b36a1bfee7b38da8fbb08703104c151c

                                  SHA512

                                  7eca7a3cb7403504fe821ed856451274cdbc8debf8be6e620d1241def8006a8e6398171a248274e75408c81aab825fe809aa5a2f8b5ebc5a2d14094c4ec5e4d7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  10KB

                                  MD5

                                  d251b92476e037cab1f72223f8f288d7

                                  SHA1

                                  7fa7f054136dee653accf5cad9965f824d2fe177

                                  SHA256

                                  6a88eb0945a93b966db2bc883ae3e312d45dcd365bc311d829d9c6c2e991b4af

                                  SHA512

                                  08c666df10e907c586a44255d1f3a8874e0c59fe960e2e013c1f372f5426804692e0ff22d9426db9b0e86df6ba4533ded423d824291320d5e3221b90ed080437

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  15KB

                                  MD5

                                  6bf1ef53378bd56f9e5c1508a2b660d3

                                  SHA1

                                  d05ca7042abeca9529985b801f02b01570a1fc01

                                  SHA256

                                  52710bc4ae856a7777657e2a9a99ccd7f7e483b75497c33c1a9cc7d9c2dfb6c6

                                  SHA512

                                  9703b79fd2bc27307266b4605e4e33d21065a60fe6574683298ca8b25ac787a85e353ea93dc148d90b3a69c5e6b630170de12afb89e44577edc17a891bfd0d22

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\fcfd8a7c-a62e-43e3-8c70-87d3355671ce.tmp

                                  Filesize

                                  9KB

                                  MD5

                                  6afe84e62d335c357171389f62d3900d

                                  SHA1

                                  848cbc1883e6c6ab22df2a0d4f640ea37abf21c5

                                  SHA256

                                  1a9f4cf209ef74a2e5e89084b3afffb212017568d481cab3579eab34eaded77d

                                  SHA512

                                  a93b9269bdee6ec709f84f6dd387010136af0b62b7ae8522572571ed8232db95d78f2fd051ac17ad8f1ab40db35ab13c4fffefc2b93cd580665ada3f4baeec1d

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  233KB

                                  MD5

                                  fdb277e3e3b5ca79fd239a11e172fb43

                                  SHA1

                                  4ec775ee0ea72e75a41125d194d361213700ed26

                                  SHA256

                                  145a546d38b7e3cacedff199bcd13169a133c1093f9e0a3791d76c297a83eea2

                                  SHA512

                                  9e7256466d835e51144eaa0a81a57ea0d7705ce33d4e322de8d5e45d05948dc7edb02276407b166be2c1ca2d62ee7ce2316d7986acb82e90df933332ebd1c9b7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  232KB

                                  MD5

                                  262c29e023475dc89b8593cfe0f4edab

                                  SHA1

                                  7c11513f0a0d47d91873f04635e6b5cb29cda7a1

                                  SHA256

                                  f378e5b4473017abd45b28ccd4792f94c88cb1999370314dd207ae34ad93134e

                                  SHA512

                                  0207a14f41349f69aa3ce9bf0fce4e5d0d00caad30958fa77ec071d367d15b32c77da5a8f86bab9214d8d3fa760711e80250838f5d719ac68ffe878f83587419

                                • C:\Users\Admin\AppData\Local\OperaGX.exe

                                  Filesize

                                  3.2MB

                                  MD5

                                  357c041ed7c915b5f6f4941b4f4b17d2

                                  SHA1

                                  933f2d21856dd09e27f0afd8fa250260ea43fec8

                                  SHA256

                                  62e097749a258e6535bd9b7d304001d1134c5b6f2ca11e577ea458de6ecf23eb

                                  SHA512

                                  987d3dd23aced431f1f4419d4c637b80513a80b279e95ac527e87f98a9ebacc3e998626211bf05772fccc71ba7f89a4dadef8a4abc2debcf87d89e40d9305be8

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\additional_file0.tmp

                                  Filesize

                                  1.4MB

                                  MD5

                                  e9a2209b61f4be34f25069a6e54affea

                                  SHA1

                                  6368b0a81608c701b06b97aeff194ce88fd0e3c0

                                  SHA256

                                  e950f17f4181009eeafa9f5306e8a9dfd26d88ca63b1838f44ff0efc738e7d1f

                                  SHA512

                                  59e46277ca79a43ed8b0a25b24eff013e251a75f90587e013b9c12851e5dd7283b6172f7d48583982f6a32069457778ee440025c1c754bf7bb6ce8ae1d2c3fc5

                                • C:\Users\Admin\AppData\Local\Temp\.opera\Opera GX Installer Temp\opera_package_202411191758441\assistant\assistant_installer.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  4c8fbed0044da34ad25f781c3d117a66

                                  SHA1

                                  8dd93340e3d09de993c3bc12db82680a8e69d653

                                  SHA256

                                  afe569ce9e4f71c23ba5f6e8fd32be62ac9538e397cde8f2ecbe46faa721242a

                                  SHA512

                                  a04e6fd052d2d63a0737c83702c66a9af834f9df8423666508c42b3e1d8384300239c9ddacdc31c1e85140eb1193bcfac209f218750b40342492ffce6e9da481

                                • C:\Users\Admin\AppData\Local\Temp\7zSC8C60287\setup.exe

                                  Filesize

                                  6.5MB

                                  MD5

                                  a16e857704e7635dde8cd009062b2aae

                                  SHA1

                                  677a0463e9af29ba2d450e6312b250ac627adb24

                                  SHA256

                                  f4a67d808955567da2212a980afaa0bdc003ed2c5be4017781e3985a63fa0c68

                                  SHA512

                                  0f933d04534212d35c2a691c440662508ce81c7c091c9ce0198640859421d3099546475b91289a2459454e67c4b9e8989f799a9a1c2579d1c935cdc8edf31a16

                                • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2411191758416193512.dll

                                  Filesize

                                  6.0MB

                                  MD5

                                  3d0b13763c6696221cd6e7524b974ca8

                                  SHA1

                                  eeb708cbcd0ccb345c73306eb878d4199f8ee85b

                                  SHA256

                                  528508786ad5fa13459642873f63d50b627b97f61af806ea3435c42551e1e368

                                  SHA512

                                  454277b795acc603c4c952962a41962d0f4ff879eaf1af664e6c65c577c410738bde6cff56eabc604304aa1b2e0e4c031d8236f5ba8821406fdeff60b7d09885

                                • C:\Users\Admin\AppData\Local\link.txt

                                  Filesize

                                  57B

                                  MD5

                                  02971471b3662a37547902e54d9ab7dd

                                  SHA1

                                  30370e683cf00388f2c2027acf76fb96c0e47c9c

                                  SHA256

                                  20cc102671b4a6c6fab26f9cfbd1357f513b8dfe9f3832367a50270c29c37ebb

                                  SHA512

                                  5f670dbfca1a76f2737d02260ad75cb6efeab86f1abd9ba82f24dd052920ad57e2d67f31781de65edd65dd8c29ab48e135968d079b00eb053f425243c1e795d1

                                • C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports\settings.dat

                                  Filesize

                                  40B

                                  MD5

                                  5c37bd4ca77a0b8b5882cfac1cc788e3

                                  SHA1

                                  3354c247c4933e0e2c866c0792e0902c85697ce7

                                  SHA256

                                  23b83d4929bd606b92ad78e75a75302ca1138d7de5024af49fc9c6404fb83acf

                                  SHA512

                                  d51da136c8d8780391f3925b511ff35d45938b0cca57d3cec25aad4bb50b801e78f3e24e3b6fcd8de61ab4606ab284fcb1a0093d500d9309ca8c56d9592f211d

                                • C:\Users\Admin\AppData\Roaming\Opera Software\Opera GX Stable\Crash Reports\settings.dat

                                  Filesize

                                  40B

                                  MD5

                                  ef8134964080f357a1b3ca9db5b0d427

                                  SHA1

                                  604a3a08db9c66bf3b1866005e6715fa1138e6ed

                                  SHA256

                                  987d1f43f4a804e6b2cdcb6af8ae839fce9cd92782b7e0a9f1ae86bb8f896644

                                  SHA512

                                  801160630a44860a44e8e01e137a057773908862b14c868e22f662c354f3c0d0b1ba75772d4027d133123d988dfb8a33dd34c2d4099d1bac3b57ca1d108562d2

                                • C:\Users\Admin\Downloads\Release (1).rar

                                  Filesize

                                  1.9MB

                                  MD5

                                  99fb762746f8719f4421e1a897cf7846

                                  SHA1

                                  c4dbc0fb0c4c21dbdc61e2202162363d69092c8d

                                  SHA256

                                  2a2d19d053252c1d42e4b7e6119a443b08dabee38f18aa6bbff4e0b730275a5d

                                  SHA512

                                  931c16b5b4b1731e869a9ac4c016cfd02bf8c23c5f64b76621473bae449925e64bde1a6204ff9e51c439ac99cd47e7b6766babeb916bbffd9ec88cae944c7a56

                                • C:\Users\Admin\Downloads\Release (1).rar:Zone.Identifier

                                  Filesize

                                  26B

                                  MD5

                                  fbccf14d504b7b2dbcb5a5bda75bd93b

                                  SHA1

                                  d59fc84cdd5217c6cf74785703655f78da6b582b

                                  SHA256

                                  eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                  SHA512

                                  aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98