Analysis

  • max time kernel
    1292s
  • max time network
    1283s
  • platform
    windows7_x64
  • resource
    win7-20221111-es
  • resource tags

    arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows
  • submitted
    14/01/2023, 16:45

General

  • Target

    https://zloemu.net/files/ZLOriginSetup.zip

Score
9/10

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Downloads MZ/PE file
  • Executes dropped EXE 59 IoCs
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 9 IoCs
  • Suspicious behavior: SetClipboardViewer 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://zloemu.net/files/ZLOriginSetup.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:980 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1828
  • C:\Program Files\7-Zip\7zG.exe
    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap8946:88:7zEvent5836
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1064
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x1f0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2000
  • C:\Users\Admin\Downloads\ZLOrigin\setup.exe
    "C:\Users\Admin\Downloads\ZLOrigin\setup.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\Temp\is-7ITHG.tmp\setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7ITHG.tmp\setup.tmp" /SL5="$201F0,84480,0,C:\Users\Admin\Downloads\ZLOrigin\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Program Files (x86)\ZLOrigin\Origin.exe
        "C:\Program Files (x86)\ZLOrigin\Origin.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Loads dropped DLL
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:928
        • C:\Program Files (x86)\ZLOrigin\OriginClientService.exe
          "C:\Program Files (x86)\ZLOrigin\OriginClientService.exe" C:\Program Files (x86)\ZLOrigin\OriginClientService.exe -args:pmr1PiUhMTBVYqDgaPCyaqWC0uOqlyBW
          4⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Loads dropped DLL
          • Modifies registry class
          • Suspicious behavior: SetClipboardViewer
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1536
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6994f50,0x7fef6994f60,0x7fef6994f70
      2⤵
        PID:984
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1036 /prefetch:2
        2⤵
          PID:884
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1292 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1560
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1840 /prefetch:8
          2⤵
            PID:2072
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:1
            2⤵
              PID:2172
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2084 /prefetch:1
              2⤵
                PID:2180
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
                2⤵
                  PID:2336
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3300 /prefetch:2
                  2⤵
                    PID:2404
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                    2⤵
                      PID:2452
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3524 /prefetch:8
                      2⤵
                        PID:2516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:8
                        2⤵
                          PID:2524
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=620 /prefetch:8
                          2⤵
                            PID:2644
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 /prefetch:8
                            2⤵
                              PID:2652
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1760 /prefetch:8
                              2⤵
                                PID:2672
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1828 /prefetch:8
                                2⤵
                                  PID:2664
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4116 /prefetch:8
                                  2⤵
                                    PID:2796
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4124 /prefetch:8
                                    2⤵
                                      PID:2832
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4044 /prefetch:8
                                      2⤵
                                        PID:2848
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3968 /prefetch:8
                                        2⤵
                                          PID:2840
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=656 /prefetch:1
                                          2⤵
                                            PID:2940
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:1
                                            2⤵
                                              PID:3020
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4064 /prefetch:1
                                              2⤵
                                                PID:2364
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:1
                                                2⤵
                                                  PID:884
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:1
                                                  2⤵
                                                    PID:2564
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3888 /prefetch:8
                                                    2⤵
                                                      PID:188
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:1
                                                      2⤵
                                                        PID:768
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:1
                                                        2⤵
                                                          PID:1756
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1
                                                          2⤵
                                                            PID:2636
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:1
                                                            2⤵
                                                              PID:2676
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2388 /prefetch:1
                                                              2⤵
                                                                PID:2876
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4636 /prefetch:8
                                                                2⤵
                                                                  PID:2296
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:1
                                                                  2⤵
                                                                    PID:2944
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:1
                                                                    2⤵
                                                                      PID:2984
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5588 /prefetch:8
                                                                      2⤵
                                                                        PID:1996
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5728 /prefetch:8
                                                                        2⤵
                                                                          PID:1060
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5860 /prefetch:8
                                                                          2⤵
                                                                            PID:2508
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5820 /prefetch:8
                                                                            2⤵
                                                                              PID:2700
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5704 /prefetch:8
                                                                              2⤵
                                                                                PID:2692
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5884 /prefetch:8
                                                                                2⤵
                                                                                  PID:2708
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6212 /prefetch:8
                                                                                  2⤵
                                                                                    PID:2652
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6296 /prefetch:8
                                                                                    2⤵
                                                                                      PID:2712
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6320 /prefetch:8
                                                                                      2⤵
                                                                                        PID:2236
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:1
                                                                                        2⤵
                                                                                          PID:1632
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:1
                                                                                          2⤵
                                                                                            PID:724
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3280 /prefetch:8
                                                                                            2⤵
                                                                                              PID:1060
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                                                                                              2⤵
                                                                                                PID:2656
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:2892
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:2860
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6204 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:1820
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6440 /prefetch:8
                                                                                                      2⤵
                                                                                                        PID:1272
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4008 /prefetch:8
                                                                                                        2⤵
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:2368
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5692 /prefetch:8
                                                                                                        2⤵
                                                                                                          PID:604
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:8
                                                                                                          2⤵
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:1736
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6568 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:2592
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6508 /prefetch:8
                                                                                                            2⤵
                                                                                                              PID:2276
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6440 /prefetch:8
                                                                                                              2⤵
                                                                                                                PID:1792
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6604 /prefetch:8
                                                                                                                2⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:2108
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:2580
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6636 /prefetch:8
                                                                                                                  2⤵
                                                                                                                    PID:2368
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4444 /prefetch:1
                                                                                                                    2⤵
                                                                                                                      PID:2088
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6476 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:1792
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:1
                                                                                                                        2⤵
                                                                                                                          PID:2672
                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1856 /prefetch:8
                                                                                                                          2⤵
                                                                                                                            PID:436
                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5904 /prefetch:8
                                                                                                                            2⤵
                                                                                                                              PID:2280
                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                                                                                                                              2⤵
                                                                                                                                PID:1068
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:8
                                                                                                                                2⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:2888
                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6456 /prefetch:8
                                                                                                                                2⤵
                                                                                                                                  PID:604
                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2912 /prefetch:8
                                                                                                                                  2⤵
                                                                                                                                    PID:3032
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:8
                                                                                                                                    2⤵
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    PID:1792
                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6332 /prefetch:8
                                                                                                                                    2⤵
                                                                                                                                      PID:2204
                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6368 /prefetch:8
                                                                                                                                      2⤵
                                                                                                                                        PID:1216
                                                                                                                                      • C:\Users\Admin\Downloads\ZClient.exe
                                                                                                                                        "C:\Users\Admin\Downloads\ZClient.exe"
                                                                                                                                        2⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Loads dropped DLL
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        • Modifies registry class
                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                        PID:2936
                                                                                                                                        • C:\Users\Admin\Downloads\ZI.exe
                                                                                                                                          ZI.exe hurr durr cli
                                                                                                                                          3⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2888
                                                                                                                                        • C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                          C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                          3⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                          • Suspicious behavior: SetClipboardViewer
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:2992
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\OriginClientService.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\OriginClientService.exe" C:\PROGRA~2\ZLOrigin\OriginClientService.exe -args:pmr1PiUhMTBVYqDgaPCyantOI0inm4T3
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Modifies registry class
                                                                                                                                            • Suspicious behavior: SetClipboardViewer
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:2056
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX11 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:1216
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX12 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3124
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX9 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3104
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX11 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3092
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX10 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:300
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX9 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:436
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX12 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:816
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX10 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:1736
                                                                                                                                          • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                            "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX8 -V
                                                                                                                                            4⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:2184
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6452 /prefetch:8
                                                                                                                                        2⤵
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        PID:1272
                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3040 /prefetch:8
                                                                                                                                        2⤵
                                                                                                                                          PID:2624
                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6400 /prefetch:8
                                                                                                                                          2⤵
                                                                                                                                            PID:2712
                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5952 /prefetch:8
                                                                                                                                            2⤵
                                                                                                                                              PID:3888
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6432 /prefetch:8
                                                                                                                                              2⤵
                                                                                                                                                PID:1716
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:3140
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1748
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3216 /prefetch:8
                                                                                                                                                    2⤵
                                                                                                                                                      PID:3236
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:8
                                                                                                                                                      2⤵
                                                                                                                                                        PID:1836
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 /prefetch:8
                                                                                                                                                        2⤵
                                                                                                                                                          PID:940
                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5656 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                            PID:3992
                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5568 /prefetch:8
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4080
                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6484 /prefetch:8
                                                                                                                                                              2⤵
                                                                                                                                                                PID:2184
                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3120 /prefetch:8
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:924
                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1056,5635271048343641123,9734314111896327938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6332 /prefetch:8
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:3884
                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:1312
                                                                                                                                                                    • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1312_2023526707\ChromeRecovery.exe
                                                                                                                                                                      "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1312_2023526707\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={261a9974-c516-4097-b0b4-421cd03a6549} --system
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:1592
                                                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                                    PID:1100
                                                                                                                                                                  • C:\Program Files (x86)\ZLOrigin\Origin.exe
                                                                                                                                                                    "C:\Program Files (x86)\ZLOrigin\Origin.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:1796
                                                                                                                                                                    • C:\Program Files (x86)\ZLOrigin\OriginCrashReporter.exe
                                                                                                                                                                      "C:\Program Files (x86)\ZLOrigin\OriginCrashReporter.exe" C:/Users/Admin/AppData/Local/Temp/Origin.Hp1796
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                      PID:904
                                                                                                                                                                  • C:\Windows\SysWOW64\DllHost.exe
                                                                                                                                                                    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:700
                                                                                                                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                      C:\Windows\system32\AUDIODG.EXE 0x55c
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:2728
                                                                                                                                                                    • C:\Program Files (x86)\ZLOrigin\Origin.exe
                                                                                                                                                                      "C:\Program Files (x86)\ZLOrigin\Origin.exe"
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:3416
                                                                                                                                                                      • C:\Program Files (x86)\ZLOrigin\OriginClientService.exe
                                                                                                                                                                        "C:\Program Files (x86)\ZLOrigin\OriginClientService.exe" C:\Program Files (x86)\ZLOrigin\OriginClientService.exe -args:pmr1PiUhMTBVYqDgaPCyaokYLKA2Yj+I
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        • Suspicious behavior: SetClipboardViewer
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:3588
                                                                                                                                                                    • C:\Users\Admin\Downloads\ZClient.exe
                                                                                                                                                                      "C:\Users\Admin\Downloads\ZClient.exe"
                                                                                                                                                                      1⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:2644
                                                                                                                                                                      • C:\Users\Admin\Downloads\ZI.exe
                                                                                                                                                                        ZI.exe hurr durr cli
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:1656
                                                                                                                                                                      • C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:3244
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\OriginClientService.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\OriginClientService.exe" C:\PROGRA~2\ZLOrigin\OriginClientService.exe -args:pmr1PiUhMTBVYqDgaPCyaqS+KeC4EAEL
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          • Suspicious behavior: SetClipboardViewer
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:2792
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3708
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3628
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3660
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3644
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3692
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3676
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3576
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3444
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX8 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3776
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe
                                                                                                                                                                          C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe C:/Users/Admin/AppData/Local/Temp/Origin.Hp3244
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:3084
                                                                                                                                                                      • C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:324
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX8 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:4060
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3480
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2024
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2768
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3596
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3372
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3764
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2256
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:604
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe
                                                                                                                                                                          C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe C:/Users/Admin/AppData/Local/Temp/Origin.qHp324
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:3676
                                                                                                                                                                      • C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:2232
                                                                                                                                                                      • C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        C:\PROGRA~2\ZLOrigin\Origin.exe
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Checks BIOS information in registry
                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                        PID:476
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3656
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX12 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3784
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3840
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2684
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy64.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy64.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2000
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX11 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:996
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX10 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3736
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX9 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:3404
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\IGOProxy.exe
                                                                                                                                                                          "C:\PROGRA~2\ZLOrigin\IGOProxy.exe" -L DX8 -V
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:2216
                                                                                                                                                                        • C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe
                                                                                                                                                                          C:\PROGRA~2\ZLOrigin\OriginCrashReporter.exe C:/Users/Admin/AppData/Local/Temp/Origin.qHp476
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Checks BIOS information in registry
                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:764

                                                                                                                                                                    Network

                                                                                                                                                                          MITRE ATT&CK Enterprise v6

                                                                                                                                                                          Replay Monitor

                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                          Downloads

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Origin.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dab21c14c09fa0f40dacd1a19c7a9125

                                                                                                                                                                            SHA1

                                                                                                                                                                            d7eeb0dbb397c6d37bfd084a6fa791da8017589a

                                                                                                                                                                            SHA256

                                                                                                                                                                            dc215daa9f79ea6b9d3b2c376a908ac4621871dc4b56374fad7edaed4feb66d7

                                                                                                                                                                            SHA512

                                                                                                                                                                            3f427c3b88321579fb6e30ebc7ecb74072a6ac36a6e9f8ce73bb48db170de4167991f8d110067a3191e872939d230b016a2f21160aa17d8a4b95743ddfa687b0

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Origin.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dab21c14c09fa0f40dacd1a19c7a9125

                                                                                                                                                                            SHA1

                                                                                                                                                                            d7eeb0dbb397c6d37bfd084a6fa791da8017589a

                                                                                                                                                                            SHA256

                                                                                                                                                                            dc215daa9f79ea6b9d3b2c376a908ac4621871dc4b56374fad7edaed4feb66d7

                                                                                                                                                                            SHA512

                                                                                                                                                                            3f427c3b88321579fb6e30ebc7ecb74072a6ac36a6e9f8ce73bb48db170de4167991f8d110067a3191e872939d230b016a2f21160aa17d8a4b95743ddfa687b0

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Core.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.6MB

                                                                                                                                                                            MD5

                                                                                                                                                                            4abc9bb91bbf4a2a045cd76d0c3fd20e

                                                                                                                                                                            SHA1

                                                                                                                                                                            ec83683854629f091eaa0e166c11df79f14a5be4

                                                                                                                                                                            SHA256

                                                                                                                                                                            42b033511b7353740f4236dad19e5cd024d46611e4beb3e9d21136bef0486772

                                                                                                                                                                            SHA512

                                                                                                                                                                            a8d4cae4bab95d66ddf61530655ba97080129386ebb29214803013b204c0f64447c1eb9f622c44ffb5ffb176e9e37e18dc169de66c4957c99918a1b6b6867b71

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Gui.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.8MB

                                                                                                                                                                            MD5

                                                                                                                                                                            c983d1116209f8162d29002df000fea5

                                                                                                                                                                            SHA1

                                                                                                                                                                            9fa96296b33857651cdfabe560dd92ea7bb6a829

                                                                                                                                                                            SHA256

                                                                                                                                                                            fac0876d4cf471b4f906b50d7c89d2a35ebabf837143f1dfdbcb3e5ea2c5ba83

                                                                                                                                                                            SHA512

                                                                                                                                                                            a3f4d18f39d0c6fb8615e7fae9c51ea6e3e59cb253ce3a5cf5aece48f0c4099f3a9db0ad8b79b7395e04ecf44add9d230ff9178140b89e8253968978166c9208

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Multimedia.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            649KB

                                                                                                                                                                            MD5

                                                                                                                                                                            926b371fe5f17227f42bc109446082e3

                                                                                                                                                                            SHA1

                                                                                                                                                                            4a98eda4a95a6f1d2e3a89702b00fdb156a5ac11

                                                                                                                                                                            SHA256

                                                                                                                                                                            16996fc58336ccc7efeaf5335ed58b5be0f8b6c147ed5929fe0c11e0cdc452d1

                                                                                                                                                                            SHA512

                                                                                                                                                                            3188dae1506740502dcabe0266d7cebef59b96a2aeb56d195a301fae6b0e1e9c3da2254c049d036f22274a83b61cdf89eb08d8952082dea7540491f54cb43a46

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5MultimediaWidgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            92KB

                                                                                                                                                                            MD5

                                                                                                                                                                            6cc995458b4f8e4910e58283fed2e8ed

                                                                                                                                                                            SHA1

                                                                                                                                                                            6a2fb2686f90406a4034e50e417964f44b506761

                                                                                                                                                                            SHA256

                                                                                                                                                                            1a54251b2e5b5571df682749025181477fe0792983ceb2df5fa7c32ae154e32d

                                                                                                                                                                            SHA512

                                                                                                                                                                            51a1f4b50250d0ab5ae2fc357cb6b2a45868d0ee950f9e552e80bbb2e4b939967a2e2d8be9892df9c5fdea49b5180ab87b3bf53719745df00173e3a604b249f1

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Network.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            983KB

                                                                                                                                                                            MD5

                                                                                                                                                                            9df7e0cbcd0b6b0109e297f3ecdf5c2e

                                                                                                                                                                            SHA1

                                                                                                                                                                            427ec3df2d5a660a578270b28808620041458e99

                                                                                                                                                                            SHA256

                                                                                                                                                                            95b3d5b0d70a274ee1237180e79fc65b7330439dacc714ea9454d2cec33d6317

                                                                                                                                                                            SHA512

                                                                                                                                                                            fc75cb2515513b9fcc3bb97b746c5c391db7bc76aa4fd5e30ce15c3ff91de419e0d520195777375cc28ac64f3b8e63a0a03fe767cce574c2206ef776cff9ec2d

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5OpenGL.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            304KB

                                                                                                                                                                            MD5

                                                                                                                                                                            4a9d01c861148bf7ced63e396261590f

                                                                                                                                                                            SHA1

                                                                                                                                                                            6f0987f346f349013dc87cb62f112a57a26b07d8

                                                                                                                                                                            SHA256

                                                                                                                                                                            78a5c839cb1d20b7ea146219bcb9ccea9fad9d1bd908661194c725c639a0e07e

                                                                                                                                                                            SHA512

                                                                                                                                                                            051a83a8e0b6b97a931c49e4251cb6021a7f260e7a5a72173d398a849ac7963ba95add875b2cce4aadcab034c9c8f00db2678c3564a7999563f0f07fef9062b2

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Positioning.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            185KB

                                                                                                                                                                            MD5

                                                                                                                                                                            5e9ba1cf96e15c2f44ddd2e32c0af265

                                                                                                                                                                            SHA1

                                                                                                                                                                            7898942fd5a79fc2d79b6ba1bbc4c4e8aabdbb99

                                                                                                                                                                            SHA256

                                                                                                                                                                            22eeb8e94e9c498b5baad3b5fcd105533a7ddc131726578ab8bdf8b7e71b0232

                                                                                                                                                                            SHA512

                                                                                                                                                                            ba18942394b63414b22e9e648d3b180a031b32b8c152f8dd3c0def301373859ca3158e0b5aa51ee6e58068d8709f54b1f6d1d8836e70e9af91ca710ee7d5dad8

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5PrintSupport.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            301KB

                                                                                                                                                                            MD5

                                                                                                                                                                            1563617917ec21252034c897d9b386b2

                                                                                                                                                                            SHA1

                                                                                                                                                                            3b44931e2b8ae7b65511f2f83a6916a96fdda35b

                                                                                                                                                                            SHA256

                                                                                                                                                                            7a41f37b0ad52e47affa75dc5efe49b262c9a9210ae927cb8d4f89eb57aa1333

                                                                                                                                                                            SHA512

                                                                                                                                                                            8879be6676ebe5e400ba99d3c4874af8bd37d5e5b3eb171f0046db50bd0eb828959cc3799c4e7004987440038568c9ff7e894edfbcda8040a57ecc6f7039ce67

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Qml.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            1bbaf6b6e43c212f3cdcc5f8d4cfa3fe

                                                                                                                                                                            SHA1

                                                                                                                                                                            0bd441212def2f9ba06f595846637b9c6100f292

                                                                                                                                                                            SHA256

                                                                                                                                                                            fd4610c94d7868ee98bfc17e88e837009aad0783a0b985f42892e79fae3fc26f

                                                                                                                                                                            SHA512

                                                                                                                                                                            e8687842bd3b6e4c8cd1c8dcf5a7b952eeb3492a01409a2ab340c9fd2d7e189e220c79da5228943803ab8241480b2f3ec15cc3b3d4a08c72ae0b2d247c272dbb

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Quick.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            2.7MB

                                                                                                                                                                            MD5

                                                                                                                                                                            a0fbd9e1316c57207712a3c556026d72

                                                                                                                                                                            SHA1

                                                                                                                                                                            3f342bfa40e184ad0d31d0079344248160d01039

                                                                                                                                                                            SHA256

                                                                                                                                                                            890bfe0f73e46f12935972868d13ef5c5def63c87617caea318dc0547269516d

                                                                                                                                                                            SHA512

                                                                                                                                                                            e350cc55869d008e0dad66759c630dfddc4e9ec96812a940d0639d860c6aab236e311c7fa45ce0536d8a670e865480ff93bc242f04f3a52fcfa0a5122c46a5f2

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Sensors.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            177KB

                                                                                                                                                                            MD5

                                                                                                                                                                            6714f517904213cc4b28036d7a1fb38a

                                                                                                                                                                            SHA1

                                                                                                                                                                            4b548b0f73dc204884e62b867a9acde83d3101d1

                                                                                                                                                                            SHA256

                                                                                                                                                                            67252d862302e32cd275315192a6f4a22f0e597885ef736d68eb149e08756c2a

                                                                                                                                                                            SHA512

                                                                                                                                                                            d865732f98a417a4f8a13770fe29e5073da9dca8ffbb2a84dea1ebf37f042fc2739ca726a64a5e4b2d0c8c20a1d200f5d8a35a49eb99df7a4fab6e973a0bf96c

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Sql.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            183KB

                                                                                                                                                                            MD5

                                                                                                                                                                            f4ba157222f32620d40b1ce36562fdbf

                                                                                                                                                                            SHA1

                                                                                                                                                                            a1a2d0305d84e6282b9a212475dea2834e39d0d1

                                                                                                                                                                            SHA256

                                                                                                                                                                            46471c2f72d0204d3c202b7a1a23b87402c3b8bb7e7d3e31747ac4f2f9025993

                                                                                                                                                                            SHA512

                                                                                                                                                                            7bca66888ca4cc942c370db820caef1b49bd787e63d6f701d2df97894e849922c5707abcabe56802bd2972e7d22aae54366a40d3275a3bd4fa69d6fa9f9d66a6

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5WebKit.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            16.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            f6bf0948b06107fc8b01c71de2bd64dc

                                                                                                                                                                            SHA1

                                                                                                                                                                            4b752f7e241c62bcc4097477a0f0b7092b822a3e

                                                                                                                                                                            SHA256

                                                                                                                                                                            a4870f16094d015fe17c4bb5efd7eb3c63841792676594f17c30228948e1c6e5

                                                                                                                                                                            SHA512

                                                                                                                                                                            329b263a6d8fadc36ccc9c32bd69add5a4e21687029e62b5506e364f4186c0eb5f1dd553e3b5af2f370fb110ef1b40c0da97a5162a09d51874a07e7ddecb6067

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5WebKitWidgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            213KB

                                                                                                                                                                            MD5

                                                                                                                                                                            0de34e9ebfe6b7230067d6a8b96810ce

                                                                                                                                                                            SHA1

                                                                                                                                                                            511a80faeddd78ef5cfb94aa3db45d6d4d89749c

                                                                                                                                                                            SHA256

                                                                                                                                                                            43f5db7753714366ac4e78bb717278c08cbec26525c421b7fe32433c2dc3fe3a

                                                                                                                                                                            SHA512

                                                                                                                                                                            6b7ebe3b7a23dd577a0bcfc41212947e2790190ef2a54b0601814b5b6623598de1dda400565afecda4927d60e6e33d960eb277164d12deb21fc4accba0f1ff54

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Widgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.7MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dc9e1ba3cdbd9aaf68e0a4b4a12d3c5b

                                                                                                                                                                            SHA1

                                                                                                                                                                            c5b94577f800deccbf5cb772f142db8bc42b59ac

                                                                                                                                                                            SHA256

                                                                                                                                                                            71a1df35f20165b5a6435c6f40aa904e73759b754924f5c8a17c088122edb0c0

                                                                                                                                                                            SHA512

                                                                                                                                                                            736f1582773a2884ff5e047bc16d9896de6255450c209fead8806e4de693a3e9a6d6e98aa1a80ec56ba751c90f4fbabcc542d69bc22ababa5b21e9d3f1215151

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\Qt5Xml.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            177KB

                                                                                                                                                                            MD5

                                                                                                                                                                            de9f5f0442c478435dd9c3be72f39c4b

                                                                                                                                                                            SHA1

                                                                                                                                                                            d3a375abea2cf3dc287073e48a96662b257a886f

                                                                                                                                                                            SHA256

                                                                                                                                                                            4865748fedbafd266971fae0d6d282317b598eb2c4907f10c67d2c41445e5e30

                                                                                                                                                                            SHA512

                                                                                                                                                                            1f2e28888a046a654b401e10f7b5653b776a4ae180fd6fb3ae6cd2d5744e650cddce873d08ba20f0c205e627bbc1bdca950fa6b25cfb31dd3c7e4da4c03b3d22

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\WINHTTP.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            62KB

                                                                                                                                                                            MD5

                                                                                                                                                                            e81c98470febe564944d62839282cac6

                                                                                                                                                                            SHA1

                                                                                                                                                                            bac72740cc27ef69a23d028090338579bdde4abe

                                                                                                                                                                            SHA256

                                                                                                                                                                            eafcee069fcfe87f62408f0503c5628edb4cf6fc7dfa8deb5a478b87d13a455b

                                                                                                                                                                            SHA512

                                                                                                                                                                            5456b13efded6ca9509aa0b32ebb1496823066848aec5ca5758c3f6c3b527ccbb71f8e845a2c76ac7f8d4ad0ddbf2b0d08fc372750ca114bbaf3680bae8ae443

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\icudt51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            21.3MB

                                                                                                                                                                            MD5

                                                                                                                                                                            cc910d2336908b796dd89732764c50e7

                                                                                                                                                                            SHA1

                                                                                                                                                                            4fe218155ad7da6cd24d32868fdf23caa90bb1de

                                                                                                                                                                            SHA256

                                                                                                                                                                            acb1b7f4664f0d939a3be878a110b5b81d79509af4b6796cc0b858fd3cff43d3

                                                                                                                                                                            SHA512

                                                                                                                                                                            133818bfff7483c9a7805e7e1a63ab879b28898d283a17566948c004f4e0e1897f17af18de8ac86a2525fbaaf027aba0363fbbf16318e27a419963de84c45660

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\icuin51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.3MB

                                                                                                                                                                            MD5

                                                                                                                                                                            df31a56a47ae35b90ceb6e413e83138f

                                                                                                                                                                            SHA1

                                                                                                                                                                            817d1275f68618a1bcfbb9c9a36e4ec79e2b13c3

                                                                                                                                                                            SHA256

                                                                                                                                                                            de0597fbdd4c00c94a55208295d04f9adb1bd267de107bb0857a0ff7e92d7c78

                                                                                                                                                                            SHA512

                                                                                                                                                                            080cb7d9a09d97e8ba86c10a2f96c05b0872e7ad14bdc2ccd4e33d33068c9d1a1fd7dd0baea538707c433a55f4c2335b5b06c764a930ecc8656198fd21bcf20b

                                                                                                                                                                          • C:\Program Files (x86)\ZLOrigin\icuuc51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                            MD5

                                                                                                                                                                            0d2235b81e187c0be3f664e4ab7bb4e2

                                                                                                                                                                            SHA1

                                                                                                                                                                            f996bf55f92690c664a651979a17b465921ae854

                                                                                                                                                                            SHA256

                                                                                                                                                                            d7f6402728963ad3ed40dbefed4f137524fa940293acb40fa046a12b59b7ce56

                                                                                                                                                                            SHA512

                                                                                                                                                                            13d2922245c3bcef1e7ab5d490c6738d897b23dea1d03e424e11b4a4e63d4a04167a6d9641a565fe34b757c02d4f7d65a54bd5b8b74ef1db0d4555dc134802a8

                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                            Filesize

                                                                                                                                                                            61KB

                                                                                                                                                                            MD5

                                                                                                                                                                            fc4666cbca561e864e7fdf883a9e6661

                                                                                                                                                                            SHA1

                                                                                                                                                                            2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                                                                                                                                                            SHA256

                                                                                                                                                                            10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                                                                                                                                                            SHA512

                                                                                                                                                                            c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                            Filesize

                                                                                                                                                                            1KB

                                                                                                                                                                            MD5

                                                                                                                                                                            a266bb7dcc38a562631361bbf61dd11b

                                                                                                                                                                            SHA1

                                                                                                                                                                            3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                                                                                                                            SHA256

                                                                                                                                                                            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                                                                                                                            SHA512

                                                                                                                                                                            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                            Filesize

                                                                                                                                                                            342B

                                                                                                                                                                            MD5

                                                                                                                                                                            a959f33461f79ef61b59ba9385eafcf2

                                                                                                                                                                            SHA1

                                                                                                                                                                            89772f590c5cfd7bcc0b7e56fe03fb49c06f5fc1

                                                                                                                                                                            SHA256

                                                                                                                                                                            2d590d11d0ed96f0e1440de3bb657ab1d722b6da55200264b87988e0a88ca61a

                                                                                                                                                                            SHA512

                                                                                                                                                                            766a7a8e9ab29c32bcbfb27c840016e796a39806701f05cd4eaf6138a14a8c10ed62cdb8660149943234a04e73021873c1822a17d7355dc996ea98d39febeba2

                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                                                                                            Filesize

                                                                                                                                                                            342B

                                                                                                                                                                            MD5

                                                                                                                                                                            3a83f13e470101940f2d0de1fe960c99

                                                                                                                                                                            SHA1

                                                                                                                                                                            1b7e035578a8e273a676b2e605d8d8b666c73280

                                                                                                                                                                            SHA256

                                                                                                                                                                            317e9501ef90388bacc06b086cb58d983bbe0b0c7aadb6c9863c74c7150ea193

                                                                                                                                                                            SHA512

                                                                                                                                                                            9e4671193380fe2a1535e4f2a9f8d1f815dec239da6c71256446e9e0ba0b0ac9eed5b907e826c88b96c69fa365b71a9a21d6665e8167f4f09b6323fa47b4c227

                                                                                                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                                                                                                            Filesize

                                                                                                                                                                            242B

                                                                                                                                                                            MD5

                                                                                                                                                                            934d13a6640f62736980e34949208200

                                                                                                                                                                            SHA1

                                                                                                                                                                            743bb8b48b79ad875e07053bde35a0690c0402d4

                                                                                                                                                                            SHA256

                                                                                                                                                                            7a408ed31c843799d52cc336188cee827b6eb87b9867b7823033117b7a7569e7

                                                                                                                                                                            SHA512

                                                                                                                                                                            33a209a023a617cb09f734c8b977d8c59a9016ebc2dac7594a248fd6954998250abf49c00efb2a3f578084f8d90f2092b1887579992bfe62fdb2db486d44c2df

                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-7ITHG.tmp\setup.tmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            723KB

                                                                                                                                                                            MD5

                                                                                                                                                                            a23988ec1f09399b480971075d7f87ba

                                                                                                                                                                            SHA1

                                                                                                                                                                            817abf38a9d6eb2dd77770524ba129d8b5608efd

                                                                                                                                                                            SHA256

                                                                                                                                                                            070904f11ec14b5df2e503fd1f67a6ffffa6591466d8eccb056b39e343d2b9dd

                                                                                                                                                                            SHA512

                                                                                                                                                                            4f54949002bf224967df18f10d5399ef602c0d4fa7d77e1ee1d42b6a189497fe820c40df2287e4b511506d46f6b797b9f6d09657d9129230f80baa2f037b8527

                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-7ITHG.tmp\setup.tmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            723KB

                                                                                                                                                                            MD5

                                                                                                                                                                            a23988ec1f09399b480971075d7f87ba

                                                                                                                                                                            SHA1

                                                                                                                                                                            817abf38a9d6eb2dd77770524ba129d8b5608efd

                                                                                                                                                                            SHA256

                                                                                                                                                                            070904f11ec14b5df2e503fd1f67a6ffffa6591466d8eccb056b39e343d2b9dd

                                                                                                                                                                            SHA512

                                                                                                                                                                            4f54949002bf224967df18f10d5399ef602c0d4fa7d77e1ee1d42b6a189497fe820c40df2287e4b511506d46f6b797b9f6d09657d9129230f80baa2f037b8527

                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\F6VVY8J7.txt

                                                                                                                                                                            Filesize

                                                                                                                                                                            601B

                                                                                                                                                                            MD5

                                                                                                                                                                            280816183551b5dd00559a8cee893a27

                                                                                                                                                                            SHA1

                                                                                                                                                                            6cd781f4512aeea442820888dd35cbcf0b37fc01

                                                                                                                                                                            SHA256

                                                                                                                                                                            f9393049f2a676720c4fd6e92fd29ed7e1b1ee770f157df6da16b6a6edc86725

                                                                                                                                                                            SHA512

                                                                                                                                                                            4c04ab341550137aeb9166a950a932423b34f2f425a7cdd63abe16c152db7fe2f9282cff604da23841d84d7177597fd048253fe5467f7f5e3b6f0e362f461505

                                                                                                                                                                          • C:\Users\Admin\Downloads\ZLOriginSetup.zip.lyb7cza.partial

                                                                                                                                                                            Filesize

                                                                                                                                                                            68.3MB

                                                                                                                                                                            MD5

                                                                                                                                                                            daaf53aa612606c3467b083c8e411d9b

                                                                                                                                                                            SHA1

                                                                                                                                                                            3ac6a7b1fb231063e43313f6a35c331e2fc6b11d

                                                                                                                                                                            SHA256

                                                                                                                                                                            9eb3fd13ffe725f1633976df227fef0537e26d560d80a8078625daca94c94906

                                                                                                                                                                            SHA512

                                                                                                                                                                            28b62527ea766f23cc655d6658df3e8a0b43fc74aaeb74bc8d13f8014a97ada03ec39f85baed41c0b0af4273f953a2da17ac9146b17831b352a05eb259deca19

                                                                                                                                                                          • C:\Users\Admin\Downloads\ZLOrigin\setup-1.bin

                                                                                                                                                                            Filesize

                                                                                                                                                                            68.0MB

                                                                                                                                                                            MD5

                                                                                                                                                                            372d0484a1377e0b8055eee83ee1b044

                                                                                                                                                                            SHA1

                                                                                                                                                                            e3eaa5c41dd553ee725821f691a9fdad5459a8ae

                                                                                                                                                                            SHA256

                                                                                                                                                                            44023b3237ffae2653984e42b71e1edee125238bc844537518e42de8ac35a866

                                                                                                                                                                            SHA512

                                                                                                                                                                            008c8814b8e44a2780009ceec13e4e01198d64d5d4125639460ed389a0bc9c5baf1c89bb87365807b622280091fb921bdcb8b902524511b654587c1be086252a

                                                                                                                                                                          • C:\Users\Admin\Downloads\ZLOrigin\setup.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            349KB

                                                                                                                                                                            MD5

                                                                                                                                                                            0b2f02fa22fbe930d7160eef83a0542a

                                                                                                                                                                            SHA1

                                                                                                                                                                            0fbc937af1aa378c0c44465bc02bedcf474da4b5

                                                                                                                                                                            SHA256

                                                                                                                                                                            9c4efb7114906d9d75ef1271d1b8cafcf23ef02eeddd562f0b04117e216cc672

                                                                                                                                                                            SHA512

                                                                                                                                                                            d338488ec2f6a4a25ab51ef62bc1c6b85495054381353d50814d5fba394106a29199b4b11ceb86c813259a63d481a8515e7851d60ed584a94d5893492494248c

                                                                                                                                                                          • C:\Users\Admin\Downloads\ZLOrigin\setup.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            349KB

                                                                                                                                                                            MD5

                                                                                                                                                                            0b2f02fa22fbe930d7160eef83a0542a

                                                                                                                                                                            SHA1

                                                                                                                                                                            0fbc937af1aa378c0c44465bc02bedcf474da4b5

                                                                                                                                                                            SHA256

                                                                                                                                                                            9c4efb7114906d9d75ef1271d1b8cafcf23ef02eeddd562f0b04117e216cc672

                                                                                                                                                                            SHA512

                                                                                                                                                                            d338488ec2f6a4a25ab51ef62bc1c6b85495054381353d50814d5fba394106a29199b4b11ceb86c813259a63d481a8515e7851d60ed584a94d5893492494248c

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Origin.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dab21c14c09fa0f40dacd1a19c7a9125

                                                                                                                                                                            SHA1

                                                                                                                                                                            d7eeb0dbb397c6d37bfd084a6fa791da8017589a

                                                                                                                                                                            SHA256

                                                                                                                                                                            dc215daa9f79ea6b9d3b2c376a908ac4621871dc4b56374fad7edaed4feb66d7

                                                                                                                                                                            SHA512

                                                                                                                                                                            3f427c3b88321579fb6e30ebc7ecb74072a6ac36a6e9f8ce73bb48db170de4167991f8d110067a3191e872939d230b016a2f21160aa17d8a4b95743ddfa687b0

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Origin.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dab21c14c09fa0f40dacd1a19c7a9125

                                                                                                                                                                            SHA1

                                                                                                                                                                            d7eeb0dbb397c6d37bfd084a6fa791da8017589a

                                                                                                                                                                            SHA256

                                                                                                                                                                            dc215daa9f79ea6b9d3b2c376a908ac4621871dc4b56374fad7edaed4feb66d7

                                                                                                                                                                            SHA512

                                                                                                                                                                            3f427c3b88321579fb6e30ebc7ecb74072a6ac36a6e9f8ce73bb48db170de4167991f8d110067a3191e872939d230b016a2f21160aa17d8a4b95743ddfa687b0

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\OriginClient.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            51.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            d8b3a431952cdce545c10a1472838adc

                                                                                                                                                                            SHA1

                                                                                                                                                                            494320b62783a7412b5bed348e368b4615a5641f

                                                                                                                                                                            SHA256

                                                                                                                                                                            e7c6de7bda3969e91fa67e8eb91a59110e9b69d54ff0e67bdded677dfef6c77c

                                                                                                                                                                            SHA512

                                                                                                                                                                            c1d1496498f173531c84858d24391c9eaa01b30472589ab3d41c364aff0690e51c135b8b7c49b21e8213fed076caf5f1d27787343a89dde2ab5925e12f576add

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Core.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.6MB

                                                                                                                                                                            MD5

                                                                                                                                                                            4abc9bb91bbf4a2a045cd76d0c3fd20e

                                                                                                                                                                            SHA1

                                                                                                                                                                            ec83683854629f091eaa0e166c11df79f14a5be4

                                                                                                                                                                            SHA256

                                                                                                                                                                            42b033511b7353740f4236dad19e5cd024d46611e4beb3e9d21136bef0486772

                                                                                                                                                                            SHA512

                                                                                                                                                                            a8d4cae4bab95d66ddf61530655ba97080129386ebb29214803013b204c0f64447c1eb9f622c44ffb5ffb176e9e37e18dc169de66c4957c99918a1b6b6867b71

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Gui.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.8MB

                                                                                                                                                                            MD5

                                                                                                                                                                            c983d1116209f8162d29002df000fea5

                                                                                                                                                                            SHA1

                                                                                                                                                                            9fa96296b33857651cdfabe560dd92ea7bb6a829

                                                                                                                                                                            SHA256

                                                                                                                                                                            fac0876d4cf471b4f906b50d7c89d2a35ebabf837143f1dfdbcb3e5ea2c5ba83

                                                                                                                                                                            SHA512

                                                                                                                                                                            a3f4d18f39d0c6fb8615e7fae9c51ea6e3e59cb253ce3a5cf5aece48f0c4099f3a9db0ad8b79b7395e04ecf44add9d230ff9178140b89e8253968978166c9208

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Multimedia.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            649KB

                                                                                                                                                                            MD5

                                                                                                                                                                            926b371fe5f17227f42bc109446082e3

                                                                                                                                                                            SHA1

                                                                                                                                                                            4a98eda4a95a6f1d2e3a89702b00fdb156a5ac11

                                                                                                                                                                            SHA256

                                                                                                                                                                            16996fc58336ccc7efeaf5335ed58b5be0f8b6c147ed5929fe0c11e0cdc452d1

                                                                                                                                                                            SHA512

                                                                                                                                                                            3188dae1506740502dcabe0266d7cebef59b96a2aeb56d195a301fae6b0e1e9c3da2254c049d036f22274a83b61cdf89eb08d8952082dea7540491f54cb43a46

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5MultimediaWidgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            92KB

                                                                                                                                                                            MD5

                                                                                                                                                                            6cc995458b4f8e4910e58283fed2e8ed

                                                                                                                                                                            SHA1

                                                                                                                                                                            6a2fb2686f90406a4034e50e417964f44b506761

                                                                                                                                                                            SHA256

                                                                                                                                                                            1a54251b2e5b5571df682749025181477fe0792983ceb2df5fa7c32ae154e32d

                                                                                                                                                                            SHA512

                                                                                                                                                                            51a1f4b50250d0ab5ae2fc357cb6b2a45868d0ee950f9e552e80bbb2e4b939967a2e2d8be9892df9c5fdea49b5180ab87b3bf53719745df00173e3a604b249f1

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Network.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            983KB

                                                                                                                                                                            MD5

                                                                                                                                                                            9df7e0cbcd0b6b0109e297f3ecdf5c2e

                                                                                                                                                                            SHA1

                                                                                                                                                                            427ec3df2d5a660a578270b28808620041458e99

                                                                                                                                                                            SHA256

                                                                                                                                                                            95b3d5b0d70a274ee1237180e79fc65b7330439dacc714ea9454d2cec33d6317

                                                                                                                                                                            SHA512

                                                                                                                                                                            fc75cb2515513b9fcc3bb97b746c5c391db7bc76aa4fd5e30ce15c3ff91de419e0d520195777375cc28ac64f3b8e63a0a03fe767cce574c2206ef776cff9ec2d

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5OpenGL.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            304KB

                                                                                                                                                                            MD5

                                                                                                                                                                            4a9d01c861148bf7ced63e396261590f

                                                                                                                                                                            SHA1

                                                                                                                                                                            6f0987f346f349013dc87cb62f112a57a26b07d8

                                                                                                                                                                            SHA256

                                                                                                                                                                            78a5c839cb1d20b7ea146219bcb9ccea9fad9d1bd908661194c725c639a0e07e

                                                                                                                                                                            SHA512

                                                                                                                                                                            051a83a8e0b6b97a931c49e4251cb6021a7f260e7a5a72173d398a849ac7963ba95add875b2cce4aadcab034c9c8f00db2678c3564a7999563f0f07fef9062b2

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Positioning.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            185KB

                                                                                                                                                                            MD5

                                                                                                                                                                            5e9ba1cf96e15c2f44ddd2e32c0af265

                                                                                                                                                                            SHA1

                                                                                                                                                                            7898942fd5a79fc2d79b6ba1bbc4c4e8aabdbb99

                                                                                                                                                                            SHA256

                                                                                                                                                                            22eeb8e94e9c498b5baad3b5fcd105533a7ddc131726578ab8bdf8b7e71b0232

                                                                                                                                                                            SHA512

                                                                                                                                                                            ba18942394b63414b22e9e648d3b180a031b32b8c152f8dd3c0def301373859ca3158e0b5aa51ee6e58068d8709f54b1f6d1d8836e70e9af91ca710ee7d5dad8

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5PrintSupport.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            301KB

                                                                                                                                                                            MD5

                                                                                                                                                                            1563617917ec21252034c897d9b386b2

                                                                                                                                                                            SHA1

                                                                                                                                                                            3b44931e2b8ae7b65511f2f83a6916a96fdda35b

                                                                                                                                                                            SHA256

                                                                                                                                                                            7a41f37b0ad52e47affa75dc5efe49b262c9a9210ae927cb8d4f89eb57aa1333

                                                                                                                                                                            SHA512

                                                                                                                                                                            8879be6676ebe5e400ba99d3c4874af8bd37d5e5b3eb171f0046db50bd0eb828959cc3799c4e7004987440038568c9ff7e894edfbcda8040a57ecc6f7039ce67

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Qml.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.2MB

                                                                                                                                                                            MD5

                                                                                                                                                                            1bbaf6b6e43c212f3cdcc5f8d4cfa3fe

                                                                                                                                                                            SHA1

                                                                                                                                                                            0bd441212def2f9ba06f595846637b9c6100f292

                                                                                                                                                                            SHA256

                                                                                                                                                                            fd4610c94d7868ee98bfc17e88e837009aad0783a0b985f42892e79fae3fc26f

                                                                                                                                                                            SHA512

                                                                                                                                                                            e8687842bd3b6e4c8cd1c8dcf5a7b952eeb3492a01409a2ab340c9fd2d7e189e220c79da5228943803ab8241480b2f3ec15cc3b3d4a08c72ae0b2d247c272dbb

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Quick.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            2.7MB

                                                                                                                                                                            MD5

                                                                                                                                                                            a0fbd9e1316c57207712a3c556026d72

                                                                                                                                                                            SHA1

                                                                                                                                                                            3f342bfa40e184ad0d31d0079344248160d01039

                                                                                                                                                                            SHA256

                                                                                                                                                                            890bfe0f73e46f12935972868d13ef5c5def63c87617caea318dc0547269516d

                                                                                                                                                                            SHA512

                                                                                                                                                                            e350cc55869d008e0dad66759c630dfddc4e9ec96812a940d0639d860c6aab236e311c7fa45ce0536d8a670e865480ff93bc242f04f3a52fcfa0a5122c46a5f2

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Sensors.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            177KB

                                                                                                                                                                            MD5

                                                                                                                                                                            6714f517904213cc4b28036d7a1fb38a

                                                                                                                                                                            SHA1

                                                                                                                                                                            4b548b0f73dc204884e62b867a9acde83d3101d1

                                                                                                                                                                            SHA256

                                                                                                                                                                            67252d862302e32cd275315192a6f4a22f0e597885ef736d68eb149e08756c2a

                                                                                                                                                                            SHA512

                                                                                                                                                                            d865732f98a417a4f8a13770fe29e5073da9dca8ffbb2a84dea1ebf37f042fc2739ca726a64a5e4b2d0c8c20a1d200f5d8a35a49eb99df7a4fab6e973a0bf96c

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Sql.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            183KB

                                                                                                                                                                            MD5

                                                                                                                                                                            f4ba157222f32620d40b1ce36562fdbf

                                                                                                                                                                            SHA1

                                                                                                                                                                            a1a2d0305d84e6282b9a212475dea2834e39d0d1

                                                                                                                                                                            SHA256

                                                                                                                                                                            46471c2f72d0204d3c202b7a1a23b87402c3b8bb7e7d3e31747ac4f2f9025993

                                                                                                                                                                            SHA512

                                                                                                                                                                            7bca66888ca4cc942c370db820caef1b49bd787e63d6f701d2df97894e849922c5707abcabe56802bd2972e7d22aae54366a40d3275a3bd4fa69d6fa9f9d66a6

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5WebKit.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            16.5MB

                                                                                                                                                                            MD5

                                                                                                                                                                            f6bf0948b06107fc8b01c71de2bd64dc

                                                                                                                                                                            SHA1

                                                                                                                                                                            4b752f7e241c62bcc4097477a0f0b7092b822a3e

                                                                                                                                                                            SHA256

                                                                                                                                                                            a4870f16094d015fe17c4bb5efd7eb3c63841792676594f17c30228948e1c6e5

                                                                                                                                                                            SHA512

                                                                                                                                                                            329b263a6d8fadc36ccc9c32bd69add5a4e21687029e62b5506e364f4186c0eb5f1dd553e3b5af2f370fb110ef1b40c0da97a5162a09d51874a07e7ddecb6067

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5WebKitWidgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            213KB

                                                                                                                                                                            MD5

                                                                                                                                                                            0de34e9ebfe6b7230067d6a8b96810ce

                                                                                                                                                                            SHA1

                                                                                                                                                                            511a80faeddd78ef5cfb94aa3db45d6d4d89749c

                                                                                                                                                                            SHA256

                                                                                                                                                                            43f5db7753714366ac4e78bb717278c08cbec26525c421b7fe32433c2dc3fe3a

                                                                                                                                                                            SHA512

                                                                                                                                                                            6b7ebe3b7a23dd577a0bcfc41212947e2790190ef2a54b0601814b5b6623598de1dda400565afecda4927d60e6e33d960eb277164d12deb21fc4accba0f1ff54

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Widgets.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.7MB

                                                                                                                                                                            MD5

                                                                                                                                                                            dc9e1ba3cdbd9aaf68e0a4b4a12d3c5b

                                                                                                                                                                            SHA1

                                                                                                                                                                            c5b94577f800deccbf5cb772f142db8bc42b59ac

                                                                                                                                                                            SHA256

                                                                                                                                                                            71a1df35f20165b5a6435c6f40aa904e73759b754924f5c8a17c088122edb0c0

                                                                                                                                                                            SHA512

                                                                                                                                                                            736f1582773a2884ff5e047bc16d9896de6255450c209fead8806e4de693a3e9a6d6e98aa1a80ec56ba751c90f4fbabcc542d69bc22ababa5b21e9d3f1215151

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\Qt5Xml.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            177KB

                                                                                                                                                                            MD5

                                                                                                                                                                            de9f5f0442c478435dd9c3be72f39c4b

                                                                                                                                                                            SHA1

                                                                                                                                                                            d3a375abea2cf3dc287073e48a96662b257a886f

                                                                                                                                                                            SHA256

                                                                                                                                                                            4865748fedbafd266971fae0d6d282317b598eb2c4907f10c67d2c41445e5e30

                                                                                                                                                                            SHA512

                                                                                                                                                                            1f2e28888a046a654b401e10f7b5653b776a4ae180fd6fb3ae6cd2d5744e650cddce873d08ba20f0c205e627bbc1bdca950fa6b25cfb31dd3c7e4da4c03b3d22

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\icudt51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            21.3MB

                                                                                                                                                                            MD5

                                                                                                                                                                            cc910d2336908b796dd89732764c50e7

                                                                                                                                                                            SHA1

                                                                                                                                                                            4fe218155ad7da6cd24d32868fdf23caa90bb1de

                                                                                                                                                                            SHA256

                                                                                                                                                                            acb1b7f4664f0d939a3be878a110b5b81d79509af4b6796cc0b858fd3cff43d3

                                                                                                                                                                            SHA512

                                                                                                                                                                            133818bfff7483c9a7805e7e1a63ab879b28898d283a17566948c004f4e0e1897f17af18de8ac86a2525fbaaf027aba0363fbbf16318e27a419963de84c45660

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\icuin51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.3MB

                                                                                                                                                                            MD5

                                                                                                                                                                            df31a56a47ae35b90ceb6e413e83138f

                                                                                                                                                                            SHA1

                                                                                                                                                                            817d1275f68618a1bcfbb9c9a36e4ec79e2b13c3

                                                                                                                                                                            SHA256

                                                                                                                                                                            de0597fbdd4c00c94a55208295d04f9adb1bd267de107bb0857a0ff7e92d7c78

                                                                                                                                                                            SHA512

                                                                                                                                                                            080cb7d9a09d97e8ba86c10a2f96c05b0872e7ad14bdc2ccd4e33d33068c9d1a1fd7dd0baea538707c433a55f4c2335b5b06c764a930ecc8656198fd21bcf20b

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\icuuc51.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                            MD5

                                                                                                                                                                            0d2235b81e187c0be3f664e4ab7bb4e2

                                                                                                                                                                            SHA1

                                                                                                                                                                            f996bf55f92690c664a651979a17b465921ae854

                                                                                                                                                                            SHA256

                                                                                                                                                                            d7f6402728963ad3ed40dbefed4f137524fa940293acb40fa046a12b59b7ce56

                                                                                                                                                                            SHA512

                                                                                                                                                                            13d2922245c3bcef1e7ab5d490c6738d897b23dea1d03e424e11b4a4e63d4a04167a6d9641a565fe34b757c02d4f7d65a54bd5b8b74ef1db0d4555dc134802a8

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\unins000.exe

                                                                                                                                                                            Filesize

                                                                                                                                                                            734KB

                                                                                                                                                                            MD5

                                                                                                                                                                            7bad995f71face2b44b3708b02764916

                                                                                                                                                                            SHA1

                                                                                                                                                                            0feca34dedfe83eb0164ba67610577ebd10f05f8

                                                                                                                                                                            SHA256

                                                                                                                                                                            c9feb07d1c025a2fbb52c923ba7fb5bb79e4bedcb60f61ea63441e4e23496a4a

                                                                                                                                                                            SHA512

                                                                                                                                                                            badc49a76c6c5044f44a4862a6d32694e3362452d4e4654d9a7720bacf46f428590ddb86c76f7b2fe68d599e59567fb3831d97fb01377502b8f303ebd75dfdbc

                                                                                                                                                                          • \Program Files (x86)\ZLOrigin\winhttp.dll

                                                                                                                                                                            Filesize

                                                                                                                                                                            62KB

                                                                                                                                                                            MD5

                                                                                                                                                                            e81c98470febe564944d62839282cac6

                                                                                                                                                                            SHA1

                                                                                                                                                                            bac72740cc27ef69a23d028090338579bdde4abe

                                                                                                                                                                            SHA256

                                                                                                                                                                            eafcee069fcfe87f62408f0503c5628edb4cf6fc7dfa8deb5a478b87d13a455b

                                                                                                                                                                            SHA512

                                                                                                                                                                            5456b13efded6ca9509aa0b32ebb1496823066848aec5ca5758c3f6c3b527ccbb71f8e845a2c76ac7f8d4ad0ddbf2b0d08fc372750ca114bbaf3680bae8ae443

                                                                                                                                                                          • \Users\Admin\AppData\Local\Temp\is-7ITHG.tmp\setup.tmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            723KB

                                                                                                                                                                            MD5

                                                                                                                                                                            a23988ec1f09399b480971075d7f87ba

                                                                                                                                                                            SHA1

                                                                                                                                                                            817abf38a9d6eb2dd77770524ba129d8b5608efd

                                                                                                                                                                            SHA256

                                                                                                                                                                            070904f11ec14b5df2e503fd1f67a6ffffa6591466d8eccb056b39e343d2b9dd

                                                                                                                                                                            SHA512

                                                                                                                                                                            4f54949002bf224967df18f10d5399ef602c0d4fa7d77e1ee1d42b6a189497fe820c40df2287e4b511506d46f6b797b9f6d09657d9129230f80baa2f037b8527

                                                                                                                                                                          • memory/324-302-0x0000000000330000-0x000000000062F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/324-299-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/324-297-0x0000000000330000-0x000000000062F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/324-298-0x0000000002AD1000-0x0000000002BB4000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            908KB

                                                                                                                                                                          • memory/324-317-0x0000000077060000-0x0000000077070000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            64KB

                                                                                                                                                                          • memory/324-296-0x0000000074650000-0x0000000074678000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/476-344-0x0000000074650000-0x0000000074678000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/904-184-0x0000000000190000-0x0000000000299000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/928-175-0x0000000006820000-0x00000000068E9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/928-138-0x0000000006820000-0x00000000068E9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/928-174-0x0000000074C20000-0x0000000074C48000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/928-106-0x00000000011C0000-0x00000000012C9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/928-81-0x0000000074C20000-0x0000000074C48000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/1064-55-0x000007FEFBB61000-0x000007FEFBB63000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            8KB

                                                                                                                                                                          • memory/1100-146-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            5.9MB

                                                                                                                                                                          • memory/1100-147-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            5.9MB

                                                                                                                                                                          • memory/1504-66-0x0000000071791000-0x0000000071793000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            8KB

                                                                                                                                                                          • memory/1536-141-0x0000000000150000-0x0000000000259000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/1568-71-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            112KB

                                                                                                                                                                          • memory/1568-65-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            112KB

                                                                                                                                                                          • memory/1568-58-0x0000000074FA1000-0x0000000074FA3000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            8KB

                                                                                                                                                                          • memory/1568-82-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            112KB

                                                                                                                                                                          • memory/1568-59-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            112KB

                                                                                                                                                                          • memory/1796-181-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/1796-179-0x0000000002D70000-0x0000000002E79000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/1796-178-0x0000000074AF0000-0x0000000074B18000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/2056-203-0x00000000003D0000-0x00000000004D9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/2232-338-0x00000000002E0000-0x00000000005DF000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2232-337-0x0000000074680000-0x00000000746A8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/2232-334-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/2232-333-0x00000000024C1000-0x00000000025A4000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            908KB

                                                                                                                                                                          • memory/2232-328-0x00000000002E0000-0x00000000005DF000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2232-327-0x0000000074680000-0x00000000746A8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/2644-239-0x0000000008271000-0x000000000860A000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.6MB

                                                                                                                                                                          • memory/2644-242-0x00000000089F1000-0x0000000008ACF000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            888KB

                                                                                                                                                                          • memory/2644-237-0x0000000002881000-0x0000000002D11000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.6MB

                                                                                                                                                                          • memory/2644-238-0x0000000007F91000-0x0000000008067000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            856KB

                                                                                                                                                                          • memory/2644-240-0x0000000008131000-0x0000000008198000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            412KB

                                                                                                                                                                          • memory/2644-248-0x0000000008ED1000-0x0000000008FA0000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            828KB

                                                                                                                                                                          • memory/2644-247-0x0000000008B31000-0x0000000008C3D000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/2644-246-0x0000000008681000-0x00000000087D4000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.3MB

                                                                                                                                                                          • memory/2644-245-0x00000000081C1000-0x000000000820F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            312KB

                                                                                                                                                                          • memory/2644-236-0x0000000002880000-0x0000000002E85000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            6.0MB

                                                                                                                                                                          • memory/2644-244-0x0000000008DA1000-0x0000000008E7C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            876KB

                                                                                                                                                                          • memory/2644-243-0x0000000008CC1000-0x0000000008D70000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            700KB

                                                                                                                                                                          • memory/2644-241-0x0000000008851000-0x0000000008981000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-150-0x0000000003CA0000-0x00000000042A5000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            6.0MB

                                                                                                                                                                          • memory/2936-166-0x0000000007501000-0x0000000007654000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.3MB

                                                                                                                                                                          • memory/2936-169-0x0000000007901000-0x0000000007A0D000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/2936-159-0x0000000007A90000-0x0000000007B6E000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            888KB

                                                                                                                                                                          • memory/2936-161-0x0000000007CA0000-0x0000000007DCA000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-152-0x0000000006B80000-0x0000000006CB3000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-162-0x0000000007870000-0x00000000078E4000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            464KB

                                                                                                                                                                          • memory/2936-170-0x0000000007A91000-0x0000000007B40000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            700KB

                                                                                                                                                                          • memory/2936-171-0x0000000007B71000-0x0000000007C4C000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            876KB

                                                                                                                                                                          • memory/2936-173-0x0000000007871000-0x00000000078BF000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            312KB

                                                                                                                                                                          • memory/2936-168-0x0000000006FB1000-0x000000000708F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            888KB

                                                                                                                                                                          • memory/2936-157-0x0000000006FB0000-0x00000000070E9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-154-0x0000000006CC0000-0x0000000006D4D000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            564KB

                                                                                                                                                                          • memory/2936-155-0x0000000007500000-0x00000000076CE000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.8MB

                                                                                                                                                                          • memory/2936-156-0x00000000076D0000-0x000000000786E000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.6MB

                                                                                                                                                                          • memory/2936-151-0x0000000003CA1000-0x0000000004131000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.6MB

                                                                                                                                                                          • memory/2936-165-0x0000000006CC1000-0x0000000006D28000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            412KB

                                                                                                                                                                          • memory/2936-167-0x00000000076D1000-0x0000000007801000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-158-0x0000000007900000-0x0000000007A8D000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.6MB

                                                                                                                                                                          • memory/2936-172-0x0000000007CA1000-0x0000000007D70000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            828KB

                                                                                                                                                                          • memory/2936-153-0x00000000070F0000-0x00000000074F9000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            4.0MB

                                                                                                                                                                          • memory/2936-160-0x0000000007B70000-0x0000000007C9A000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.2MB

                                                                                                                                                                          • memory/2936-163-0x0000000006B81000-0x0000000006C57000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            856KB

                                                                                                                                                                          • memory/2936-164-0x00000000070F1000-0x000000000748A000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.6MB

                                                                                                                                                                          • memory/2992-222-0x00000000097B0000-0x0000000009AC2000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.1MB

                                                                                                                                                                          • memory/2992-200-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/2992-194-0x0000000002D90000-0x0000000002E99000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB

                                                                                                                                                                          • memory/2992-198-0x0000000002AB1000-0x0000000002B94000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            908KB

                                                                                                                                                                          • memory/2992-206-0x0000000000360000-0x000000000065F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2992-193-0x0000000002AB0000-0x0000000002BFA000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.3MB

                                                                                                                                                                          • memory/2992-205-0x00000000729B0000-0x00000000729D8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/2992-224-0x00000000097B0000-0x0000000009AC2000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.1MB

                                                                                                                                                                          • memory/2992-221-0x0000000077060000-0x0000000077070000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            64KB

                                                                                                                                                                          • memory/2992-225-0x0000000000360000-0x000000000065F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2992-192-0x00000000729B0000-0x00000000729D8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/2992-196-0x0000000000360000-0x000000000065F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2992-189-0x0000000000360000-0x000000000065F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/2992-187-0x0000000000360000-0x000000000065F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/3244-262-0x00000000025E1000-0x00000000026C4000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            908KB

                                                                                                                                                                          • memory/3244-252-0x0000000000760000-0x0000000000A5F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/3244-259-0x0000000074680000-0x00000000746A8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/3244-283-0x0000000077060000-0x0000000077070000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            64KB

                                                                                                                                                                          • memory/3244-261-0x0000000000760000-0x0000000000A5F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/3244-268-0x0000000000760000-0x0000000000A5F000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            3.0MB

                                                                                                                                                                          • memory/3244-263-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/3416-230-0x000000006A3C0000-0x000000006A489000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            804KB

                                                                                                                                                                          • memory/3416-227-0x0000000074E80000-0x0000000074EA8000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            160KB

                                                                                                                                                                          • memory/3588-233-0x0000000000270000-0x0000000000379000-memory.dmp

                                                                                                                                                                            Filesize

                                                                                                                                                                            1.0MB